The Attacker Mindset: The DAD Triad (2024)

We typically define security as the total of confidentiality, integrity, and availability. These three components (which are known as the CIA triad) are the foundations of any well-designed information security practice. We adopt security policies in enterprises or individually model the CIA triad from a protection perspective. However, attackers have their own model too. This model consists of three pillars: disclosure, alteration, and denial (which is also abbreviated as the “DAD” triad). In this blog post, we are going to examine each of the DAD triad components and how they connect to their CIA triad equivalents.

Disclosure, Alteration, and Denial (DAD)#

The DAD triad defines the three key strategies used to defeat an organization’s security aims.

Disclosure

Disclosure is an unauthorized party gaining access to sensitive information. As an individual or a security practitioner, you may fail to meet the confidentiality in some way. There are many possible ways for an attacker to access sensitive information in your business.Here are some examples of the disclosure:

  • An unauthorized person or attacker finds a way to access your personal computer or company-issued device and reads sensitive material.

  • A company insider sells sensitive business materials to a competitor or illegitimate third parties.

  • A simple bug or design flaw which allows your users to view sensitive information like user names, and account details of other customers.

Alteration

When security instruments fail to protect data integrity, data transforms. This unauthorized modification may be unintentional or malevolent.

Here are some examples of the data alteration:

  • An administrative employee untrained in the use of a database may accidentally delete records while trying to retrieve a report.

  • An administrator destroys records while attempting to retrieve an annual report.

  • A malicious person gains access to a company’s personal health records. He or she changes some employees’ social security numbers (SSN).

Denial and Destruction

Preventing legitimate users from accessing a system, resource is denial of service. Denial of services includes activities such as preventing users from accessing it until IT personnel restore it to normal working order or activate a backup system.

Summary#

The procedure of preventing illegitimate access, modification, disclosure, interruption, or denial of information is what we aim to achieve as security practitioners. In this blog, we have examined components of the DAD triad, and how they relate to confidentiality, integrity, and availability of information.

As an expert, while designing an organizational security posture, you must keep all of these perspectives in mind. It is your obligation to ensure that people understand the importance of information security to their business and the potential consequences of their actions.

See also

Do you want to get practical skills to work in cybersecurity or advance your career? Enrol in MCSI Bootcamps

The Attacker Mindset: The DAD Triad (2024)
Top Articles
Fallout 76 vendors
Tropical Globe
Jennifer Hart Facebook
Wells Fargo Careers Log In
Fnv Turbo
What is international trade and explain its types?
CSC error CS0006: Metadata file 'SonarAnalyzer.dll' could not be found
Buckaroo Blog
How Quickly Do I Lose My Bike Fitness?
Taylor Swift Seating Chart Nashville
The Connecticut Daily Lottery Hub
Slushy Beer Strain
Wisconsin Women's Volleyball Team Leaked Pictures
Jenn Pellegrino Photos
Eva Mastromatteo Erie Pa
Locate At&T Store Near Me
Dark Chocolate Cherry Vegan Cinnamon Rolls
Espn Horse Racing Results
Dallas Mavericks 110-120 Golden State Warriors: Thompson leads Warriors to Finals, summary score, stats, highlights | Game 5 Western Conference Finals
How many days until 12 December - Calendarr
Putin advierte que si se permite a Ucrania usar misiles de largo alcance, los países de la OTAN estarán en guerra con Rusia - BBC News Mundo
Xfinity Cup Race Today
Yugen Manga Jinx Cap 19
Albert Einstein Sdn 2023
Cornedbeefapproved
Florence Y'alls Standings
Nurtsug
R/Sandiego
Mega Millions Lottery - Winning Numbers & Results
Song That Goes Yeah Yeah Yeah Yeah Sounds Like Mgmt
آدرس جدید بند موویز
4083519708
Heavenly Delusion Gif
Sadie Sink Doesn't Want You to Define Her Style, Thank You Very Much
Grapes And Hops Festival Jamestown Ny
Dr Adj Redist Cadv Prin Amex Charge
The Transformation Of Vanessa Ray From Childhood To Blue Bloods - Looper
Jason Brewer Leaving Fox 25
11526 Lake Ave Cleveland Oh 44102
Pokemon Reborn Gyms
SF bay area cars & trucks "chevrolet 50" - craigslist
Nina Flowers
Brake Pads - The Best Front and Rear Brake Pads for Cars, Trucks & SUVs | AutoZone
My Eschedule Greatpeople Me
War Room Pandemic Rumble
Trending mods at Kenshi Nexus
Actress Zazie Crossword Clue
Stephen Dilbeck, The First Hicks Baby: 5 Fast Facts You Need to Know
Craigslist Pets Lewiston Idaho
Diesel Technician/Mechanic III - Entry Level - transportation - job employment - craigslist
Karen Kripas Obituary
Latest Posts
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 6043

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.