Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (24.18 KB, 2 trang )
What Are the Motives?
There is no shortage of motives behind the threats that attackers come up with. Perhaps
the most dangerous motive is the conscious decision to break the law, typically in an
effort to gain some financial or monetary gain. Often, criminals develop attacks and
exploits with the sole purpose of gaining illegal access to systems, typically for the
p
urpose of monetary gain. This gain could come from obtaining personal information and
committing fraud with that information, gaining access to data and blackmailing the
victim into paying for that data, or stealing trade secrets from a competitor's system or
undermining the financial stability of the company.
A less-driven, but still dangerous motive is the simple desire to cause mischief and wreak
havoc on an environment. Mischief covers everything from bored teenagers looking to do
something they consider exciting and interesting, to the disgruntled ex-employee who is
j
ust looking to cause trouble for his former employer. One of the most difficult aspects of
attackers motivated by mischief is that often the attacks they engage in have logical
reason, especially if the attacker falls into the category of the bored person just looking
for something interesting to do. Many times, their attempts at what they consider
mundane and harmless activities can inadvertently cause significant problems or outages.
Many virus writers fall into this category, not realizing just how much damage their
innocuous virus can cause if someone is able to modify it slightly.
Another angle for motivation is simple ego. Attackers are convinced that they are smarter
than you, the defender, and an easy way to prove it is to compromise the system. They
can then run off to their chat rooms and brag about how they were able to get the best of
the company they targeted.
However, the most troublesome motive comes from attackers with multiple motives. In
this case, the attacker is frequently so driven by boredom, ego, and criminal behavior that
nothing short of legal intervention can stop the attacker. Indeed, a number of attacks that
may have started as untargeted attacks against an environment have escalated with bad