As an integrity breach. The technical impact of this incident can be categorized as an integrity breach, which refers to the effect of a cloud security incident on the protection of data from unauthorized modification or deletion. Integrity is one of the three security properties of an information system, along with confidentiality and availability.
The incident described in the question involves a cybersecurity criminal finding a vulnerability in an Internet-facing server of an organization, accessing an encrypted file system, and overwriting parts of some files with random data. This is a type of data tampering or corruption attack that affects the accuracy and reliability of the data. The fact that the file system was encrypted does not prevent the integrity breach, as the attacker did not need to decrypt or read the data, but only to overwrite it. The integrity breach can have serious consequences for the organization, such as data loss, data inconsistency, data recovery costs, and loss of trust.
The other options are not correct categories for the technical impact of this incident. Option B, as an availability breach, is incorrect because availability refers to the protection of data and services from disruption or denial, which is not the case in this incident. Option C, as a confidentiality breach, is incorrect because confidentiality refers to the protection of data from unauthorized access or disclosure, which is not the case in this incident. Option D, as a control breach, is incorrect because control refers to the ability to manage or influence the behavior or outcome of a system or process, which is not a security property of an information system. References: =
Top Threats Analysis Methodology - CSA1
Top Threats Analysis Methodology - Cloud Security Alliance2
OWASP Risk Rating Methodology | OWASP Foundation3
OEE Factors: Availability, Performance, and Quality | OEE4
The Effects of Technological Developments on Work and Their