Test

Submitted by: Submitted by

Views: 136

Words: 933

Pages: 4

Category: Literature

Date Submitted: 05/28/2013 03:42 PM

Report This Essay

Malicious Activity

Hank Johnson

Professor John West

CIS333 Network Security Fundamentals

February 3rd, 2013

Today I analyzed and assessed any potential malicious attacks that could occur. In this report you will see what I came up with. A network attack can be defined as any method, process, or means used to maliciously attempt to compromise network security.

There are a number of reasons that an individuals would want to attack corporate networks. The individuals performing network attacks are commonly referred to as network attackers, hackers, or crackers. A few different types of malicious activities that this network could see here; Illegally using user accounts and privileges, Stealing hardware, Stealing software, Running code to damage systems, Running code to damage and corrupt data, Modifying stored data, Stealing data, Using data for financial gain or for industrial espionage, Performing actions that prevent legitimate authorized users from accessing network services and resources, and Performing actions to deplete network resources and bandwidth.

A few reasons for network attackers attempting to attack corporate networks are listed here:

* Individuals seeking fame or some sort of recognition.

Script kiddies usually seek some form of fame when they attempt to crash Web sites and other public targets on the Internet. A script kiddie could also be looking for some form of acceptance or recognition from the hacker community or from black hat hackers. Possible motives for structured external threats include; Greed, Industrial espionage, Politics, Terrorism, Racism, and Criminal payoffs.

Displeased employees might seek to damage the organization’s data, reliability, or financial standing.

There are some network attackers that simply enjoy the challenge of trying to compromise highly secured networks’ security systems. These types of attackers simply see their actions as a means of exposing existing security vulnerabilities....