Attackers motives behind the cyber attack, Computer Network Security

Assignment Help:

Attacker's Motives behind the Cyber Attack

Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation to plan an attack will be a wise choice. This may help in identifying whether the blogger must be given a chance to explain his position before taking any legal action against him. It can also be determined whether any action by the company resulted in such a reaction by the blogger. Also, such situations can aidin preventing futureoccurrences and help in identifying tools that are used by bloggers. Most importantly, theexercise will help EZ identify what type of attacker the blogger can be classified such as:

• any freelance information broker
• the blogger could be an employee from any domestic or foreign competitor companies.
• intentionsof blackmailing EZ for money
• The blogger could be a hacker that may even attack the computer system for any malicious damage and other inappropriate reasons.
• The blogger could have an old conflict with the EZ which forced him to manipulate the information against their brand (Workman, 2010).

There is no denying in the fact that thrill-seeking teenagers, hackers and bloggers are still very common. However, this cannot be ignored that this field is now dominated increasingly by various professionals who master at stealing private information and data to sell. In fact it will be fair to say that individuals attack a computer since that is where the information lies. In today's extremely competitive and hi-tech business environment, company information possessesgreat value and can be used for both improving and destroying the image of any business. Teenagersare least likely to benefit from such a scenario and thisinvolvement will only point out to a familiar professional.Furthermore, if the patterns of bloggers are closely followed, then it will be found that he seems to be a professional in blogging and other associated areas that may include maintaining blogs and websites.

The blogger could be a disgruntled employee from the past is who can damage the systems or steal data for profit or revenge. However, the situation generally suggests that the attacker has an apparent grudge with EZ that took place years ago in an argument with a few of the company's principals. He is intention may be to gain a sense of control, power, revenge, and self-importance by successfully retrievingthe company's information and using it to disrupt activities and destroy The EZ Company's reputation.


Related Discussions:- Attackers motives behind the cyber attack

Ip address, How to find an ip address?

How to find an ip address?

Arp responses, ARP RESPONSES Let's search out how does a computer know...

ARP RESPONSES Let's search out how does a computer know whether an incoming frame have an ARP message. The type field in the frame header defines that the frame contain an ARP

Base lining-risk management, Base lining •    Organizations do not have ...

Base lining •    Organizations do not have any contact to each other •    No two organizations are identical to each other •    The best practices are a moving target •    K

Categories of controls-information security, Categories of Controls Cont...

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

Policy management-information security, POLICY MANAGEMENT Policies should...

POLICY MANAGEMENT Policies should be managed as they constantly change. Good policy development and maintenance make a more resilient organization. All policies undergo tremendou

Miss, You are an IT Security administrator in a banking organization. Your ...

You are an IT Security administrator in a banking organization. Your organization hired an outside IT firm to do a proof of Concept for new equipment which is a computer based syst

Determine the round trip time, QUESTION a) Determine the RTT (round tr...

QUESTION a) Determine the RTT (round trip time) between a client requesting a web page of 1024 bytes in size from an internal web server on a 100 Base-T Ethernet. Consider a o

Produce a pcap file from a wireshark capture, Question requires you to prod...

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the fram

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd