This preview shows page 1. Sign up to view the full content.
Unformatted text preview: eeping their secrets secret, they have never had so many
entry points to the secrets that had to be controlled. Companies are still having a hard
time not only protecting their data in digital format, but defining what constitutes sensitive data and where that data should be kept.
NOTE In many countries, to deal more effectively with computer crime,
legislative bodies have broadened the definition of property to include data. As many companies have discovered, protecting intangible assets (that is, data, reputation) is much more difficult than protecting tangible assets. The Evolution of Attacks
About ten years ago, and even further back, hackers were mainly made up of people
who just enjoyed the thrill of hacking. It was seen as a challenging game without any
real intent of harm. Hackers used to take down large web sites (Yahoo!, MSN, Excite)
so their activities made the headlines and they won bragging rights among their fellow
hackers. Back then, virus writers created viruses that simply replicated or carried out
some benign activity, instead of the more malicious actions they could have carried out.
Unfortunately, today, these trends have taken on more sinister objectives.
Although we still have script kiddies and people who are just hacking for the fun of
it, organized criminals have appeared on the scene and really turned up the heat regarding the amount of damage done. In the past, script kiddies would scan thousands and
thousands of systems looking for a specific vulnerability so they could exploit it. It did
not matter if the system was on a company network, a government system, or a home
user system. The attacker just wanted to exploit the vulnerability and “play” on the
system and network from there. Today’s attackers are not so noisy, however, and they
certainly don’t want any attention drawn to themselves. These organized criminals are
after specific targets for specific reasons, usually profit-oriented. They try and stay under
the radar and cap...
View Full Document
This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.
- Fall '12