Who Might Attack a Computer System and With What Motive?
And as the world embraces more digital and hyperconnected components, the paths become more numerous for attackers to gain access to our most sensitive information.
In reality, it is difficult to assess the value of each asset; as we have seen, value can change depending on context, timing, and a host of other characteristics. Even harder is determining the impact of all possible threats. The range of possible threats is effectively limitless, and it is difficult (if not impossible in some situations) to know the short- and long-term impacts of an action. For instance, Sidebar 1-3 describes a study of the impact of security breaches over time on corporate finances, showing that a threat must be evaluated over time, not just at a single instance.
Different motivations and opinions have been discussed in this paper, but if we consider them as a person they are a live example of genius because of their abilities of doing the unbelievable and unachievable by getting more involved into the programming and understanding the loop holes in the security systems. I think because of these, scientists and researchers have spent lots of technology to improve the systems security and make them more secure so that no illegal access can be gained. In my own view understanding the different perspective of a hacker, we can develop a much more secure and much more sophisticated environment and provide a safer world for transactions and online shopping. The bad things of them should be taken into good only to benefit our country and its progress (Crucial paradigm (2003).
Banks, Michael A. (1997), ‘Web psychos, stalkers, and pranksters: How to protect yourself online’. Arizona (USA).
Chakrabati, Anirban and Manimaran, G. (2002), ‘Internet infrastructure security: A Taxonomy’, IEEE Network, November/December 2002, P.13.
CNET (2001), FBI “hack” raises global security concerns
Crucial paradigm (2003), Hacking attacks-How and Why.