User:Yogesh Ratnaparkhe/sandbox

DAD Triad

Malicious hackers have developed their own triads, the DAD triads, to combat security experts' CIA triads. Each leg of the DAD triad is intended to break the mechanisms associated with one leg of the CIA triad.

Disclosure: try to release the confidentiality. Alteration: Attempts to break integrity. Destruction: Trying to break availability.

Disclosure: An unauthorised individual accesses the system for legitimate purposes. This is contrary to the disclosure of personal information to individuals who are not sensitive to confidentiality. Disclosure can be achieved by disabling access control mechanisms, violating file system security, or breaking encryption systems to obtain sensitive information.

Alteration: Data has been modified by some illegal mechanism. This is the opposite of completeness. Malicious individuals attempt to change data for a variety of reasons, including financial gain (such as changing bank account balances) and fraud (such as deleting records that indicate that a particular person has entered the building) )

Denial: Authorised users can not access the system for legitimate purposes. Improper information modification Loss of integrity is unauthorised modification or destruction of information.