Fandom

The IT Law Wiki

Attacker

32,181pages on
this wiki
Add New Page
Talk0 Share

Ad blocker interference detected!


Wikia is a free-to-use site that makes money from advertising. We have a modified experience for viewers using ad blockers

Wikia is not accessible if you’ve made further modifications. Remove the custom ad blocker rule(s) and the page will load as expected.

Definition Edit

An attacker is "[a]n entity that works against one or more privacy protection goals."[1]

Attackers' advantages in today's systems Edit

A number of factors in the current security environment provide would-be attackers with significant advantages over those trying to protect the large-scale networks and interconnected IT systems on which society increasingly depends. An attacker needs to find only one vulnerability; the defender must try to eliminate all vulnerabilities. Powerful attack tools, including automated tools for malicious actions, are now freely available for downloading over the Internet to anyone who wants them, and little skill is required to use them. The resources — including training and equipment — needed to launch potentially harmful attacks are not only readily available but relatively inexpensive compared to the costs of securing systems, networks, and information, and responding to attacks.

As a result, some classes of attacks can be initiated with little sophistication. Although these attacks are not generally significant threats to systems that are kept patched and well secured, they are effective against the many unpatched and poorly secured systems connected to the Internet, and contribute to a background level of ongoing malicious network activity. The automated tools that can be used by people with relatively little skill or knowledge continue to multiply, and are gradually increasing in capability in step with improvements in cyber security and information assurance technologies. Attackers also have the ability to exploit vulnerable third-party machines to launch their attacks.

Classes of attacks that require much greater expertise pose significantly greater threats. But while the sophistication required to mount such attacks limits them to a smaller set of adversaries, the capabilities of these high-threat adversaries also continue to advance. These trends offer a wide range of individuals and entities – from malicious hackers to nation states – the opportunity to support or directly engage in cyber attacks.

Source Edit

CSIA IWG, Federal Plan for Cyber Security and Information Assurance Research and Development 5-6 (Apr. 2006).


Cite error: <ref> tags exist, but no <references/> tag was found

Also on Fandom

Random Wiki