Availability cisco

Availability

The final aegis assumption is the availability of account or data. Without abstracts availability,

secret and changeless abstracts is useless! This assumption is able-bodied accepted in the networking arena

where back-up and high-availability designs are common.

Attacks adjoin availability are alleged disruption or, in the networking world, abnegation of

service (DoS) attacks.

Reverse Aegis Triad

The about-face aegis attempt are disclosure, alteration, and disruption (DAD):

• Disclosure. Breach of confidentiality.

• Alteration. Abstracts is modified.

• Disruption. Service/data is no best available.

Figure 1-2 shows the about-face aegis principles.

Figure 1-2 Reverse Security Triad Principles

Disclosure
D
D
No
Security
A
Alteration Disruption