Hacking motivations and techniques

Assignment Help Basic Computer Science
Reference no: EM131639003

Hacking Motivations and Techniques

You are sitting on the balcony of a coffee shop in Paris enjoying a cup of coffee and decide to log into your favorite social media site to update your friends on your exotic vacation. You enter your name and password and are surprised when your login attempt fails. Thinking that you mistyped your password, you carefully re-enter it-only to be denied access to your account again. Not sure what the problem is, you click the link to reset your password. After resetting your password, you are able to gain access to your social media page and discover that your page has turned into a promotional site for some band named "Pixel the Pony." Your social media account has been hacked! It could have been hacked for fun, publicity, revenge, or any number of reasons. The hacker could be almost anyone. You likely will never know who hacked your account or why.

IT professionals can neither predict when the next attack will occur nor what the real motivations behind such an attack might be. Even when the best measures are employed, computer systems are vulnerable. For example, an IT department might be well prepared to defend against attackers trying to compromise their organization's financial servers, but insufficiently prepared to defend against nation states looking to steal intellectual property.

Understanding common motivations behind hacking is important. IT professionals can use these motivations to try to predict potential targets. For example, a disgruntled employee, motivated by revenge, might want to delete months of research data. Likewise, a hacker, motivated by publicity, might want to deface a Fortune 500 company's website. Knowing these common motivations, IT professionals might back up the research data multiple times daily and/or require supervisor authorization to delete data. In the case of the Fortune 500 company, they might change their web server's password daily.

To prepare for this Discussion, use the interactive media Simulated Network Attack, located in this unit's Learning Resources. Also, find two recent news events that you believe are hacking-related and analyze them for possible motivations and techniques.

By Day 4, Explain why you have concluded these motivations are hacking-related and what techniques might have been used to exploit the vulnerabilities. For one of your news events, explain which Simulated Network Attack case it best matches.

Reference no: EM131639003

Questions Cloud

Discuss differing learning styles : Think back to the methods of instruction that you received in high school and your undergraduate nursing education
What is the break-even point per month in sales dollars : Lake Stevens Marina has estimated that fixed costs per month are $350,000, What is the break-even point per month in sales dollars
How could saudi arabia promote interest of the islamic world : How could Saudi Arabia, Turkey and Indonesia promote the interest of the Islamic World within the G20?
Explain teachers dont fail students : the following statement in light of the shift from teaching to learning: "Teachers don't fail students; students fail themselves
Hacking motivations and techniques : You are sitting on the balcony of a coffee shop in Paris enjoying a cup of coffee and decide to log into your favorite social media site to update your friends
Develop analytical and critical thinking skills necessary : Develop the analytical and critical thinking skills necessary to make sound business and personnel decisions.
Explain profession-person, environment and health : This discussion considers the metaparadigm of nursing and the four concepts of the nursing profession-person, environment, health
How is the style of community supervision changing : How is the style of community supervision changing? Provide reasons why current supervision strategies are different from strategies that were used in the past.
Translating business goals to technical goals : To ensure network security, all communication between the devices and the lab gateway needs to be secure.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Very simple python problem

VERY SIMPLE PYTHON PROBLEM An evil number is a positive integer whose binary digits add up to an even number (the opposite of an evil number is an odious number, whose binary digits add up to an odd number). For example, 14 is odious:

  Additional code fragment to test function

Write a C++ function minimum. This function is passed a vector parameter and returns the smallest value stored in the array list. Write an additional code fragment to test this function. Include any declarations and initialization statements neces..

  Ways to prevent network intrusion

You are the manager of a large division of your company. One of the supervisors under your leadership handles customer complaints. This supervisor recently received an e-mail addressed specifically to the supervisor from a customer complaining tha..

  Descriptive analytics-predictive analytics

What is the difference between descriptive analytics, predictive analytics, and prescriptive analytics? Provide examples of each.

  Program that allows a user to enter 10 item stock

Write a program that allows a user to enter 10 item stock numbers, prices, quantities in stock into three parallel arrays. Display all the data in report form - that is, aligned correctly in columns.

  How a circulator could be arranged to do the same thing

Draw a sketch showing how a hybrid tee could be used to connect a transmitter and a receiver to the same antenna in such a way that the transmitter power would not reach the receiver.

  Calculate the profit made on works of art

Calculate the profit made on works of art that have been sold (i.e., the profit/loss on an  individual work of art is the difference between the acquisition price and the sales price).

  Design a class named fan to represent a fan

Design a class named Fan to represent a fan. The class contains: * Three constants named SLOW, MEDIUM, and FAST with values 1, 2, and 3 to denote fan speed.

  Could you log in to the banking system

Suppose that you intercept the following messages between a user and their bank, in which the login details are encrypted text.

  What will be the output amplitude of a 20-khz

A lowpass Butterworth filter has a corner frequency of 1 kHz and a roll-off of 24 dB per octave in the stopband. If the output amplitude of a 3-kHz sine wave is 0.10 V, what will be the output amplitude of a 20-kHz sine wave if the input amplitude..

  Devise a scheme that exploits this potential parallelism

What constraint does this approach impose on the relation between the page size and the cache lookup mechanism? Explain.

  Building and managing a global enterprise

Discuss HR's role in building and managing a global enterprise.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd