Knowing the motivations of digital intruders helps you understand their behaviors, says Dr. Max Kilger, a social psychologist for the Honeynet Project. And understanding those behaviors can help you better protect your networks.
With this in mind, Network World dug into three real cases to analyze the attackers' behaviors and motivations. The incidents include an outsider attack on a financial institution, the rooting of an e-commerce hosting provider to heist credit card numbers and an employee copying a client database from a brokerage firm to take to a new job at a competitor.
Identifying what is common and what is unique about these attacks gives you information you can use to further your own protection, detection and forensics practices.
* Profile 1: The External Attack
* Profile 2: Credit Card Crooks
* Profile 3: Filching Files from Within
* Adrian Lamo: Profiling network administrators
* Meeces to pieces: What motivates the computer criminal
* Profiling defined