Attackers motives behind the cyber attack, Computer Network Security

Assignment Help:

Attacker's Motives behind the Cyber Attack

Before adapting the necessary measures to deal with the problem, understanding and evaluating the blogger's psyche and his motivation to plan an attack will be a wise choice. This may help in identifying whether the blogger must be given a chance to explain his position before taking any legal action against him. It can also be determined whether any action by the company resulted in such a reaction by the blogger. Also, such situations can aidin preventing futureoccurrences and help in identifying tools that are used by bloggers. Most importantly, theexercise will help EZ identify what type of attacker the blogger can be classified such as:

• any freelance information broker
• the blogger could be an employee from any domestic or foreign competitor companies.
• intentionsof blackmailing EZ for money
• The blogger could be a hacker that may even attack the computer system for any malicious damage and other inappropriate reasons.
• The blogger could have an old conflict with the EZ which forced him to manipulate the information against their brand (Workman, 2010).

There is no denying in the fact that thrill-seeking teenagers, hackers and bloggers are still very common. However, this cannot be ignored that this field is now dominated increasingly by various professionals who master at stealing private information and data to sell. In fact it will be fair to say that individuals attack a computer since that is where the information lies. In today's extremely competitive and hi-tech business environment, company information possessesgreat value and can be used for both improving and destroying the image of any business. Teenagersare least likely to benefit from such a scenario and thisinvolvement will only point out to a familiar professional.Furthermore, if the patterns of bloggers are closely followed, then it will be found that he seems to be a professional in blogging and other associated areas that may include maintaining blogs and websites.

The blogger could be a disgruntled employee from the past is who can damage the systems or steal data for profit or revenge. However, the situation generally suggests that the attacker has an apparent grudge with EZ that took place years ago in an argument with a few of the company's principals. He is intention may be to gain a sense of control, power, revenge, and self-importance by successfully retrievingthe company's information and using it to disrupt activities and destroy The EZ Company's reputation.


Related Discussions:- Attackers motives behind the cyber attack

Audit or review of the information security issues, Using the selected appr...

Using the selected approach, you should then conduct an audit or review of the information security issues associated with the use of computing facility and report on the findings.

Network security, Network security has become much more complex than ever b...

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

Categories of controls-information security, Categories of Controls Cont...

Categories of Controls Controlling risk through mitigation, avoidance or transference is accomplished by implementing controls. There are 4 effective approaches to select the co

Traditional network design approach, Question: a) Give two reasons why ...

Question: a) Give two reasons why the building-block approach is favoured to the traditional network design approach. b) With reference to network monitoring parameters, dis

Complexity of network systems, Computer networks is a complex subject due t...

Computer networks is a complex subject due to the given reasons: MANY DIFFERENT TECHNOLOGIES EXIST: The first reason for the complexity of networks is that there are s

Ip datagram format, IP DATAGRAM SIZE:  Datagrams may have different si...

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

Architecture of www named world wide web, Write down short notes on the arc...

Write down short notes on the architecture of WWW which is World Wide Web. WWW which means The World Wide web or the web is a repository of information spread worldwide and rel

Explain belady''s anomaly, Belady's Anomaly Also known FIFO anomaly. G...

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

What is data spoliation, QUESTION (a) What do you meant by data spoli...

QUESTION (a) What do you meant by data spoliation? (b) Justify the following statement: "Disk imaging differs from creating a standard backup of disk." (c) Why do yo

What is the maximum achievable data rate, Question: a) How many bits pe...

Question: a) How many bits per second can be sent on a noiseless 4 MHz channel if four-level digital signals are used? b) If a binary signal is sent over a 3 KHz channel who

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd