Attackers motives behind the cyber attack, Computer Network Security

Assignment Help:

Attacker's Motives behind the Cyber Attack

Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation to plan an attack will be a wise choice. This may help in identifying whether the blogger must be given a chance to explain his position before taking any legal action against him. It can also be determined whether any action by the company resulted in such a reaction by the blogger. Also, such situations can aidin preventing futureoccurrences and help in identifying tools that are used by bloggers. Most importantly, theexercise will help EZ identify what type of attacker the blogger can be classified such as:

• any freelance information broker
• the blogger could be an employee from any domestic or foreign competitor companies.
• intentionsof blackmailing EZ for money
• The blogger could be a hacker that may even attack the computer system for any malicious damage and other inappropriate reasons.
• The blogger could have an old conflict with the EZ which forced him to manipulate the information against their brand (Workman, 2010).

There is no denying in the fact that thrill-seeking teenagers, hackers and bloggers are still very common. However, this cannot be ignored that this field is now dominated increasingly by various professionals who master at stealing private information and data to sell. In fact it will be fair to say that individuals attack a computer since that is where the information lies. In today's extremely competitive and hi-tech business environment, company information possessesgreat value and can be used for both improving and destroying the image of any business. Teenagersare least likely to benefit from such a scenario and thisinvolvement will only point out to a familiar professional.Furthermore, if the patterns of bloggers are closely followed, then it will be found that he seems to be a professional in blogging and other associated areas that may include maintaining blogs and websites.

The blogger could be a disgruntled employee from the past is who can damage the systems or steal data for profit or revenge. However, the situation generally suggests that the attacker has an apparent grudge with EZ that took place years ago in an argument with a few of the company's principals. He is intention may be to gain a sense of control, power, revenge, and self-importance by successfully retrievingthe company's information and using it to disrupt activities and destroy The EZ Company's reputation.


Related Discussions:- Attackers motives behind the cyber attack

Identify possible controls-information security, Identify Possible Controls...

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

Assignment, Hello i have submitted an assignment and i am still waiting to ...

Hello i have submitted an assignment and i am still waiting to know if it has been accepted or not the ref number is TicketID: EM201381BRY525CN, the due date is for monday 27th of

Explain what is software debouncing, Question : (a) How does a 2-key r...

Question : (a) How does a 2-key rollover differ from the N-key rollover? (b) Why is isolation so important in interfacing? (c) Explain what is software debouncing.

Computer security, Assume that the RSA problem is hard, prove that the RSA ...

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

Briefly explain the following security goals, (a) Briefly explain the fo...

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

Ucsf medical center case study-information security, Example : UCSF Medical...

Example : UCSF Medical Center In the year 2002, the University of California, San Francisco (UCSF) Medical Center received an email message from someone who claimed to be a doct

Draw the waveform for an asynchronous transmission, (a) Draw the waveform ...

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

Define multimedia and application of multimedia, Describe the salient featu...

Describe the salient features of the multimedia. Also explain the applications of it. Multimedia can be understood as follows: Multimedia is on the whole a media which makes

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd