Thursday, August 30, 2012

System Penetration Motivation


Ø  Blackmail
Ø  Challenge
Ø  Competitive advantage
Ø  Curiosity
Ø  Destruction
Ø  Destruction of information
Ø  Economic espionage
Ø  Espionage gains
Ø  Exploitation
Ø  Illegal info disclosure
Ø  Intelligence
Ø  Monetary gain
Ø  Monetary payoffs
Ø  Multiple Motivations
Ø  Omissions
Ø  Perceived challenge
Ø  Personal ego
Ø  Rebellion
Ø  Revenge
Ø  Unauthorized data alteration
Ø  Unintentional errors
 

No comments: