CURRENTLY ON AIR ⇒
  • Highlights of the Days Programmes
    Saturday, 10:05 pm - 3:30 am
    [ - ]

feedback@radioislam.org.za

logo


((( Listen Live )))))
Radio Islam Logo


Why Do Users Get Attacked – Part 2

Technology is growing every day, and as it grows, it transforms our digital world. Internet use is increasing exponentially, making us correspondingly more vulnerable to cyber-attacks. By learning how cybercriminals attack and how to secure our systems and data against those attacks, we will be able to minimize the risk of data breaches and the devastation they bring with them.

Before getting into how to secure data from breaches, we must try to understand the motives behind these attacks. By knowing the motives behind the attacks, it’s easy for cybersecurity professionals to secure the systems. The main motives for attacking an organization’s or individual’s computer are:

Disrupting a business’ continuity:
If a business is disrupted, it causes great harm to the organization in the form of lost profits, fraud, and damage to its reputation. And one way that has become common is through cybercrime.

Information theft and manipulating data:
Hackers take confidential information that they steal from organizations and sell it to individuals or groups on the black market. This sensitive and private information is very often at the core of the business` operations.

Creating chaos and fear by disrupting critical infrastructure:
Cyber terrorists attack a company or a government body to disrupt their services, doing damage that can potentially affect an entire nation.

Financial loss to the target:
Hackers attack an organization or business and disrupt their services in such a way that the target has to allocate substantial funds to repair the damage.

Achieving a state’s military objectives:
Rival nations continuously keep an eye on each other and sometimes employ cybercriminal tactics to steal military secrets.

Demanding ransom:
The hackers employ ransomware to block a website or servers, releasing control only after a ransom is paid.

Damaging the reputation of target:
The hacker may have personal reasons to attack an organization or individual so that their reputation suffers.

Propagating political beliefs:
Hackers may infiltrate websites to promote a certain political agenda, usually to sway voters to vote a certain way.

ADVERTISE HERE

Prime Spot!!!

Contact:
advertisingadmin@radioislam.co.za 

Related Articles

Don’t Judge Me – Part 4

Don’t Judge Me – Part 4

The real Muslim Women Quick Recap – My Hijab, My Identity The Hijab is more than just a piece of cloth — it is a powerful symbol of faith, culture, and self-expression for many Muslim women. It reflects a deeply personal journey rooted in devotion to God, often...

read more
My Hijab, My Identity – Part 3

My Hijab, My Identity – Part 3

The Real Muslim Women Quick Recap – Hijab is My Choice Vs Hijab is Oppression The hijab is often misunderstood and politicized, viewed by some as a symbol of modesty and empowerment, and by others as a tool of oppression. It is important that we focus on that binary...

read more
Hijaab is my Choice – Part 2

Hijaab is my Choice – Part 2

The Real Muslim Women Quick Recap - Not Oppressed, Not Perfect, Just Human This Women’s Month, the theme “The Real Muslim Woman” aims to break down stereotypes and challenge the narrow narratives that define Muslim women in media and society. Too often, Muslim women...

read more
The Pressure on Muslim Women – Part 1

The Pressure on Muslim Women – Part 1

The Real Muslim Women The Pressure on Muslim Women to constantly prove they are either empowered or devout For far too long, the image of the Muslim woman has been shaped for us, not by us. In global media, political discourse, and even within our own communities,...

read more
12 Levels of Friendship – Part 3

12 Levels of Friendship – Part 3

Lifelong Friendships and Changing Life Stages INTERNATIONAL DAY OF FRIENDSHIP – 30 JULY Quick Recap – How Friendships Evolve Friendships change in nature and importance as we grow. In childhood, friendships are based on play and proximity, helping children learn basic...

read more

Subscribe to our Newsletter

0 Comments