top of page
Master Rumbler

Disclosure, Alteration and Destruction (DAD)

Disclosure, Alteration, and Destruction (DAD) refer to three potential risks or outcomes in the context of information security. These terms describe different ways in which sensitive information can be compromised or impacted


Disclosure

Disclosure refers to the unauthorized release or exposure of sensitive information to individuals or entities who should not have access to it. This could involve the unintentional or intentional sharing of confidential data, such as personal information, trade secrets, or classified information. Unauthorized disclosure can lead to privacy breaches, reputational damage, or misuse of information by unauthorized parties.


The concept is further elaborated in the table as following

Type of Vulnerability

Description

Real life example

Data Breaches

When a company's database or system is compromised, leading to the unauthorized access and disclosure of customer information, such as personal details, credit card numbers, or login credentials

Insider Leak

When an employee or insider intentionally discloses confidential information without authorization

Accidental Email or Document Sharing

Instances where individuals mistakenly send emails or share documents containing sensitive information with unintended recipients. This can occur due to errors in email address input or lack of proper data classification and handling procedures.

Public Wi-Fi Network Vulnerabilities

Unsecured public Wi-Fi networks can expose user data to unauthorized parties who may intercept and access sensitive information transmitted over the network. This can lead to the disclosure of login credentials, financial data, or personal information.

In 2022, a security researcher found that a public Wi-Fi network in a major airport was vulnerable to a man-in-the-middle attack


In 2021, a security researcher found that a public Wi-Fi network in a major train station was vulnerable to a denial-of-service attack

Social Engineering Attacks

Techniques such as phishing, where attackers trick individuals into divulging confidential information, such as usernames, passwords, or financial details. This information is then used for malicious purposes.

group of hackers tricked employees at a major tech company into revealing their passwords by sending them phishing emails that appeared to be from the company's CEO.

 

Alteration:

Alteration refers to unauthorized changes or modifications made to data or information. It involves tampering with the integrity or accuracy of the information, often with the intent to deceive or manipulate. Unauthorized alterations can lead to data corruption, false information dissemination, or compromised trust in the accuracy and reliability of the data.


The concept is further elaborated in the table as following

Type of Vulnerability

Description

Real Life examples

Website Defacement

Hackers may alter the content or appearance of a website without permission. This can involve replacing the original content with defamatory messages, political statements, or offensive imagery

Digital Image Manipulation

Alteration of images using software tools to modify their content or deceive viewers. This can include doctoring photographs for propaganda purposes or manipulating images in advertising to present unrealistic representations

In 2022, a photo of a Turkish protest was digitally altered to make it look like there were more protesters present

Financial Fraud

Alteration of financial records or transactions to conceal fraudulent activities. For instance, modifying accounting records to inflate revenues or underreport expenses to deceive stakeholders and investors

In 2022, a group of hackers stole the personal information of over 500 million customers from the credit reporting agency Equifax


In 2022, a group of hackers stole the customer data of over 143 million customers from the retail giant Target

Medical Record Tampering

Unauthorized modification of medical records to conceal medical errors, change diagnoses, or manipulate patient information for personal gain or to support fraudulent claims.

In 2022, the personal health information of over 10 million patients was exposed in a data breach at the Universal Health Services hospital chain


In 2022, the personal health information of over 7 million patients was exposed in a data breach at the LabCorp medical testing company

Software Source Code Manipulation

Unauthorized alteration of software source code to introduce vulnerabilities, insert malicious code, or modify functionality. This can compromise the security and integrity of software applications.

In 2022, the open-source project Log4j was found to be vulnerable to a critical remote code execution (RCE) vulnerability


In 2021, the SolarWinds Orion IT management software was found to have been compromised by a nation-state actor

 

Destruction:

Destruction refers to the loss or destruction of data or information, whether accidental or intentional. This can occur due to system failures, natural disasters, malicious attacks, or improper handling of physical or digital media. Destruction can lead to the loss of valuable information, disrupt business operations, or impact the ability to recover or restore critical data.


The concept is further elaborated in the table as following

Type of Vulnerability

Description

Real Life Example

Data Loss or Deletion

accidental or intentional removal or loss of data

In 2020, a data breach at the health insurance company Anthem exposed the personal information of over 78 million Americans

System or Infrastructure Destruction

Destruction or disabling of computer systems, networks, or infrastructure. like DDoS or physical destruction

In June 2022, a DDoS attack on Cloudflare's network reached a peak of 71 million requests per second (rps)


In May 2022, a DDoS attack on the Ukrainian government's website lasted for several days

Data Wiping

Deliberate and complete erasure of data from storage devices to prevent any chance of recovery

In 2022, a ransomware attack on the Kaseya software company caused data to be wiped from thousands of businesses


In 2021, a cyberattack on the Norwegian pharmaceutical company Teva Pharmaceuticals caused data to be wiped from the company's servers

Disruption of Services

Involves actions that disrupt or disable critical services or infrastructure. Infrastructure attacks and cloud service outages

In 2021, a cyberattack on Colonial Pipeline, the largest fuel pipeline in the United States, caused widespread fuel shortages


In 2020, a cyberattack on the Norsk Hydro aluminum company caused widespread production outages




26 views0 comments

Recent Posts

See All

Comments


bottom of page