Integrity

Integrity refers to how trustworthy information is after an attack. Has the attacker been given access to financial data, with the result that customers are going to be charged incorrectly at the end of the month? Is the attacker able to edit data, and what effect could these edits have? There is some overlap between confidentiality and integrity when we examine a case where the attacker has limited access to files, and this will be examined with a physical example so that we have some context.

None (N) is defined as follows:

"CVSS 3.0 Definition: There is no loss of integrity within the impacted component."

For integrity, imagine there was a vulnerability which allowed an attacker to access student records in the school office. The attacker is able to view everyone's records, but has no ability to change anything. They now know who is performing well in class, but they could have got this information by asking the teacher!

Low (L) is defined as follows:

"CVSS 3.0 Definition: Modification of data is possible, but the attacker does not have control over the consequence of a modification, or the amount of modification is constrained. The data modification does not have a direct, serious impact on the impacted component."

Returning to the school example, imagine if the vulnerability allowed the attacker to modify a pupil's timetable; this would have limited consequences. In general, pupils and teachers know where they are going, so it would be pretty obvious that a change had been made, and people would still be in the right place at the right time. The rating for the integrity metric would be low in this case.

High (H) is defined as follows:

"CVSS 3.0 Definition: There is a total loss of integrity, or a complete loss of protection. For example, the attacker is able to modify any/all files protected by the impacted component. Alternatively, only some files can be modified, but malicious modification would present a direct, serious consequence to the impacted component."

For our final scenario, the student records were only written in pencil. Now, the attacker could change everybody's grades, which might have an impact on their futures. This vulnerability would score high for integrity, as the attacker can access, edit, and modify all the records/data, which could have serious consequences for somebody:

Integrity – how trusted does the attacker need to appear?

A system with suitable backups and other checks (for example, check digits or hashes) would help to identify when data had been modified, and by whom. Backups can also help to reduce exposure to the highest impact threats.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.143.254.90