- Published: November 14, 2021
- Updated: November 14, 2021
- University / College: Northumbria University at Newcastle
- Language: English
- Downloads: 2
Hacker Motivation and Threat Mitigation Research
Hacker Motivation and Threat Mitigation
The modern world has provided the society with wide variety of convenience in every way possible. Everything was run in full automation scale. Because of the fact technological evolution allowed people to manage the majority of their living situations through computer there are also individuals who are using the same technology in committing crimes. The question here is what motivates a hacker to be engaged in such activity? One reason is to gain sensitive information, information is the dominating elements that can be obtained over the internet and by stealing them, and hacker gains a lot of advantage and opportunity to use stolen information for their own benefit. The nest motivation is to steal bandwidth, in this way thy can break the rules of limitation in using the internet. The third one is to distribute illegal contents, piracy is rampant in the internet and with the help of hackers, copyright contents can were made available to everyone unlimited. Lastly, is to increase search engine rankings, by doing so hackers gains the highest advantage of increasing visibility of their own websites making them very much prominent over other web services (Art. February 9, 2009).
Mitigation is the best way to control hacking; there are several ways to do so like spoofing threats, tampering threats, repudiation, and information disclosure, denial of service attack and elevation of privilege. In most cases of hacker attacks most organization follows one or more of the aforementioned mitigating actions whichever they feel would wok best for them (Baier, Dominick. N. D.).
References
Art. (February 9, 2009) Why Hackers Hack Websites. Web Retrieved March 1, 2012 from http://webhostinggeeks. com/blog/2009/02/05/why-hackers-hack-websites/
Baier, Dominick. (N. D.) Building Secure Distributed Applications with . NET Web Retrieved March 1, 2012 from http://www. leastprivilege. com/content/binary/PostCon. pdf