Tuesday, August 13, 2019
Hacker Target and Response Assignment Example | Topics and Well Written Essays - 1500 words
Hacker Target and Response - Assignment Example The principal objective of this paper is to identify the areas and the information that an attacker might want to obtain and the methods that they may employ in undertaking the criminal activity. The paper also seeks to highlight the possible damage that their activities may cause to the information system. It is also important to show the preventive measures and the appropriate responses towards the security threat. As said earlier in the paper, one of the probable offenders is an ex-employee of an organization. The reason for this is that the ex-employee might have negative motives of releasing sensitive information that could destroy the reputation of the organization. The primary objective of an ex-employee would be to revenge. Another area that could be attacked by the ex-employee is the financial security system. The offender could have an objective of crumbling the organizations financial stability. The terminated employee may also target the organizationââ¬â¢s foundational information, its economic weaknesses, production information and organizational information (Covaleski, 2013). There are multiple ways in which the terminated employee may use to hack into the companyââ¬â¢s information system. One of the ways is using other employees to obtain information; the other means they could employ is to use their knowledge of security passwords and access the organizationââ¬â¢s information system. A well-planned data security strategy alternatively posits the objectives of the information system of a business and formulates a plan to attain these goals (Dhillon & Backhouse, 2000). Any leakage of sensitive corporate information is a pragmatic basis of corporation collapse. Precisely the data system lacking a prolific information security is prospective to be a separate collection of check procedures that include numerous severe security threats. Information systems security policies at that instance may frequently be
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.