Access over 20 million homework & study documents
search

20210203232122app maker threat agents

Content type

User Generated

Rating

Showing Page:
1/4
Running Head: APP MAKER THREAT AGENTS 1
App-maker Threat Agents
Student’s name:
Institutional Affiliation:
Professor:
Submission Date:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/4
Running Head: APP MAKER THREAT AGENTS 2
Possible Threat Agents for this type of System.
A system that is open to public internet traffic can be attacked continuously by hackers and
fraudsters trying to gain unauthorized access. The majority of these attacks are undirected or
untargeted. Moreover, the attackers are looking around the internet, trying to search for system
vulnerabilities in networks. Mostly, the attacks comprise of unsophisticated and automated
scripts attempting attacks against the systems. Criminal organizations or independent attackers
conduct these attacks.
The threat agents are interested in different types of cyber frauds. One of these attacks is the
denial-of-service attack (DoS), often accompanied by blackmail and extortion attempts.
Attackers who run botnets are mostly interested in the servers underlying web applications.
Besides, individuals selling illegal digital products such as pirated movies and software, target
web application databases to acquire illicit digital content (Yazbeck, 2019).
Consequently, if a website is not well secured, especially where financial transactions are
involved, a fraudster can illegally purchase goods for less or no price at all. Additionally, they
can steal products through warranty replacement. With a fake product warrant, victims can
deliver a product to the fraudster, and they resell it making high profits of up to 100%.
Moreover, the ultimate goal of each class of threat agents is financial reward. However, these
rewards may differ from machines and financial or personal data. Activist groups are another
form of threat. However, they are less likely to attack a neutral App-Maker. Their primary focus
is usually to attack companies perceived to take a political stand or a specific controversial
subject (Positive Technologies, 2019).

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/4

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 4 pages?
Access Now

Unformatted Attachment Preview

Running Head: APP MAKER THREAT AGENTS App-maker Threat Agents Student’s name: Institutional Affiliation: Professor: Submission Date: 1 Running Head: APP MAKER THREAT AGENTS Possible Threat Agents for this type of System. A system that is open to public internet traffic can be attacked continuously by hackers and fraudsters trying to gain unauthorized access. The majority of these attacks are undirected or untargeted. Moreover, the attackers are looking around the internet, trying to search for system vulnerabilities in networks. Mostly, the attacks comprise of unsophisticated and automated scripts attempting attacks against the systems. Criminal organizations or independent attackers conduct these attacks. The threat agents are interested in different types of cyber frauds. One of these attacks is the denial-of-service attack (DoS), often accompanied by blackmail and extortion attempts. Attackers who run botnets are mostly interested in the servers underlying web applications. Besides, individuals selling illegal digital products such as pirated movies and software, target web application databases to acquire illicit digital content (Yazbeck, 2019). Consequently, if a website ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Super useful! Studypool never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4