Information Technology Reference
In-Depth Information
ping) or many-to-one (e.g., distributed denial of service) or many-to-many (e.g.,
zombie attack on an IP address range). A ready supply of cyber-criminal tools and
information is available on sites like the following:
n
n
n
n
n
http://www.phrack.org/
http://www.iwar.org.uk/hackers/resources/harmless-hacking/index.html
http://www.infosyssec.org/
http://www.antionline.com/toplist.php
http://www2.packetstorm.org:443/
13.5.2.4  Computer, Interactive
Computer systems may facilitate interactive attacks where computer criminals
attempt security breaches in real-time. This type of attack is typically one to one
with respect to attacker to target. The attacker may adjust technique depending
on what is learned in real-time. Standard IA safeguards against known attack pat-
terns, scripts, or tools are a start. If the threat space includes known adversaries
with means, method, motivation, and mission for specific targets, you may justify
sophisticated IA safeguards to monitor for, detect, and respond to real-time interac-
tive attacks.
13.5.3
Adversary Motivations
Adversaries include hackers, computer criminals, terrorists, industrial spies, and
insiders. Motivation implies volition, which narrows threat sources to human
sources with malice. There are a plethora of computer crime motivations, ranging
from simple vandalism through information warfare and asymmetrical adversarial-
ism. Motivations include:
n
n
Computer criminal psychology
Personal
Monetary gain
Revenge
Disgruntled employees or estranged employees
Industrial
Corporate espionage
Competitive advantage
Political
Information warfare
n
n
n
n
Note: Use caution when accessing Web sites; simply accessing the site may expose your com-
puter to malware.
 
Search WWH ::




Custom Search