logo

Causes of Increasing Cyber Attacks: Political, Financial, and Personal Reasons

   

Added on  2023-05-30

4 Pages761 Words333 Views
Running head: COLLEGE READING AND WRITING
College Reading and Writing
Name of the Student
Name of the University
Author Note
Causes of Increasing Cyber Attacks: Political, Financial, and Personal Reasons_1
1COLLEGE READING AND WRITING
Introduction
The purpose of the following essay is to determine the causes for the increasing
rates of the cyber attacks in the countries. The political and financial reasons have been
some important reasons for these cyber attacks. It has to be decided whether “almost
all cyber-attacks today are motivated by personal, financial, or political reasons”.
i.
The modern society is much vulnerable to the cyber attacks nowadays. This is
why the people are not at all secure from the different attacks from the cyber security
systems indeed (Rid & Buchanan, 2015). The political reasons are indeed important
since the opposition parties in the modern society go on to hack the websites of the
ruling parties and steal the notable information. These political aspects have become
very much vulnerable as well as the threat from the international terrorist agencies. The
Internet of Things (IoT) has been an important aspect in this regard as well (Xia et al.,
2012). The system threats should be examined and anti-virus systems should be put
into practice indeed.
ii.
The financial aspects are very much important for the cyber attacks as well. The
modern retail market is very much dependent on online marketing through the e-
commerce platforms like Amazon. The customers have to make the payments through
the online payment modes (Rid & Buchanan, 2015). This is where the vulnerabilities
occur. Sometimes these payment modes are not at all secure. It has been seen several
times in the past that the payment has been made without any acknowledgement
Causes of Increasing Cyber Attacks: Political, Financial, and Personal Reasons_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mitigation Strategies for Distributed Denial of Service (DDoS) Attack
|7
|1857
|53

Securing PureLand: A Comprehensive Security Improvement Plan for a Wastewater Treatment Plant
|7
|1142
|351

Security Plan and Training Program Assignment 2022
|13
|2904
|5

Information System Security: Risk, Assets, Migrations and Vulnerabilities
|7
|1522
|302