Description
Since we know that this particular instance of the AppMaker implements a customer-facing store that processes financial transactions, how does that influence which threat agents may be interested in attacking it?
2)600 words
Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
Using Figure 5.4 as the target architecture, who are the threat agents who will be most interested in attacking Web applications created through AppMaker?
Explanation & Answer
There is the first part buddy check it and let me know
Running Head: APP MAKER THREAT TARGET
App Maker Threat Target
Student’s Name:
Institution Affiliation:
Date:
APP MAKER THREAT TARGET
2
App Maker Attacks
App Maker is a Google Cloud service that offers server service to an application
built but a developer and deployed on the platform. This is a fully managed serverless
application platform that supports popular development languages with management and
deployment configurations for the built applications. The developer therefore just adds the
code without the worry of managing the underlying infrastructure. The developer can use
the Cloud Monitoring and Cloud Logging to monitor the health and performance of their
app and the Debugger and Error reporting to diagnose and quickly fix bugs.
However, due to its functionality and the type of data it handles, App Maker can be
a target for cybercriminals. Since it implements a customer-facing store that processes
financial transactions, attackers will be motivated by the financial gain from a successful
attack. Monetary gain is one of the biggest motivations for cyber exploits, for this reason,
the App Maker will receive more attacks as hackers try to break in for the financial gain.
Still, on the nature of data, the hackers might be motivated by the amount of data available
on the server. Google Cloud App Maker hosts millions of data on their server, this means
if the cybercriminals successfully the server, then they'll have lots of data at their disposal.
That will motivate them to even invest more in the...