If you are working in a closed laboratory environment, you may wish to attempt a penetration test of the test system using some of the attacks discussed in Chapters 2 and 7 of this book. Only conduct this step with the permission of your instructor. Develop an action plan to remedy any deficiencies noted during the system audit. Provide specific responses that address each of the issues raised.
Several electronic commerce sites were recently flooded with traffic by a group of malicious individuals. This traffic overwhelmed the servers and prevented customers from placing orders. What element of the CIA triad did these attackers defeat? a. Confidentiality b. Integrity c. Availability d. Authorization A cracker broke into a database used by a major electronic commerce site and stole a list of customer credit card numbers. What element of the CIA triad did this attacker defeat? a. Confidentiality b. Integrity c. Availability d. Authorization