Availability
The final aegis assumption is the availability of account or data. Without abstracts availability,
secret and changeless abstracts is useless! This assumption is able-bodied accepted in the networking arena
where back-up and high-availability designs are common.
Attacks adjoin availability are alleged disruption or, in the networking world, abnegation of
service (DoS) attacks.
Reverse Aegis Triad
The about-face aegis attempt are disclosure, alteration, and disruption (DAD):
• Disclosure. Breach of confidentiality.
• Alteration. Abstracts is modified.
• Disruption. Service/data is no best available.
Figure 1-2 shows the about-face aegis principles.
Figure 1-2 Reverse Security Triad Principles
Disclosure
D
D
No
Security
A
Alteration Disruption