Attackers motives behind the cyber attack, Computer Network Security

Assignment Help:

Attacker's Motives behind the Cyber Attack

Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation to plan an attack will be a wise choice. This may help in identifying whether the blogger must be given a chance to explain his position before taking any legal action against him. It can also be determined whether any action by the company resulted in such a reaction by the blogger. Also, such situations can aidin preventing futureoccurrences and help in identifying tools that are used by bloggers. Most importantly, theexercise will help EZ identify what type of attacker the blogger can be classified such as:

• any freelance information broker
• the blogger could be an employee from any domestic or foreign competitor companies.
• intentionsof blackmailing EZ for money
• The blogger could be a hacker that may even attack the computer system for any malicious damage and other inappropriate reasons.
• The blogger could have an old conflict with the EZ which forced him to manipulate the information against their brand (Workman, 2010).

There is no denying in the fact that thrill-seeking teenagers, hackers and bloggers are still very common. However, this cannot be ignored that this field is now dominated increasingly by various professionals who master at stealing private information and data to sell. In fact it will be fair to say that individuals attack a computer since that is where the information lies. In today's extremely competitive and hi-tech business environment, company information possessesgreat value and can be used for both improving and destroying the image of any business. Teenagersare least likely to benefit from such a scenario and thisinvolvement will only point out to a familiar professional.Furthermore, if the patterns of bloggers are closely followed, then it will be found that he seems to be a professional in blogging and other associated areas that may include maintaining blogs and websites.

The blogger could be a disgruntled employee from the past is who can damage the systems or steal data for profit or revenge. However, the situation generally suggests that the attacker has an apparent grudge with EZ that took place years ago in an argument with a few of the company's principals. He is intention may be to gain a sense of control, power, revenge, and self-importance by successfully retrievingthe company's information and using it to disrupt activities and destroy The EZ Company's reputation.


Related Discussions:- Attackers motives behind the cyber attack

Define byte stuffing, Sometimes the special character may see in data and a...

Sometimes the special character may see in data and as a part of data they will be misinterpreted as packet data. The solution to this cause is Byte stuffing.   In general to

Perimeter network security system, Title: Perimeter Network Security System...

Title: Perimeter Network Security System Outline Requirements The University is based in Glasgow, and provides higher education services to its students and staff. It is loc

Routers, Routers They transfer packets among multiple interconnected n...

Routers They transfer packets among multiple interconnected network machines (i.e. LANs of different kind). They perform in the data link, physical and network layers. They ha

What type of rfid tag is more appropriate for ws-pass, Consider the followi...

Consider the following case study: In order to avoid criticisms of their existing manned road-toll payment system on its private road, WS-Pass has decided to adopt an automated

Write a note on digital signature, Question 1 Explain the types of threats...

Question 1 Explain the types of threats (Attacks) Question 2 What are the Characteristics of Good Encryption Technique? Question 3 Write a note on Digital Signatur

Packet filtering firewall, Packet Filtering Firewall Packet filtering i...

Packet Filtering Firewall Packet filtering is a network security mechanism that works by controlling what data can flow in and out of the network. The basic device that interco

How Ethical are Major Internet Companies?, Ask question #MHow Ethical are M...

Ask question #MHow Ethical are Major Internet Companies?

Calculate the false rejection, Divide the user data into 6 equal sets. Use ...

Divide the user data into 6 equal sets. Use the first set for the enrollment phase of your system, and the rest for the verification phase. Use the following formula to calculate t

Discuss five alternative testing techniques, QUESTION Testing of a Busi...

QUESTION Testing of a Business Continuity Plan (BCP) does not need to be costly or to interrupt the daily operations of the business. The result of the test should also be look

Issue specific security policy, Why an organization need the issue specific...

Why an organization need the issue specific security policy

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd