Questions tagged [availability]

Availability is the property of ensuring that an asset can be used when it is needed. In other words, availability protects against the threat of denial of service. It is one of the three key security properties of an asset, along with confidentiality and integrity.

Availability is the property of an asset that states that it is always accessible when needed. In other words, it requires that attackers cannot prevent legitimate access by committing a . It is one of the three elements in the classic CIA triad of security properties, alongside and .

36 questions
0
votes
1 answer

How do you securely give access to a Java App interactive console (Linux/GNU)?

I have a Java App running, which prints out messages into STDOUT and also has an active interactive console (also accepts STDIN), when the server has started up. How do I securely give access to an external person (outside the network) to the…
Sir Muffington
  • 1,447
  • 2
  • 9
  • 22
0
votes
3 answers

Can importing an .ics file be dangerous?

Can there theoretically be any possible malicious code hidden in .ics files, which would steal your calendar data or something similar? For an example case, we'd be importing the .ics file into Google Calendar.
Sir Muffington
  • 1,447
  • 2
  • 9
  • 22
0
votes
1 answer

What patterns or practices exist to protect users from site admins deleting the user's information?

Here's my situation: Say you run a service online that stores information that users of the service would want to keep for a long time. This information could be notes, files, etc. but it is information that the user should be able to trust will be…
d0nut
  • 876
  • 7
  • 13
-1
votes
1 answer

Can I use the CIA triad as a sliding scale wrt complexity?

I am looking for a device to explain the compromises that we make for extra layers of security. For example wrt extra layers: communication like JWT encryption/signing and other sorts of encapsulation over TLS Could I use something like the CIA…
hendry
  • 129
  • 4
-1
votes
1 answer

Consider a Fraudulent bank website, would it violate all the aspects of the CIA triad or any one?

I believe it would violate all the three aspects due to following reasons: Confidentiality: Since the website is obviously a scam, in case any person/user registers it, the data of the user would not be confidential or would be up for sale or…
-3
votes
1 answer

If an attacker can inject any code into an email client on a users computer, how can he compromise confidentiality, integrity and availability?

I have an upcoming exam for a Security course. The following question has come up a couple times in past exams and I could use some help formulating an answer. Suppose a user downloads an unsigned application software (say an email client) from the…
1 2
3