•
Availability: a SQL injection vulnerability that initiates a long-running query, consuming a
large amount of resources on the server. This query, when initiated multiple times, leads to
a denial of service (DoS) situation. The attacker has no ability to access or change data but
can prevent legitimate users from accessing the web application.
•
Multiple: a SQL injection vulnerability leads to full interactive shell access to the host op-
erating system running the web application. With this access, the attacker can breach the
confidentiality of the system by accessing data as they please, compromise the integrity of
the system by altering data, and if they so choose, destroy the web application, leading to a
compromise of the availability of the system.
The concepts behind the CIA triad are not overly complicated, and realistically are items that you
are working with intuitively, even if you don’t recognize it. However, it is important to mindfully
interact with the concept as it can help you recognize where to direct your efforts. This conceptual
foundation will assist you with the identification of the critical components of your systems and
the amount of effort and resources worth investing in correcting identified problems.
Another concept that we will address in detail is
risk, and how it is made up of
threats and
vulnera-
bilities. These concepts are not too complex, but they are easy to get wrong. We will cover these
concepts in detail later on, but at a high level, it is best to think of
risk as what you are trying to
prevent from happening,
threat as who would do it to you, and
vulnerability as what allows them to
do it. Controls can be put in place to address the threat or vulnerability, with the goal of mitigating
the risk.
For example, when visiting some parts of the world, you may be at substantial
risk of catching
malaria. This is because the
threat of mosquitoes is very high in some areas, and you are almost
certainly not immune to malaria. Fortunately, you can control the
vulnerability with medication
and attempt to control the
threat with the use of bug repellent and mosquito nets. With controls
in place addressing both the
threat and the
vulnerability, you can help ensure the
risk does not
actualize.