Site icon Eminence Papers

Security Concerns

Security Concerns

What are the different categories of cyber criminals and the motives they have to attack networks?

The two major classifications of cybercriminals include insider attackers and outside attacks. Examples of inside attackers include disgruntled employees and other employees who unintentionally commit cyberattacks. The classification of outside cybercriminals includes amateurs, hackers, and organized cybercriminals (Han & Dongre, 2014). Disgruntled employees can commit cybercrimes to gain revenge on the organization, while amateur cybercriminals, also known as script kiddies, can commit cyberattacks to display their skills. Hackers are motivated by various aspects, such as stealing confidential information in the system or even causing harm to the system (Han & Dongre, 2014). Organized attackers include a collection of cybercriminals such as hacktivists that compromise the security of a system to make a statement or even state-sponsored cybercriminals that aim at identifying security issues in government systems or even compromise the security of other government systems.

Which do you think are relevant for the bookstore? Explain how the targeted organization and its particular industry influence the likelihood of an attack.

The blackhat hackers are the most relevant cybercriminals that could have attacked the bookstore. Two main advantages hackers can gain from attacking a bookstore include stealing information for their financial gain and stealing confidential information to gain a business advantage (MacKinnon et al., 2013). Various confidential information can be found at the bookstore. An example is the credit card information of individuals as well as the personal information of the bookstore’s clients. Hackers can compromise the security of the bookstore’s system and gain unauthorized access to credit card information or personal information in the system.

Use a recent successful attack in the news to justify your response. What measures can be taken to prevent a similar attack on your customer?

An example of this is the cyberattack in 2019 that targeted online campus bookstores using a malicious script to obtain credit card information as well as the personal information of users in the United States and Canada (Bonderud, 2019). Recommended security measures to prevent such attacks include conducting a vulnerability assessment to identify any vulnerabilities in the system, patching the identified vulnerabilities, as well as educating the system users on how to avoid becoming victims of cybercrimes.

References

Bonderud, D. (2019, May 6). Targeted Magecart Attack Hits More Than 200 Online Bookstores. Retrieved October 06, 2020, from https://securityintelligence.com/news/targeted-magecart-attack-hits-more-than-200-online-bookstores/

Han, C., & Dongre, R. (2014). Q&A. What Motivates Cyber-Attackers? Technology Innovation Management Review, 4(10).

MacKinnon, L., Bacon, L., Gan, D., Loukas, G., Chadwick, D., & Frangiskatos, D. (2013). Cyber security countermeasures to combat cyber terrorism. In Strategic intelligence management (pp. 234-257). Butterworth-Heinemann.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Security Concerns

The CISO is chatting with your group about the huge influx of attacks the firewall logs picked up this week. One of the interns asks why anyone would want to attack a bookstore. Discuss why you think this is occurring based on your knowledge of network threats.

Security Concerns

Make sure to support your thoughts with resources, citing them in APA style.

Exit mobile version