In this post I will talk about destructive behaviour in some cases of network vulnerabilities.
Among the destructive sorts of break-ins and attacks, there are two major categories.
The data diddler is likely the worst sort, since the fact of a break-in might not be immediately obvious. Perhaps he’s toying with the numbers in your spreadsheets, or changing the dates in your projections and plans. Maybe he’s changing the account numbers for the auto-deposit of certain paychecks. In any case, rare is the case when you’ll come in to work one day, and simply know that something is wrong. An accounting procedure might turn up a discrepancy in the books three or four months after the fact. Trying to track the problem down will certainly be difficult, and once that problem is discovered, how can any of your numbers from that time period be trusted? How far back do you have to go before you think that your data is safe?
Some of those perpetrate attacks are simply twisted jerks who like to delete things. In these cases, the impact on your computing capability — and consequently your business — can be nothing less than if a fire or other disaster caused your computing equipment to be completely destroyed.
How, though, does an attacker gain access to your equipment?
– Through any connection that you have to the outside world.
As we know we cannot be protected from everything unless we disable all our connections and this has to do a lot with security AWARENESS. That means we need to be aware of the threads and risks. Morten Bo Nielsen once said:
” You have to decide on security level.”
P.S. It wasn’t easy to find info, even on Wiki answers the only thing said was “Go ask your parents.” Damn rude..