Motivations for Cyber Attacks: Personal, Financial, Political

Verified

Added on  2023/05/30

|4
|761
|333
Essay
AI Summary
This essay examines the motivations behind the increasing rates of cyber attacks, focusing on personal, financial, and political reasons. It discusses the vulnerabilities in modern society due to political rivalries, financial transactions via e-commerce platforms, and personal security breaches like password hacking and malware attacks. The essay highlights the importance of protecting data from hackers and suggests the need for robust security systems to counter these growing threats. It concludes that the increasing threats of cyber attacks have made security systems much vulnerable and there is a huge need for protecting the data from the hackers all over the world.
Document Page
Running head: COLLEGE READING AND WRITING
College Reading and Writing
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1COLLEGE READING AND WRITING
Introduction
The purpose of the following essay is to determine the causes for the increasing
rates of the cyber attacks in the countries. The political and financial reasons have been
some important reasons for these cyber attacks. It has to be decided whether “almost
all cyber-attacks today are motivated by personal, financial, or political reasons”.
i.
The modern society is much vulnerable to the cyber attacks nowadays. This is
why the people are not at all secure from the different attacks from the cyber security
systems indeed (Rid & Buchanan, 2015). The political reasons are indeed important
since the opposition parties in the modern society go on to hack the websites of the
ruling parties and steal the notable information. These political aspects have become
very much vulnerable as well as the threat from the international terrorist agencies. The
Internet of Things (IoT) has been an important aspect in this regard as well (Xia et al.,
2012). The system threats should be examined and anti-virus systems should be put
into practice indeed.
ii.
The financial aspects are very much important for the cyber attacks as well. The
modern retail market is very much dependent on online marketing through the e-
commerce platforms like Amazon. The customers have to make the payments through
the online payment modes (Rid & Buchanan, 2015). This is where the vulnerabilities
occur. Sometimes these payment modes are not at all secure. It has been seen several
times in the past that the payment has been made without any acknowledgement
Document Page
2COLLEGE READING AND WRITING
messages from the online payment platforms (Li et al., 2012). However the amount of
money has been debited as well. Apart from that it can also be given as an example
that sometimes the debit card users visit the ATMs and after using the ATM center their
money is credited even when they do not get the money. This can be termed as an
example of the cyber attack due to financial aspects (Von Solms & Van Niekerk, 2013).
iii.
The personal issues are the most severe ones in the context related to the cyber
attacks. The hackers have been very much active all over the world. The various
common kinds of cyber attacks are the hacking of the user passwords of individual
persons, service system of the big organizations, Man-in-the-middle attack, Drive-by
attack and several other kinds of attacks (Li et al., 2012). In the presence of all these
types of cyber attacks it must be said that the individual accounts in the social media
platforms, the e-commerce accounts and many other accounts. The various malware
systems will corrupt the websites as well. These things will surely be very much harmful
for the overall security of the individuals (Von Solms & Van Niekerk, 2013).
Conclusion
As per the above discussion, the paper can be concluded by saying the
increasing threats of the cyber attacks have made the security systems much
vulnerable. There is a huge need for protecting the data from the hackers all over the
world. This program will surely help to protect the data from the grasp of the hackers.
Document Page
3COLLEGE READING AND WRITING
References
Li, X., Liang, X., Lu, R., Shen, X., Lin, X., & Zhu, H. (2012). Securing smart grid: cyber
attacks, countermeasures, and challenges. IEEE Communications
Magazine, 50(8).
Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic
Studies, 38(1-2), 4-37.
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102.
Xia, F., Yang, L. T., Wang, L., & Vinel, A. (2012). Internet of things. International Journal
of Communication Systems, 25(9), 1101-1102.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]