As defined earlier in Chapter 2, “Foundations and Principles of Security,” designing and implementing a sound IT security architecture and framework requires a thorough analysis and examination of how availability, integrity, and availability (A-I-C Triad) is designed and implemented on the IT infrastructure components and assets in the overall information security plan.
Attacks on an IT infrastructure and assets can disrupt availability of service resulting in the following:
Loss of Productivity— Downtime equals lost productivity to organizations. Lost productivity can result in loss in dollars and time.
Violation of Service Level Agreements— Service providers or outsourcing service organizations can be ...