Recognize The Attacker: It's Important
Recognizing the attacker is very important in case of cyber crimes. Because the attackers share motivations between themselves. No matter whoever the perpetrator is, a deliberate cyber attack can do the following damages:
1. Destroy an asset completely. That is the asset has no value in future.
2. Corrupt an asset. In this case, the worth and value of the asset is reduced.
3. Deny all kinds of access to an asset. That is the asset still exists, but is not attainable.
4. Leads to stealing of an asset. That is the inherent value of the asset is retained but its possession is changed.
Revenge, malevolence, greed or misguided intellectual challenge of creating chaos in the large networks can be a motivating factor for both outsiders and insiders. External attacks include offenders from outside. These offenders break into a victim's network for taking something of worth or for serving the purpose of "trojanising" the network. What is this "trojainising?" It is named for the virus Trojan horse. In this crime, the security measures of networks are compromised and the security tracking mechanisms/legitimate programs are modified for gaining unmonitored access in future. In such cases, the perpetrator's objective is to gain full control over the victim's network system so that unauthorized functions that are unknown to the owner can be executed. Here are some examples:
1. A highly rated e-commerce shopping cart developer is accused of building a backdoor software into the program that might provide him or the hackers full control of the server on which the program is installed. Such a shopping cart is the Dansie shopping cart. This shopping cart is used in more than 200 e-commerce sites. It is also recommended by some of the renowned web hosting firms. However the cart contains such programming codes that enable the author to potentially run any kind of command on the web server.
2. In the year 2000, a person was proved guilty in the federal court of Delaware. The person set off a computerized time bomb halting manufacturing of a high tech company. It led to a loss of about 10 million dollars.
In case of internal attacks, the attacks are perpetrated either by the employees of the organization or trusted associates who misuse their power and have unauthorized access to the organization's systems as well as facilities. Here are some examples of internal attacks:
1. Very recently, in New York, "Internet Trading Technologies Corporation's network was hacked and it was hacked by no outsider but by one of their employee. As a result, the business dealings were halted and it lasted for three days. It also had the potential to affect the large portion of the NASDAQ trades that were conducted by the company. But the attack was not sophisticated and the employee was traced. He was charged five years of jail stay.
2. The organizations need to be careful about the disgruntled employees. These employees can also create havoc in the networks of the organization. Recently, three electronic music stations, namely E101, Trance Invasion and Pro G had gone off the air after they were actually misplaced from the computer server where they were hosted. The whole procedure was performed by a former disgruntled employee.
http://www.criminalattorneyin.net/ is the resource for your ultimate criminal law solution.
ليست هناك تعليقات:
إرسال تعليق