List and describe two motivations attackers have to attack a network.

What will be an ideal response?

Status-Some attackers attempt to take over computer systems just for the thrill of it. They like to count the number of systems they have accessed as notches on their belt.

Revenge-Disgruntled current or former employees might want to retaliate against an organization for policies or actions they consider wrong. They can sometimes gain entry through an undocumented account (back door) in the system.

Financial gain-Other attackers have financial profit as their goal. Attackers who break into a network can gain access to financial accounts. They can steal individual or corporate credit card numbers and make unauthorized purchases.

Industrial espionage-Proprietary information is often valuable enough that it can be
sold to competing companies or other parties.

Computer Science & Information Technology

You might also like to view...

Which is not true about PNG files?

A) They provide print-quality images. B) You can save any or all slides in this format. C) They use a lossless compression. D) They use a lossy format

Computer Science & Information Technology

Artwork on the bottom layer would be ____________________ the artwork on layers above it.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology