This commit is contained in:
Satoshi SAKAO 2020-04-09 18:00:54 +09:00 committed by Nanne Baars
parent db66c1dd02
commit d7ae3a4391

View File

@ -1,7 +1,7 @@
== Compromising Availability
After successfully compromising confidentiality and integrity in the previous lessons, we now are going to compromise the third element of the CIA triad: *availability*.
The are many different ways to violate availability.
There are many different ways to violate availability.
If an account is deleted or the password gets changed, the actual owner cannot access it anymore.
Attackers could also try to delete parts of the database making it useless or even dropping the whole database.
Another way to compromise availability would be to per example revoke access-rights from admins or any other users, so that nobody gets access to (specific parts of) the database.