What are we protecting
Security of an application entails protecting or conserving
- Accessibility and availability of web site
- Availability of its resources
- Usage of its resources
- Information and privacy
by mitigating any vulnerabilities of the application and its environment.
Modes of harassment
Non-mitigation of vulnerabilities will result in the following modes of harassment
- Debilitated access and availability of
- web site
- application
- services
- Resource intrusion
- Overwhelming or loss of control of resources
- Destruction of resources
- Hijacking and abuse of resources
- Information Intrusion
- Contamination of information
- Loss of information
- Loss of privacy
- Abuse of information
Consequences of Harassment
Harassment results in these archetypal consequences
- Financial loss
- of web resource owners
- of associated parties or users
- Loss of Confidence and Reputation
- Loss of user base
- Loss of assets
- Loss of strategic advantage and secrecy
- Violation of security, privacy, safety or lives for individuals or communities
Motivation for intrusion and harassment
Perpetrators are possibly motivated by
- Violence and terrorism
- Political or philosophical enstatement
- Targetted harassment and bullying
- Mischief and vandalism
- Hijacking to insert unauthorised advertisement, disinformation or propaganda
- Censorship
- Financial or asset self-enrichment
- Robinhood complex
- Psychopathic superiority complex and narcissitic tendencies
- Parkouristic challenge / Spiderman complex
No comments:
Post a Comment