Hacking motivations and techniques

Assignment Help Basic Computer Science
Reference no: EM131639003

Hacking Motivations and Techniques

You are sitting on the balcony of a coffee shop in Paris enjoying a cup of coffee and decide to log into your favorite social media site to update your friends on your exotic vacation. You enter your name and password and are surprised when your login attempt fails. Thinking that you mistyped your password, you carefully re-enter it-only to be denied access to your account again. Not sure what the problem is, you click the link to reset your password. After resetting your password, you are able to gain access to your social media page and discover that your page has turned into a promotional site for some band named "Pixel the Pony." Your social media account has been hacked! It could have been hacked for fun, publicity, revenge, or any number of reasons. The hacker could be almost anyone. You likely will never know who hacked your account or why.

IT professionals can neither predict when the next attack will occur nor what the real motivations behind such an attack might be. Even when the best measures are employed, computer systems are vulnerable. For example, an IT department might be well prepared to defend against attackers trying to compromise their organization's financial servers, but insufficiently prepared to defend against nation states looking to steal intellectual property.

Understanding common motivations behind hacking is important. IT professionals can use these motivations to try to predict potential targets. For example, a disgruntled employee, motivated by revenge, might want to delete months of research data. Likewise, a hacker, motivated by publicity, might want to deface a Fortune 500 company's website. Knowing these common motivations, IT professionals might back up the research data multiple times daily and/or require supervisor authorization to delete data. In the case of the Fortune 500 company, they might change their web server's password daily.

To prepare for this Discussion, use the interactive media Simulated Network Attack, located in this unit's Learning Resources. Also, find two recent news events that you believe are hacking-related and analyze them for possible motivations and techniques.

By Day 4, Explain why you have concluded these motivations are hacking-related and what techniques might have been used to exploit the vulnerabilities. For one of your news events, explain which Simulated Network Attack case it best matches.

Reference no: EM131639003

Questions Cloud

Discuss differing learning styles : Think back to the methods of instruction that you received in high school and your undergraduate nursing education
What is the break-even point per month in sales dollars : Lake Stevens Marina has estimated that fixed costs per month are $350,000, What is the break-even point per month in sales dollars
How could saudi arabia promote interest of the islamic world : How could Saudi Arabia, Turkey and Indonesia promote the interest of the Islamic World within the G20?
Explain teachers dont fail students : the following statement in light of the shift from teaching to learning: "Teachers don't fail students; students fail themselves
Hacking motivations and techniques : You are sitting on the balcony of a coffee shop in Paris enjoying a cup of coffee and decide to log into your favorite social media site to update your friends
Develop analytical and critical thinking skills necessary : Develop the analytical and critical thinking skills necessary to make sound business and personnel decisions.
Explain profession-person, environment and health : This discussion considers the metaparadigm of nursing and the four concepts of the nursing profession-person, environment, health
How is the style of community supervision changing : How is the style of community supervision changing? Provide reasons why current supervision strategies are different from strategies that were used in the past.
Translating business goals to technical goals : To ensure network security, all communication between the devices and the lab gateway needs to be secure.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd