CURRENTLY ON AIR ⇒
  • Busy buzzy Bees
    Friday, 1:30 pm - 2:00 pm
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Why Do Users Get Attacked – Part 2

Technology is growing every day, and as it grows, it transforms our digital world. Internet use is increasing exponentially, making us correspondingly more vulnerable to cyber-attacks. By learning how cybercriminals attack and how to secure our systems and data against those attacks, we will be able to minimize the risk of data breaches and the devastation they bring with them.

Before getting into how to secure data from breaches, we must try to understand the motives behind these attacks. By knowing the motives behind the attacks, it’s easy for cybersecurity professionals to secure the systems. The main motives for attacking an organization’s or individual’s computer are:

Disrupting a business’ continuity:
If a business is disrupted, it causes great harm to the organization in the form of lost profits, fraud, and damage to its reputation. And one way that has become common is through cybercrime.

Information theft and manipulating data:
Hackers take confidential information that they steal from organizations and sell it to individuals or groups on the black market. This sensitive and private information is very often at the core of the business` operations.

Creating chaos and fear by disrupting critical infrastructure:
Cyber terrorists attack a company or a government body to disrupt their services, doing damage that can potentially affect an entire nation.

Financial loss to the target:
Hackers attack an organization or business and disrupt their services in such a way that the target has to allocate substantial funds to repair the damage.

Achieving a state’s military objectives:
Rival nations continuously keep an eye on each other and sometimes employ cybercriminal tactics to steal military secrets.

Demanding ransom:
The hackers employ ransomware to block a website or servers, releasing control only after a ransom is paid.

Damaging the reputation of target:
The hacker may have personal reasons to attack an organization or individual so that their reputation suffers.

Propagating political beliefs:
Hackers may infiltrate websites to promote a certain political agenda, usually to sway voters to vote a certain way.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

The Spectrum of Advocacy – Part 4

The Spectrum of Advocacy – Part 4

The Conscientious Citizen Quick Recap - Information Hygiene in an Era of Misinformation In today’s fast-paced digital world, misinformation spreads quickly — often faster than the truth. Because of this, being a responsible consumer and sharer of information has...

read more
Localism in a Global – Part 2

Localism in a Global – Part 2

The Conscientious Citizen Quick Recap - The Ethics of Consumption The ethics of consumption asks us to recognise that every purchase we make has consequences for people, the planet, and future generations. Fast fashion, for example, offers cheap and trendy clothing,...

read more
The Ethics of Consumption – Part 1

The Ethics of Consumption – Part 1

The Conscientious Citizen The Ethics of Consumption: Understanding Our Moral Obligations as Consumers In a world where almost every product we desire is available at the tap of a screen, consumption has become one of the defining experiences of modern life. Yet behind...

read more
The Silent Warning Signs – Part 5

The Silent Warning Signs – Part 5

Diabetes: Beyond the Needle The Silent Warning Signs We Often Miss Diabetes is often called a silent disease because its early signs can develop slowly and go unnoticed for years. Many people discover they have diabetes only after complications arise — when vision...

read more
Movement Matter – Part 4

Movement Matter – Part 4

Diabetes: Beyond the Needle Movement Matters: The Power of Everyday Activity Physical activity is one of the most influential and accessible ways to protect the body from developing Type 2 diabetes and to support overall health. Although exercise is often associated...

read more
The Diagnosis Dialogue – Part 3

The Diagnosis Dialogue – Part 3

Diabetes: Beyond the Needle The Diagnosis Dialogue - The Day Your Life Splits into 'Before' and 'After'. There are moments in life that cleave our personal timeline in two. The moment before you hear the words, and the moment after. A diagnosis of diabetes is one such...

read more

Subscribe to our Newsletter

0 Comments