CURRENTLY ON AIR ⇒
  • JUZ A DAY (Daily Qur'an) - Local and International Recitors
    Wednesday, 12:05 pm - 1:00 pm
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Why Do Users Get Attacked – Part 2

Technology is growing every day, and as it grows, it transforms our digital world. Internet use is increasing exponentially, making us correspondingly more vulnerable to cyber-attacks. By learning how cybercriminals attack and how to secure our systems and data against those attacks, we will be able to minimize the risk of data breaches and the devastation they bring with them.

Before getting into how to secure data from breaches, we must try to understand the motives behind these attacks. By knowing the motives behind the attacks, it’s easy for cybersecurity professionals to secure the systems. The main motives for attacking an organization’s or individual’s computer are:

Disrupting a business’ continuity:
If a business is disrupted, it causes great harm to the organization in the form of lost profits, fraud, and damage to its reputation. And one way that has become common is through cybercrime.

Information theft and manipulating data:
Hackers take confidential information that they steal from organizations and sell it to individuals or groups on the black market. This sensitive and private information is very often at the core of the business` operations.

Creating chaos and fear by disrupting critical infrastructure:
Cyber terrorists attack a company or a government body to disrupt their services, doing damage that can potentially affect an entire nation.

Financial loss to the target:
Hackers attack an organization or business and disrupt their services in such a way that the target has to allocate substantial funds to repair the damage.

Achieving a state’s military objectives:
Rival nations continuously keep an eye on each other and sometimes employ cybercriminal tactics to steal military secrets.

Demanding ransom:
The hackers employ ransomware to block a website or servers, releasing control only after a ransom is paid.

Damaging the reputation of target:
The hacker may have personal reasons to attack an organization or individual so that their reputation suffers.

Propagating political beliefs:
Hackers may infiltrate websites to promote a certain political agenda, usually to sway voters to vote a certain way.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Your Body, Your Rules – Part 3

Your Body, Your Rules – Part 3

Small Steps to Better Health Your Body, Your Rules By now, you've heard the big picture. On Monday, we spoke about why small steps change everything. On Tuesday, we honoured World Health Day by connecting your personal health to global health. Today, we get practical....

read more
Your Health, Everyone`s Health – Part 2

Your Health, Everyone`s Health – Part 2

Small Steps to Better Health Your Health, Everyone`s Health Today, April 7th, people in nearly every country on earth are pausing to think about the same thing: health. Not just personal health — though that matters — but the health of communities, nations, and the...

read more
Why Small Steps Change Everything

Why Small Steps Change Everything

Small Steps to Better Health Why Small Steps Change Everything If you're like most people, the word "health" can feel heavy. It brings to mind things like strict diets, intense workouts, giving up foods you love, or making huge lifestyle changes that never seem to...

read more

Food Waste: The Hidden Crisis – Part 5

What a Waste! Food Waste: The Hidden Crisis This is our final day of Zero Waste Week, marking the International Day of Zero Waste. We've covered reducing, reusing, and recycling. Today, we tackle perhaps the most overlooked, most shocking, and most personal form of...

read more
Recycling: The Last Resort – Part 4

Recycling: The Last Resort – Part 4

What a Waste! Recycling: The Last Resort Earlier this week, on Monday the 30th of March, we observed the International Day of Zero Waste and are thus continuing our Zero Waste Week. We've talked about reducing — the most powerful tool we have. We've talked about...

read more
Reuse: Give Things a Second Life – Part 3

Reuse: Give Things a Second Life – Part 3

What a Waste! Reuse: Give Things a Second Life We are halfway through our Zero Waste Week, marking the International Day of Zero Waste. On Monday, we asked what waste is and why it matters. Yesterday, we talked about the most powerful tool in our toolkit: reducing...

read more

Subscribe to our Newsletter

0 Comments