O'Reilly logo

Kali Linux Wireless Penetration Testing Cookbook by Sean-Philip Oriyano

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

So far, we've looked at two of the three components of the CIA triad. Now it's time to look at the third and final part of the CIA triad, which is availability. Simply put, availability deals with the issues revolving around the loss of access to a resource, such as a file or computer or even a whole network, as we will see in this chapter. As you can imagine, a loss of availability is a big issue mainly due to the fact that if you can't access something, no matter what that might be, it essentially becomes worthless to you until you can gain access to it again. It's also not too much of a stretch to say that the loss of access to an item also is quite frustrating as it means you may be unable to complete your job or task until ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required