Monday, April 29, 2019
Attack Plan Essay Example | Topics and Well Written Essays - 1000 words
Attack envision - Essay ExampleOne person thousands of miles away can wreak havoc on an ideal company. Computer networks argon vulnerable attack and it is wise to consider those weak points in order to check attacks that can have disastrous consequences. This report will detail an attack plan on thanksgiving Industries International. Background on free grace Industries International Goodwill Industries International is now a work round-eyed organization that began as a grassroots effort aimed at providing underprivileged individuals with sustainable employment opportunities. done a series of second hand stores and other facilities worldwide, this goal has been made a reality. Goodwill depends on a done network in the millions worldwide in order to meet its financial obligations and to musical accompaniment thousands of individuals employed. The organization now largely depends on the Internet for its elaborate system of financial donors, without which it would almost sure en ough struggle to exist. Possible Attacks As Goodwill must keep a system of donor records, these lists are readily available inside its network. We the donation sites to be shut down, it would debilitate the organization, which in the end would stand up quite costs. Financial development that is leaked, or that falls into the wrong hands, would wreak havoc on millions of donors worldwide. An attacker would likely first seek to gain access to donor databases (Bayrak, et al 71). They could overly work to say Goodwill Industries International offline. Attackers can also infiltrate donor information with malicious code, which would disable the capacity of the organization as a while to access valuable information. Without access to donor records, a benevolent organization much(prenominal) as Goodwill would struggle to raise the needed financial capital it unavoidably on a monthly basis. In addition, an attack that threatens the integrity of donor information will also be an att ack on the trustworthiness of the organization. If individual donors can no longer feel that their information is safe with Goodwill, they will likely cease to give to the charitable organization. One goal of an attack of this order of magnitude would be that an individual or group of people simply want to cause harm to the organization. This could be as a result of simple malicious behavior, or because the individual holds a grudge of about sort against the company. In addition, accessing privileged donor information could destroy the integrity of the entire charitable patience concept worldwide. A secondary goal could be to actually use the personal information gained during such an attack to cause individual harm to a particular donor or group of donors. societal Engineering and Physical Security Social engineering could certainly give an attacker an avenue whereby finish off with individual donors at Goodwill Industries International, enticing them to give more money to caus es that are actually sour and non-existent. Phishing is one such strategy that could be utilized to trap users into giving their password information, after which the attacker could easily gain access to privileged information (Mayur & Richards 69). This is a relatively simply strategy that Goodwill is particularly susceptible to. By creating a mirror image of the actual Goodwill site, donors could be tricked into opinion that the organization is actually asking for information when, in fact, it is the attacker that is seeking to steal their private information. In the end, social engineering
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.