Goals Attackers Try to Achieve

There are so many different types of exploits and variants that it is sometimes difficult to categorize all of them. Because exploits, in essence, compromise security, it is helpful to look at the core components of network and computer security to see how exploits fit in. The following are the three goals of information security:

  • Confidentiality. Preventing, detecting, or deterring the improper disclosure of information.
  • Integrity. Preventing, detecting, or deterring the improper modification of data.
  • Availability. Preventing, detecting, or deterring the unauthorized denial of service to data.

An easy way to remember these goals is to take the first letter of each word, CIA, which can either mean the Culinary ...

Get Hackers Beware now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.