Politically Motivated Hacking: Consequences and Defense Evaluation

Verified

Added on  2023/06/11

|9
|3137
|159
Essay
AI Summary
This essay examines the increasing ramifications of politically motivated hacking, driven by the vast amount of information stored online. It delves into the motivations behind hacking, ranging from financial gain and political reasons to ideology and grudges, and explores the potential consequences, including damage to public perception, financial losses, and data breaches. The report further evaluates the effectiveness of current defense mechanisms against cybercrime, such as authorization protocols, updated operating systems, firewalls, intrusion detection systems, and access right management. It concludes by emphasizing the need for innovative and multi-layered defense strategies to protect against evolving cyber threats and maintain data security and confidentiality in cyberspace. Desklib offers a wide range of study resources, including past papers and solved assignments, to support students in their academic endeavors.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: Cybercrime
Cybercrime
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1 | P a g e
Table of Contents
Introduction...........................................................................................................................................1
Cybercrime............................................................................................................................................2
Motivation behind hacking....................................................................................................................2
The potential consequences of motivated hacking...............................................................................2
Current defence against cybercrime.....................................................................................................4
Conclusion.............................................................................................................................................6
References.............................................................................................................................................7
Document Page
2 | P a g e
Introduction
The potential ramifications of politically motivated hacking are increasing day by day
The reason of cybercriminal activities is that most of the information is stored online that has
opened doors for hackers to breach the network security Hackers try to access the data for
political or social reason They violate the confidentiality, integrity and security of data by
gaining access to the network Thus this report covers the reason why hackers are motivated
to perform such activities (Holt, Brewer and Goldsmith, 2018) The reason for hacking differs
from one person to other This report throws the light on cybercrime and the consequences of
hacking to the network Various issues have been discussed along with the defence policies
that are used presently to safeguard the system from all the cybercriminal activities This
report also covers the defences used to avoid cyber-criminal activities
Cybercrime
Cybercrime can be defined as a crime in terms of hacking, phishing or spamming
Various tools are used to commit offences Hackers try to access the personal information by
performing malicious activities They try to communicate to each other with the purpose to
leak the valuable data by performing illegal activities Criminals use various theories to relate
it to cybercrime by targeting to criminal attacks like denial of services, cyber stalking,
modification of information as well as many attacks They work on a theory to inject viruses
in the system or network to spread the malware and sensitive data on the network It is an
activity that is intentionally performed by criminals to harm an individual or group of
individuals Cybercrime may cause a huge loss to business as it effect the economy of an
organisation Hackers try to breakdown the statistics and the main reason behind their
hacking purpose is ransom, threats, political reasons, competition in the market, cyber war
and some other motivation Ransom is the main reason that affects the network and its
security They try to attack new users using new hacking strategies that motive behind this
could be financial, political and ideological Hackers design plans to stay longer and access
the information transparently
Motivation behind hacking
Hackers try to gain sensitive data by breaching the network and then motivated by
financial gain The motivation behind hacking is accessing the companies’ data so that their
strategies could be leaked They try to access the information to gain financial benefits or to
remove glitches or grudges with other businesses FIG that is fun, ideology and grudges is the
main factor that has motivated hackers Some of the hackers do not have any wrong intention
they just do to add security rules The first reason behind hacking is their hobby or interest to
destroy the security of the system (van and Leukfeldt, 2017) They try to hack the site by
bringing down its performance and spoiling its image Hacking is a political issue that aims to
undermine the enemy Hackers are a most significant threat that exists on a network
Document Page
3 | P a g e
The potential consequences of motivated hacking
The consequences of hacking have affected the public perception as the data stored on
internet is not secured which will spoil the good will of an organisation The increase in
hacking activities will lead to criminal issues (Hui, Kim and Wang, 2017) Hacking has a
negative effect on the environment as it will lead to loss of sale and add up additional cost
There are chances of data loss and might also leads to data distortion The effects of hacking
on an organisation affect it by much purpose like insubordinate, corporate espionage as well
as thefts The other consequences of cybercrime is interconnected cost of an organisation, if
the data is leaked then the organisation would suffer from loss of revenue (Broadhurst, et al,
2014) Hacking resolves around gaining information such as financial reports, business
strategies as well as sensitive operation They get to know the completive edge of an
organisation that can cause political issue in the business Risk of hacking affect the digital
network of business as it allows invalid users to access the data Hacking impact the
organisation in many ways as it breaches the security by leaking the sensitive data and risking
the privacy of data They impact the privacy of data which expose the user personal details,
credit card number, account details and software’s The impact of cybercrime affects the trust
issues on the network It is important to identify the thefts so that hackers do not cause any
damage to the credential data It is important to take care of such details so that security and
confidentiality of information is maintained (Kranenbarg, et al, 2017) Hackers sometimes
take the ability to access the email which leaks the private files and simply ruins the
confidentiality Hackers are the victims who spoil the website security of business They
simply leave the website in inoperable manner by destroying the data They copy the
signatures that pose up the risk for organisation by leaving the bugs which is not common
It can be taken as a political statement as hacker’s steal the data which is against
government laws and is treated as an illegal activity It is difficult to track the hackers thus
they future penetrate in the system and destroy the system The consequences of hacking
arise to the remote access of information They impact of cyber-crime increase cyber stalking
that is termed as online harassment Some of the software’s are used to disrupt the scenario of
network They just gain access to steal the information by damaging the present system The
main cause of cybercrime is people who try to access the data over the system
The potential consequences of motivated hacking is due to economic gain as third
party try to access the information by blackmailing and directly penetrating in the system
without any permission They break the system or network because of social or political
reason For gaining poetical knowledge hackers generally access the government bodies to
know their spectrum of working (Marsh, 2017) They act as a stereotype in the virtual world
as they try to gain all the sensitive information in the system The motivation of hacking
could be either good or bad The hackers could be either white hat hackers or black hat
hackers White hat hackers do not have any wrong motivation they are the experts that make
sure that security do not penetrate in the system They are the It experts that make sure that
technology and information is secured (Marcum, et al, 2014) The black hat hackers
intentionally create viruses to break the network They have the motivation to break the
system so that they could access the sensitive data The other motivation of cybercrime is
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4 | P a g e
espionage They do not try to gain the financial gain instead of that they desire to read the
sensitive information (Johnson, 2016) Spamming is the other way they use to create
inconvenience by adding unwanted content on the network
The main reason behind their hacking motivation is their curiosity to know the
personal information about others life They try to gain access by using digital platform and
target the audience They commit these attacks by perform bragging activities to access all
the personal data including account details or sort codes Retaliation is the other reason that
allows unwanted data to secure the devices (McMahon, et al, 2015) Thus it is important for
maintain security at cyberspace as most of the data of all the organisations are stored over a
network Thus it is necessary to secure all the data so that goodwill is maintained in the
market The data is secured by using proper encryption technique as they make sure that even
if data is leaked to some third part user they wouldn’t be able to access the data without the
access of secret keys Other measures are also taken like providing access rights and many
other techniques (Paul and Aithal, 2018) The policy issue covers that the right to access the
information should be given in appropriate manners so that no invalid users get the right to
access the information
Current defence against cybercrime
The defence against cybercrime requires innovative idea as such activities are
increasing day by day Cyber-attack impacts the organisation and also affects the economy of
the company Many defence tools are used to protect the system The current defence tools
include authorization, lack of knowledge, coercion, access control and many more The
person should be proper authorized to access the system, no unauthorised user should be
given right to access or modify the data If the information is access by some invalid user
there are chances that information would be leaked The other issue due to which cybercrime
rises is lack of knowledge (Rathore, 2015) Cybercrime can be generally fall into two
categories first covers all the traditional offences that are designed to record all the activities
so that in case of criminal activity proper measures could be undertaken Other than that there
are few steps that are taken to secure the system that is done by installing antiviruses and
keeping the system updated Firewalls help in securing the system as they safeguard the
network from all the vulnerable attacks Installing such firewalls provide a security to a
network (Han, et al, 2016) The operating system should also be kept updated so that all the
activities are controlled by the administrate that includes securing the private and sensitive
information The operating system should be of latest version so that there are no chances of
attacks as these tools provide automatic protection The current defence includes in the
motivation of finding the loopholes in the system so that measures could be taken Once the
loopholes are identifies some techniques are used like installing intrusion detection, keeping
information backup, and much more Intrusion detection is a tool that keeps track of the
entire network in the system and they give an alert or notification as soon as some breached is
found The signs of intrusion help in knowing the loopholes and future protection measures
are taken Additionally, information should be backed up regularly so that in case of loss of
data files or resources it does not cause any problem to the working of a business (Brown,
2015)
The access rights need to be designed properly so that there are no chances of data
leakage The current defence covers rules to provide access to information to valid user so
Document Page
5 | P a g e
there are no chances of vulnerabilities Access is highly restricted so that they do no harm the
business The organisations currently hire a security expert to deal with all the potential risk
and prevent them to penetrate in the system so that they do not cause any damage There are
few other precaution methods that are available like using an antivirus program to block all
the unwanted links (Holt and Bossler, 2014) This will assure that no vulnerabilities will exist
in the system The pop-ups that occur on the screen also needed to be avoided as they carry
viruses in them The defence strategies states that card details should not be shared on the
website nor should the confidential data are stored on the website to assure that data is not
disclosed The antivirus is used as it guarantees that the system would be protected from all
the attack The admin also watch the traffic to know that the irregularities of the site are
avoided The politically outcomes could likewise settled as it incorporate multi-layer
safeguard assurance to every one of the gadgets A portion of the security suite is Norton
Security Premium to guarantee that system is shielded from all the infections and dangers
because of web
Additionally there are various security suites that are available to protect the devices
from all the malware (Fell, 2017) The politically consequences could also resolved as it
include multi-layer defence protection to all the devices Some of the security suite is Norton
Security Premium to ensure that network is protected from all the viruses and threats due to
internet The current defence include that strong passwords need to be maintained so that
system remain locked and access through only valid users The social media is a platform that
provides a way to hackers to enter the system thus they need to be managed properly to avoid
all the cyber-criminal activities (Taylor, Fritsch and Liederbach, 2014) The home network
should also be secured by keeping all the data encrypted along with VPN
Document Page
6 | P a g e
Conclusion
From this report it can be concluded that cybercrimes are increasing day by day This
report throws limelight on cybercrime and how it has affected various organisations and they
affect market by such activities They relate cybercrime by criminal activities the main
motive behind hacking is violating the security, confidentiality and integrity of data Cyber-
criminal activity affects the growth and profit margins of an organisation They attack new
users on the system with the motivation to gain financial benefits and attack the ideology
used by business for their growth This report covers the short introduction of cybercrime and
how they have affected the security The main motivation behind hacking has been allayed I
the second section The motivation behind their hacking is leaking the companies data and
misusing it for financial benefits or fulfil personal grudges This report states that all the
hackers do not have a false intention some perform hacking activities just to look for the bugs
and to check if some hackers are silently accessing the data The potential consequences of
hacking have negative effect on the network and leads to data distortion They affect the
working by of company as it causes breaching of computer data and causing risk of privacy
of data It is important to resolve such issue by making sure access rights should be given to
only valid user This report also covers the defence that are undertaken to stop the cybercrime
and stop such activities to penetrate the system Thus it is important to follow steps to assure
that the information remains secured
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7 | P a g e
References
Ablon, L and Libicki, M (2015) Hacker's Bazaar: The Markets for Cybercrime Tools and
Stolen Data Def Counsel J , 82, p 143
Arief, B Adzmi, M A B and Gross, T (2015) Understanding cybercrime from its
stakeholders' perspectives: Part 1--attackers IEEE Security & Privacy, 13(1), pp 71-76
Bhargava, N and Kumawat, A (2015) Scenario of Cyber Crime in india-Threat to Persons,
Property and Government International Journal of Advanced Research in Computer
Science, 6(4)
Bossler, A M (2016) Cybercrime 3 research at the crossroads Cybercrime Through an
Interdisciplinary Lens, 26, p 37
Broadhurst, R , Grabosky, P , Alazab, M , Bouhours, B and Chon, S (2014) An analysis of
the nature of groups engaged in cyber crime, pp- 45-90
Brown, C S (2015) Investigating and prosecuting cyber crime: Forensic dependencies and
barriers to justice International Journal of Cyber Criminology, 9(1), p 55
Fell, J (2017) Cyber crime-History: Hacking through history Engineering &
Technology, 12(3), pp 30-31
Han, M L , Han, H C , Kang, A R , Kwak, B I , Mohaisen, A and Kim, H K (2016) WHAP:
Web-Hacking Profiling Using Case-Based Reasoning In Communications and Network
Security (CNS), 2016 IEEE Conference on (pp 344-345) IEEE
Holt, T J and Bossler, A M (2014) An assessment of the current state of cybercrime
scholarship Deviant Behavior, 35(1), pp 20-40
Holt, T J , Brewer, R and Goldsmith, A (2018) Digital Drift and the “Sense of Injustice”:
Counter-Productive Policing of Youth Cybercrime Deviant Behavior, pp 1-13
Hui, K L , Kim, S H and Wang, Q H (2017) Cybercrime deterrence and international
legislation: Evidence from distributed denial of service attacks Mis Quarterly, 41(2), p 497
Johnson, M (2016) Cyber Crime, Security and Digital Intelligence Routledge
Kranenbarg, M W , Holt, T J and van Gelder, J L (2017) Offending and Victimization in
the Digital Age: Comparing Correlates of Cybercrime and Traditional Offending-Only,
Victimization-Only and the Victimization-Offending Overlap Deviant Behavior, pp 1-16
Marcum, C D , Higgins, G E , Ricketts, M L and Wolfe, S E (2014) Hacking in high
school: cybercrime perpetration by juveniles Deviant behavior, 35(7), pp 581-591
Document Page
8 | P a g e
Marsh, D (2017) Are Ethical Hackers the Best Solution for Combating the Growing World
of Cyber-Crime? (Doctoral dissertation, University Honors College, Middle Tennessee State
University)
McMahon, R , Serrato, D , Bressler, L and Bressler, M (2015) Fighting cybercrime calls for
developing effective strategy Journal of Technology Research, 6, p 1
Paul, P and Aithal, P S (2018) Cyber Crime: Challenges, Issues, Recommendation and
Suggestion in Indian Context
Rathore, N (2015) Ethical Hacking and Security Against Cyber Crime i-Manager's Journal
on Information Technology, 5(1), p 7
Taylor, R W , Fritsch, E J and Liederbach, J (2014) Digital crime and digital terrorism Prentice Hall
Press, pp-90-110
van de Weijer, S G and Leukfeldt, E R (2017) Big five personality traits of cybercrime victims
Cyberpsychology, Behavior, and Social Networking, 20(7), pp 407-412
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]