Why should attackers go through all of the trouble

Assignment Help Software Engineering
Reference no: EM131470426

Write a review on this article.

Social engineering is a very popular tool used by most cyber attackers today. The reason why cyber attackers use social engineering is that it is easier and more effective than trying to break the technology itself.

There is a saying in the military "work smarter not harder". Why should attackers go through all of the trouble of finding security holes in a system, and exploiting those holes, when they can drop a flashdrive and get complete access when an employee plugs it into their computer?

It requires far less work to rely on deception and errors then it is to find and exploit holes in software. When it comes to exploiting simple errors, it is often easier to clone a website and create a phishing scam than it is to collect sensitive data on the legitimate website. Someone might type in Amazin instead of Amazon, which turns out to be a phishing scam create to collect people's username and passwords. When educating Internet users, they should be told about phishing and cousin-name attacks. According to the textbook, "research has identified a common inability to distinguish legitimate domain names from those in cousin-name attacks or subdomain attacks" (Jacobsson, 2008).

There is an increase of punishments of cybercriminals around the world. In the United States, jail time is a legitimate punishment for certain crimes. In some places, an attacker can go to jail for six months to 5 years for illegally accessing a computer system. In the State of Connecticut there are five degrees of computer. 5th degree is a misdemeanor with up to 6 months in jail.

The damage is less than $500. A 4th degree is a misdemeanor with damage between $500 and $1,000 and up to a year in jail. A 3rd degree is a felony with damage over $1,000 and the punishment is up to five years in prison.

A 2nd degree computer crime results in up to 10 years in prison or over $5,000 in damage. Lastly a 1st degree computer crime results in 20 years in prison and requires damage over $10,000. These are pretty steep penalties for cybercrimes. If someone tries to hack someone else's Wi-Fi network for fun or knowledge without permission, they are committing a crime that they can go to jail for. As Chrisitans, we must be aware of things that are wrong.

We must be honest and do what is right. 2 Corinthians 8:21 states "For we are taking pains to do what is right, not only in the eyes of the Lord but also in the eyes of man" and 2 Timothy 2:15 states "Do your best to present yourself to God as one approved, a worker who does not need to be ashamed and who correctly handles the word of truth".

References Jakobsson, M., & Ramzan, Z. (2008). Crimeware: Understanding new attacks and defenses. Boston, MA: Addison-Wesley Longman, Inc. Johnson, R. (2015).

Security policies and implementation issues (2nd edition). Sudbury, MA: Jones & Bartlett Publishers. Reinhart, C. (2012, June 28). PENALTIES FOR COMPUTER HACKING.

Verified Expert

This assignment talks about cyber security. It also focused on cyber crime and issues. The government has to take productive actions for managing the issues. This assignment is prepared in MS word and it is about 250 words

Reference no: EM131470426

Questions Cloud

Find the volume of the solid : Find the volume of the solid that is interior to both the sphere S: x2 + y2 + z2 = 4 and the cylinder C: x2 + y2 = 2x.
Did smith commit larceny : Larceny. In February 2001, a homeowner hired Jimmy Smith, a contractor claiming to employ a crew of thirty workers, to build a garage.
Determine the confidence interval for survey : A survey of 127 patients in a particular hospital determined that 54% of them felt that they were receiving excellent care.
What is the sixth amendment : Trial. Robert Michels met Allison Formal through an online dating Web site in 2002. Michels represented himself as the retired chief executive officer.
Why should attackers go through all of the trouble : Why should attackers go through all of the trouble of finding security holes in a system, and exploiting those holes, when they can drop a flashdrive.
Demonstrate integration of mobile technology into curriculum : Demonstrate integration of mobile technology into curriculum projects. Create lesson plans that use mobile technology to attain required standards/objectives.
Argue for or against your own theory : Argue for or against a business decision, organizational plan, business philosophy, policy decision, or concept related to the MM Propositions.
Analyse importance of communication skills in the workplace : BIZ101- Business Communications Essay Assignment.
What are the two elements of criminal liability : Gavin, a fifteen-year-old student, was eating lunch on the grounds of a school. He threw a half-eaten apple toward the outside wall of a classroom.

Reviews

inf1470426

5/12/2017 5:01:46 AM

I simply needed to send you a snappy note to let you know what an awesome work you did on these model papers. I am greatly satisfied with your work and I welcome your level of exertion. Much obliged to you for all your diligent work!

len1470426

4/22/2017 5:53:39 AM

I have to write a review on this article. Social engineering is a very popular tool used by most cyber attackers today. The reason why cyber attackers use social engineering is that it is easier and more effective than trying to break the technology itself. There is a saying in the military "work smarter not harder". Why should attackers go through all of the trouble of finding security holes in a system, and exploiting those holes, when they can drop a flashdrive and get complete access when an employee plugs it into their computer? It requires far less work to rely on deception and errors then it is to find and exploit holes in software. When it comes to exploiting simple errors, it is often easier to clone a website and create a phishing scam than it is to collect sensitive data on the legitimate website.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd