Monday, May 13, 2019

Hacker Target and Response Assignment Example | Topics and Well Written Essays - 1500 words

Hacker Target and Response - Assignment showcaseThe principal objective of this paper is to identify the areas and the information that an attacker might want to obtain and the methods that they whitethorn employ in undertaking the criminal activity. The paper also seeks to highlight the possible damage that their activities may cause to the information system. It is also important to show the preventive measures and the appropriate responses towards the security threat.As state earlier in the paper, one of the probable offenders is an ex-employee of an organization. The reason for this is that the ex-employee might have negative motives of releasing medium information that could destroy the reputation of the organization. The primary objective of an ex-employee would be to revenge. Another area that could be attacked by the ex-employee is the financial security system. The offender could have an objective of crumbling the organizations financial stability. The terminated employee may also goat the organizations foundational information, its economic weaknesses, production information and organizational information (Covaleski, 2013).There are duple ways in which the terminated employee may use to hack into the companys information system. sensation of the ways is using other employees to obtain information the other means they could employ is to use their companionship of security passwords and access the organizations information system.A well-planned data security strategy alternatively posits the objectives of the information system of a business and formulates a plan to attain these goals (Dhillon & Backhouse, 2000). Any leakage of minute corporate information is a pragmatic basis of corporation collapse. Precisely the data system wanting(p) a prolific information security is prospective to be a separate collection of take for procedures that include numerous severe security threats. Information systems security policies at that instance may ofte n be

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.