logo

Information and System Security Assignment 2022

An assignment about the malware life cycle and a security breach involving online banking services.

10 Pages2522 Words12 Views
   

Added on  2022-10-11

Information and System Security Assignment 2022

An assignment about the malware life cycle and a security breach involving online banking services.

   Added on 2022-10-11

ShareRelated Documents
Running head: INFORMATION AND SYSTEMS SECURITY
INFORMATION AND SYSTEMS SECURITY
Name of the Student:
Name of the University:
Author Note:
Information and System Security  Assignment 2022_1
INFORMATION AND SYSTEMS SECURITY1
Table of Contents
Analysis of the motivations behind hacking and evolution.......................................................2
Analysis of evolution of hacking tools.......................................................................................3
Evaluation of malware cycle......................................................................................................5
Evaluation of moral issues related to white hackers..................................................................6
Integration of analysis and evaluation........................................................................................7
References..................................................................................................................................8
Information and System Security  Assignment 2022_2
INFORMATION AND SYSTEMS SECURITY2
Analysis of the motivations behind hacking and evolution
Attacks existing within the cyber world provided with a helping hand of causing $450
billion of damage to that of the economic conditions persisting within the global world
relating to the year of 2016 (Delfanti & Söderberg, 2015). This number has been predicted to
undergo much more increase as the technologies keep adding to the modern world.
However, the magnitude of this impact shall not be underestimated. The size of the
considering economies such as the likes of UAE or the Norway, which tends to make no
surprise to have a look at the organizations having put the major of the resources to shore up
the defenses working internally as well as the measures needed towards the reduction of the
threats.
Relating to our digitally world, which is connected by the means of the technological
innovations along with that of the Internet of Things as well as the lack of security being
upon the headlines belonging to the entire of the world. Attacks related to the security as well
as the breaches that occur with that of increasing the complexity along with the severity
(Söderberg & Delfanti, 2015). With the rise of the technology, the different methods for the
driving related to that of the cyber security attacks. The basic motivations provoking the
methods of hacking have been discussed below,
i) Curiosity- some of the hackers may opt for the trying of the hacking methods to
check the working or having an understanding of how a device works or how a
specific network works. Having this kind of a curiosity, the referred individuals
may utilize the technique of hacking every single mundane object because of the
fact that they can.
ii) Bragging- amateur hackers shall commit the acts of cyber-attacks for the prime
purpose of bragging (Reagle, 2019). Having an upper hand within their group of
Information and System Security  Assignment 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security and System Analysis 2022
|6
|1283
|12

Transcript PowerPoint Presentation 2022
|2
|469
|35

Russian hackers tracked the email system
|5
|1264
|19

Cyber Security PowerPoint Presentation 2022
|8
|761
|16

Hacktivism: A New Form of Hacking with Political Motives
|9
|2963
|30

Cyber terrorism Assignment 2022
|2
|570
|28