Thursday, June 13, 2019
Attack Plan Essay Example | Topics and Well Written Essays - 1000 words
Attack Plan - Essay ExampleOne mortal thousands of miles away can wreak havoc on an entire company. Computer networks are vulnerable attack and it is wise to consider those weak points in magnitude to prevent attacks that can have disastrous consequences. This report will detail an attack plan on Goodwill Industries foreign. Background on Goodwill Industries International Goodwill Industries International is now a work wide organization that began as a grassroots effort aimed at providing underprivileged individuals with sustainable calling opportunities. Through a series of second hand stores and other facilities worldwide, this final stage has been made a reality. Goodwill depends on a done network in the millions worldwide in order to meet its financial obligations and to keep thousands of individuals employed. The organization now largely depends on the Internet for its elaborate system of financial donors, without which it would or so certainly struggle to exist. Possible Attacks As Goodwill must keep a system of donor records, these lists are readily available inside its network. We the part sites to be shut down, it would debilitate the organization, which in the end would prove quite costs. Financial information that is leaked, or that falls into the wrong hands, would wreak havoc on millions of donors worldwide. An attacker would likely first seek to gain access to donor databases (Bayrak, et al 71). They could in addition work to take Goodwill Industries International offline. Attackers can also infiltrate donor information with malicious code, which would disable the ability of the organization as a while to access valuable information. Without access to donor records, a charitable organization such as Goodwill would struggle to raise the needed financial capital it needs on a monthly basis. In addition, an attack that threatens the integrity of donor information will also be an attack on the trustworthiness of the organization. If individual donors can no longer tang that their information is safe with Goodwill, they will likely cease to give to the charitable organization. One goal of an attack of this magnitude would be that an individual or conference of people simply want to cause harm to the organization. This could be as a result of simple malicious behavior, or because the individual holds a spite of some sort against the company. In addition, accessing privileged donor information could destroy the integrity of the entire charitable industry concept worldwide. A secondary goal could be to actually use the personal information gained during such an attack to cause individual harm to a particular donor or host of donors. Social Engineering and Physical Security Social engineering could certainly give an attacker an avenue whereby contact with individual donors at Goodwill Industries International, tempt them to give more money to causes that are actually fictitious and non-existent. Phishing is one such stra tegy that could be utilized to trap users into giving their password information, aft(prenominal) which the attacker could easily gain access to privileged information (Mayur & Richards 69). This is a relatively simply strategy that Goodwill is particularly susceptible to. By creating a mirror image of the actual Goodwill site, donors could be tricked into thinking that the organization is actually asking for information when, in fact, it is the attacker that is seeking to steal their hush-hush information. In the end, social engineering
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.