Write an essay about various attacker motives, computer science homework help

User Generated

K0Znevn

Computer Science

Description

Write at least three pages paper in a memo format that you would submit to your CIO describing the various attacker motives for attacking information networks. You also must:

- Provide at least one example demonstrating how a particular virus has affected one or more organizations.

- Describe the essential elements of a good security policy for an organization.

Note:

  • The report should be Free of similarity and check the similarity before deliver.
  • should using the APA memo style.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached kindly find the assignment. in case of anything let me know

Running Head: INFORMATION NETWORKS

Information Network Security.
Student Name
Instructor
Course
Date

1

INFORMATION NETWORKS

2
MEMO

To: CIO
From:
Date: 02/05/2017
Subject: Information Network Security.
There are various reasons why attackers attack information networks. Establishing the
motives of such attacks is critical in being able to determine what the intent of the attacker
really is, and by so doing provide resources to protect an organisations network
(TrendMicro, 2015). First intent or motive is information theft or gathering intelligence.
Attackers are able to access organisational databases that contain information on customers,
intellectual property and information that is critical to the organisation’s operations. This type
of motive puts organisations or even individuals at the risk of being blackmailed or fraudulent
acts been performed by their attackers using the information attained. The second motive is
espionage, which is mainly in the corporate sector. This could involve stealing information
by the attacker that is considered fundamental to the security of the state and the target
organisation. The third motive is sabotage, which is mainly when the attacker ...


Anonymous
I was struggling with this subject, and this helped me a ton!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags