Attackers motives behind the cyber attack, Computer Network Security

Assignment Help:

Attacker's Motives behind the Cyber Attack

Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation to plan an attack will be a wise choice. This may help in identifying whether the blogger must be given a chance to explain his position before taking any legal action against him. It can also be determined whether any action by the company resulted in such a reaction by the blogger. Also, such situations can aidin preventing futureoccurrences and help in identifying tools that are used by bloggers. Most importantly, theexercise will help EZ identify what type of attacker the blogger can be classified such as:

• any freelance information broker
• the blogger could be an employee from any domestic or foreign competitor companies.
• intentionsof blackmailing EZ for money
• The blogger could be a hacker that may even attack the computer system for any malicious damage and other inappropriate reasons.
• The blogger could have an old conflict with the EZ which forced him to manipulate the information against their brand (Workman, 2010).

There is no denying in the fact that thrill-seeking teenagers, hackers and bloggers are still very common. However, this cannot be ignored that this field is now dominated increasingly by various professionals who master at stealing private information and data to sell. In fact it will be fair to say that individuals attack a computer since that is where the information lies. In today's extremely competitive and hi-tech business environment, company information possessesgreat value and can be used for both improving and destroying the image of any business. Teenagersare least likely to benefit from such a scenario and thisinvolvement will only point out to a familiar professional.Furthermore, if the patterns of bloggers are closely followed, then it will be found that he seems to be a professional in blogging and other associated areas that may include maintaining blogs and websites.

The blogger could be a disgruntled employee from the past is who can damage the systems or steal data for profit or revenge. However, the situation generally suggests that the attacker has an apparent grudge with EZ that took place years ago in an argument with a few of the company's principals. He is intention may be to gain a sense of control, power, revenge, and self-importance by successfully retrievingthe company's information and using it to disrupt activities and destroy The EZ Company's reputation.


Related Discussions:- Attackers motives behind the cyber attack

What is network virtual terminal, Network Virtual Terminal It is a set...

Network Virtual Terminal It is a set of principles describing a very simple virtual terminal interaction. The NVT is needed in the start of a Telnet session. Communication wit

Layering, ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution...

ADDRESS RESOLUTION AND PROTOCOL ADDRESSES Address resolution (ARP) is a network interface layer protocol. Protocol addresses are used in all upper layers. Address resolution s

Programming, For this assignment you will create a program called MMWordFix...

For this assignment you will create a program called MMWordFix (Multi-Mode WordFix). This program prompts the user to select one of three word filters (uppercase, lowercase, encryp

What is the use of digital certificate, Question: (a) What is the use ...

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

Which authorization model could be ideal, Question: (a) Your office ad...

Question: (a) Your office administrator is being trained to take server backups. Which authorization model could be ideal for this situation: MAC, DAC or RBAC? Justify your a

Perimeter network security system, Title: Perimeter Network Security System...

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Object tracking using wireless sensor networks, This project involves the d...

This project involves the design and development of a simulation environment of many sensors tagging material/ machinery/equipment/etc in a warehouse site to help monitor and manag

Derive the transmitted crc header checksum, QUESTION (a) Consider the f...

QUESTION (a) Consider the following digital bit stream 01001100 is to be encoded in: i. NRZ-I ii. Pseudoternary iii. Manchester iv. Differential Manchester Show th

Professional issues in information technology, Thinking ethically is diffic...

Thinking ethically is difficult without a background in moral philosophy. Asking people to embrace ethics without offering practical explanation of the efficacy of so doing, is a t

What is border gateway protocol, Border Gateway Protocol It is a proto...

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd