DISCUSSIONAlthough a lot of literature has beenwritten about the technical aspects of securing a network, not much isavailable about who your enemies are and what motivates them to attack. Understanding the motivationbehind attacks can help organisations and understand more about the risks theyface so that they can tackle them. Often, attackers look at weaklysecured systems as bases from which to launch more sophisticated attacks.There are many ways of gainingfinancially from attacking computer networks. Hackers may be able to transferfunds out of as target account.
Hackers can reach their goal of infiltrating your finances in a fewdifferent ways. Other methods are more involved, such stealing corporatedocuments and selling them to competitors or hijacking data using encryptionand holding it for ransom.Somehackers use their ability to access and spread secretive information. This isanother way to undermine rivaling businesses. It is in the form ofinternational threats such as foreign governments or militaries aiming toundermine their enemies and they enjoy the risk of attacking.
These are some common types of hackers:-BlackHat always has malicious intention for intruding a network and these hackers break into secure networks to destroy, modify,or steal data, or to make the networks unusable for authorized network users.This hackers has also good knowledge in many hacking tools and know how toprogram hacking tools and utilize his skills for unethical reasons. WhiteHat also known as Ethical Hackers. They do it with permission from theowner of the system first, which makes the process completely legal. White hathackers perform penetration testing, test in-place security systems and performvulnerability assessments for companies. This hackers has deep knowledge inComputer Networking, Network Protocols and System Administration.
ScriptKiddies is someone who knows basic information about the operation ofcomputer systems and have their disposal a large number of effective easilydownloadable programs and tools hacking tools from internet written by otherhackers or security experts.Hacktivistsaremotivated by an active desire to cripple government control and censorship ofelectronic and web Technologies and engages in similar forms of disruptiveactivities to Political and social causes. Examplemotivatedcyber-attacks may be carried out by members of extremist groups who usecyberspace to spread propaganda, attack websites, and steal money to fund theiractivities or to plan and coordinate physical-world crime. the hacker to see every key that is selected whenthe user is typing in their passwords, etc.
It can also be done throughphishing or hacking into databases via Trojan Horse.