The Attacker Mindset: The DAD Triad (2024)

We typically define security as the total of confidentiality, integrity, and availability. These three components (which are known as the CIA triad) are the foundations of any well-designed information security practice. We adopt security policies in enterprises or individually model the CIA triad from a protection perspective. However, attackers have their own model too. This model consists of three pillars: disclosure, alteration, and denial (which is also abbreviated as the “DAD” triad). In this blog post, we are going to examine each of the DAD triad components and how they connect to their CIA triad equivalents.

Disclosure, Alteration, and Denial (DAD)#

The DAD triad defines the three key strategies used to defeat an organization’s security aims.

Disclosure

Disclosure is an unauthorized party gaining access to sensitive information. As an individual or a security practitioner, you may fail to meet the confidentiality in some way. There are many possible ways for an attacker to access sensitive information in your business.Here are some examples of the disclosure:

  • An unauthorized person or attacker finds a way to access your personal computer or company-issued device and reads sensitive material.

  • A company insider sells sensitive business materials to a competitor or illegitimate third parties.

  • A simple bug or design flaw which allows your users to view sensitive information like user names, and account details of other customers.

Alteration

When security instruments fail to protect data integrity, data transforms. This unauthorized modification may be unintentional or malevolent.

Here are some examples of the data alteration:

  • An administrative employee untrained in the use of a database may accidentally delete records while trying to retrieve a report.

  • An administrator destroys records while attempting to retrieve an annual report.

  • A malicious person gains access to a company’s personal health records. He or she changes some employees’ social security numbers (SSN).

Denial and Destruction

Preventing legitimate users from accessing a system, resource is denial of service. Denial of services includes activities such as preventing users from accessing it until IT personnel restore it to normal working order or activate a backup system.

Summary#

The procedure of preventing illegitimate access, modification, disclosure, interruption, or denial of information is what we aim to achieve as security practitioners. In this blog, we have examined components of the DAD triad, and how they relate to confidentiality, integrity, and availability of information.

As an expert, while designing an organizational security posture, you must keep all of these perspectives in mind. It is your obligation to ensure that people understand the importance of information security to their business and the potential consequences of their actions.

See also

Do you want to get practical skills to work in cybersecurity or advance your career? Enrol in MCSI Bootcamps

The Attacker Mindset: The DAD Triad (2024)
Top Articles
What Is a Private Right of Action - ILR
Cooking without salt: MedlinePlus Medical Encyclopedia
Diario Las Americas Rentas Hialeah
Warren Ohio Craigslist
PRISMA Technik 7-10 Baden-Württemberg
Chris wragge hi-res stock photography and images - Alamy
Mid90S Common Sense Media
Industry Talk: Im Gespräch mit den Machern von Magicseaweed
Spartanburg County Detention Facility - Annex I
Mail.zsthost Change Password
Craftology East Peoria Il
Aldi Süd Prospekt ᐅ Aktuelle Angebote online blättern
White Pages Corpus Christi
Adt Residential Sales Representative Salary
Dallas Mavericks 110-120 Golden State Warriors: Thompson leads Warriors to Finals, summary score, stats, highlights | Game 5 Western Conference Finals
Rs3 Eldritch Crossbow
Bjerrum difference plots - Big Chemical Encyclopedia
Slim Thug’s Wealth and Wellness: A Journey Beyond Music
Surplus property Definition: 397 Samples | Law Insider
Boxer Puppies For Sale In Amish Country Ohio
Craigslist Panama City Beach Fl Pets
4Oxfun
Paris Immobilier - craigslist
Craigslist Rome Ny
Is Light Raid Hard
Garden Grove Classlink
Jail Roster Independence Ks
Frequently Asked Questions - Hy-Vee PERKS
Half Inning In Which The Home Team Bats Crossword
Most popular Indian web series of 2022 (so far) as per IMDb: Rocket Boys, Panchayat, Mai in top 10
Royals op zondag - "Een advertentie voor Center Parcs" of wat moeten we denken van de laatste video van prinses Kate?
Does Iherb Accept Ebt
Directions To 401 East Chestnut Street Louisville Kentucky
Bernie Platt, former Cherry Hill mayor and funeral home magnate, has died at 90
Improving curriculum alignment and achieving learning goals by making the curriculum visible | Semantic Scholar
Live Delta Flight Status - FlightAware
Stranahan Theater Dress Code
Thotsbook Com
2013 Honda Odyssey Serpentine Belt Diagram
Yourcuteelena
Pickwick Electric Power Outage
Hillsborough County Florida Recorder Of Deeds
Boyfriends Extra Chapter 6
Madden 23 Can't Hire Offensive Coordinator
San Diego Padres Box Scores
Brutus Bites Back Answer Key
Rubmaps H
Tommy Gold Lpsg
Duffield Regional Jail Mugshots 2023
Affidea ExpressCare - Affidea Ireland
Comenity/Banter
Latest Posts
Article information

Author: Dean Jakubowski Ret

Last Updated:

Views: 6043

Rating: 5 / 5 (70 voted)

Reviews: 93% of readers found this page helpful

Author information

Name: Dean Jakubowski Ret

Birthday: 1996-05-10

Address: Apt. 425 4346 Santiago Islands, Shariside, AK 38830-1874

Phone: +96313309894162

Job: Legacy Sales Designer

Hobby: Baseball, Wood carving, Candle making, Jigsaw puzzles, Lacemaking, Parkour, Drawing

Introduction: My name is Dean Jakubowski Ret, I am a enthusiastic, friendly, homely, handsome, zealous, brainy, elegant person who loves writing and wants to share my knowledge and understanding with you.