ABSTRACT

For the organization to properly work with the consulting firm to develop a comprehensive plan for the test, it needs to have an understanding of the viable threats to the company, the know-your-enemy part. Not all hackers are the same and although you may think you can hide in the vast space of the Internet, the odds that you attract some form of attacker is high. I don’t care if you make hotdogs, beer, coat hangers, shoelaces, or those annoying little stickers on the edge of DVD cases, you will catch the attention of someone sooner or later; it’s inevitable. And for those who deal with money, valuable assets, proprietary information, or any other aspect of business that has obvious value, you have much more to worry about. Knowing the types of hackers out there will help in determining the best approach.