Destructive behaviour

In this post I will talk about destructive behaviour in some cases of network vulnerabilities.

Among the destructive sorts of break-ins and attacks, there are two major categories.

Data Diddling.

The data diddler is likely the worst sort, since the fact of a break-in might not be immediately obvious. Perhaps he’s toying with the numbers in your spreadsheets, or changing the dates in your projections and plans. Maybe he’s changing the account numbers for the auto-deposit of certain paychecks. In any case, rare is the case when you’ll come in to work one day, and simply know that something is wrong. An accounting procedure might turn up a discrepancy in the books three or four months after the fact. Trying to track the problem down will certainly be difficult, and once that problem is discovered, how can any of your numbers from that time period be trusted? How far back do you have to go before you think that your data is safe?

Data Destruction.

Some of those perpetrate attacks are simply twisted jerks who like to delete things. In these cases, the impact on your computing capability — and consequently your business — can be nothing less than if a fire or other disaster caused your computing equipment to be completely destroyed.

Where Do They Come From?

How, though, does an attacker gain access to your equipment?
Through any connection that you have to the outside world.

As we know we cannot be protected from everything unless we disable all our connections and this has to do a lot with security AWARENESS. That means we need to be aware of the threads and risks. Morten Bo Nielsen once said:
” You have to decide on security level.”

P.S. It wasn’t easy to find info, even on Wiki answers the only thing said was “Go ask your parents.” Damn rude..

This entry was posted in IT Security, Week 17. Bookmark the permalink.

3 Responses to Destructive behaviour

  1. mbnielsen says:

    I don’t think Mr. Nielsen minds being quoted, but do you have a reference or link back your statement?

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s