Hacking motivations and techniques

Assignment Help Basic Computer Science
Reference no: EM131639003

Hacking Motivations and Techniques

You are sitting on the balcony of a coffee shop in Paris enjoying a cup of coffee and decide to log into your favorite social media site to update your friends on your exotic vacation. You enter your name and password and are surprised when your login attempt fails. Thinking that you mistyped your password, you carefully re-enter it-only to be denied access to your account again. Not sure what the problem is, you click the link to reset your password. After resetting your password, you are able to gain access to your social media page and discover that your page has turned into a promotional site for some band named "Pixel the Pony." Your social media account has been hacked! It could have been hacked for fun, publicity, revenge, or any number of reasons. The hacker could be almost anyone. You likely will never know who hacked your account or why.

IT professionals can neither predict when the next attack will occur nor what the real motivations behind such an attack might be. Even when the best measures are employed, computer systems are vulnerable. For example, an IT department might be well prepared to defend against attackers trying to compromise their organization's financial servers, but insufficiently prepared to defend against nation states looking to steal intellectual property.

Understanding common motivations behind hacking is important. IT professionals can use these motivations to try to predict potential targets. For example, a disgruntled employee, motivated by revenge, might want to delete months of research data. Likewise, a hacker, motivated by publicity, might want to deface a Fortune 500 company's website. Knowing these common motivations, IT professionals might back up the research data multiple times daily and/or require supervisor authorization to delete data. In the case of the Fortune 500 company, they might change their web server's password daily.

To prepare for this Discussion, use the interactive media Simulated Network Attack, located in this unit's Learning Resources. Also, find two recent news events that you believe are hacking-related and analyze them for possible motivations and techniques.

By Day 4, Explain why you have concluded these motivations are hacking-related and what techniques might have been used to exploit the vulnerabilities. For one of your news events, explain which Simulated Network Attack case it best matches.

Reference no: EM131639003

Questions Cloud

Discuss differing learning styles : Think back to the methods of instruction that you received in high school and your undergraduate nursing education
What is the break-even point per month in sales dollars : Lake Stevens Marina has estimated that fixed costs per month are $350,000, What is the break-even point per month in sales dollars
How could saudi arabia promote interest of the islamic world : How could Saudi Arabia, Turkey and Indonesia promote the interest of the Islamic World within the G20?
Explain teachers dont fail students : the following statement in light of the shift from teaching to learning: "Teachers don't fail students; students fail themselves
Hacking motivations and techniques : You are sitting on the balcony of a coffee shop in Paris enjoying a cup of coffee and decide to log into your favorite social media site to update your friends
Develop analytical and critical thinking skills necessary : Develop the analytical and critical thinking skills necessary to make sound business and personnel decisions.
Explain profession-person, environment and health : This discussion considers the metaparadigm of nursing and the four concepts of the nursing profession-person, environment, health
How is the style of community supervision changing : How is the style of community supervision changing? Provide reasons why current supervision strategies are different from strategies that were used in the past.
Translating business goals to technical goals : To ensure network security, all communication between the devices and the lab gateway needs to be secure.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Project deliverable-project plan inception

This assignment consists of two (2) sections: a project introduction and a Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assig..

  What can be done to reduce the occurrence of bucket overflow

What are the causes of bucket overflow in a hash file organization? What can be done to reduce the occurrence of bucket overflow?

  Why program design is important

Why Program Design is Important? (Do Not Plagiarize) Answer the following questions: What is a program design? Why program design is important?

  Determine the ratings for the following products

Using the product evaluation list for computer products, determine the ratings for the following products: DOS, Windows NT, 98, XP, Unix, and Linux.

  Write the c statements that will cause all to be output

Write the C statements that will cause all 1's to be output on the upper four bits of Port H, and inverts the states of the lower four bits. Assume that all Port H pins are already configured as outputs.

  Write a tostring method for a binary tree of integers

Write a toString method for a binary tree of integers.

  What is a website goal

1. What is a Website goal, define how this will assist you in visitor engagement and why would you want negative goals? 2. Describe the five funnel shapes and give examples of what they mean.

  Resources to try at our institute jubail technical institute

Please let us access free resources to try at our institute Jubail Technical Institute (www.jti.edu.sa). If it is approved by higher managment later, we can have deal or an agreement with you for further course of action.

  Explain checksum detect all errors caused by odd number

Let the 32-bit hash function defined as concatenation of two 16-bit functions: XOR and RXOR. Will this checksum detect all errors caused by odd number of error bits? Describe.

  Assume that you are serving in the role of director of data

imagine that you are serving in the role of director of data center operations for your company which is currently

  What is the bandwidth when the request rate is 40 percent

How many stages of a multistage Omega network are necessary to interconnect 900 processors and 800 memories? What is the bandwidth when the request rate is 40 per cent? Make a comparison with a single stage cross-bar switch network.

  Executing edi for competitive advantage

If firm chooses to execute EDI for competitive advantage, how can it assure advantage will last?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd