Although a complete examination of every known computer attacker is far beyond the scope of this work, we can take a look at a few examples to outline the kind of knowledge about threats that is necessary to bring to an assessment.
This means that whatever security is put into place can and will be probed, tested, and reverse engineered. I always assume that the attacker is as skilled as I am, if not more so. Furthermore, there is a truism in computer security: “The defender must close every hole. The attacker only needs one hole in order to be successful.” Thus, the onus is on the defender to understand his adversaries as well as possible. And, as has been noted several times previously, the analysis has to be thorough and holistic. The attackers are clever; they only need one opportunity for success. One weak link will break the chain of defense. A vulnerability that is unprotected and exposed can lead to a successful attack
Briefly respond to all the following questions in 650 – 700 words. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
What are your thoughts on this topic? Also, please explain the three key attributes related to this subject.