10 May 2022

391

Motivations of Threat Actors

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 322

Pages: 1

Downloads: 0

Technology has not only had a positive outcome but it has also come with a myriad of challenges. Today, cyberattacks are a common occurrence which are a threat to many stakeholders on different technological platforms (Markoff, 2008). Several motivators contribute to individuals perpetrating cyberattacks. Whether directly or indirectly, patriotism, economic poverty as well as political activism are some of the factors that fuel the above vice. Regardless of the intention that the perpetrator has, the above undertaking, in most cases is viewed as negative and it is highly prohibited by the laws of different countries.

Patriotism pushes individuals to act in ways that portray their love for their nation. The above can propagate cyberattacks by influencing a perpetrator to illegally attain information regarding another nation troops or government (Yadav, Piyush, & Gupta, G2013). The above information, which can mostly be used in intelligence-related research can then be retrieved in the above manner to help the perpetrator in his or her plans against a particular country or military base. Regardless, the approach is illegal.

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Widespread economic poverty that affects masses could influence individuals to engage in cyberattacks to illegally get finances by duping individuals online to provide their finance-related details, hacking bank accounts among others (Amoroso, 2012). The above is mainly achieved by the attacker sending a malicious malware that when the target individual receives, his or her information is anonymously retrieved with a malicious aim.

Political activists can maliciously access government software to get information that might not be available to the general public. They use the above against or to support several initiatives put in place by the government in question. Extremists majorly act in the above manner to spread propaganda against their enemies (Gandhi et al., 2011).

Cyberstalking or cyberbullying negatively influences the person who is the target. It does not only affect his or her esteem, but it can escalate to levels that are detrimental to one's health. In such instances, aspects such as depression might be common, leading one to think of negative undertakings such as suicide (Hinduja, Sameer & Patchin, 2010).

 References

Amoroso, E. (2012). Cyber attacks: protecting national infrastructure . Elsevier.

Gandhi, R., Sharma, A., Mahoney, W., Sousan, W., Zhu, Q., & Laplante, P. (2011). Dimensions of cyber-attacks: Cultural, social, economic, and political. IEEE Technology and Society Magazine , 30 (1), 28-38.

Hinduja, S., & Patchin, J. W. (2010). Bullying, cyberbullying, and suicide. Archives of suicide research , 14 (3), 206-221.

Markoff, J. (2008). Before the gunfire, cyberattacks. New York Times , 12 , 27-28.

Yadav, P., & Gupta, G. (2013). Depleting Clouds. International Journal of Engineering , 2 (4).

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Motivations of Threat Actors.
https://studybounty.com/motivations-of-threat-actors-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Technology

Implementation Roadmap

AT&T is a telecommunication company that has a platform for selling phones and provision of internet and other services. Implementation of big data analytics in the company requires the completion of a particular...

Words: 545

Pages: 2

Views: 70

17 Sep 2023
Technology

Big Data in Fraud Detection: How It is Used and What to Expect

Chameleon Carriers The replication of trucking companies and trucks under different business names has grown rampant, as the Federal Motor Carrier Safety Administration (FMCSA) program reports. A large...

Words: 508

Pages: 2

Views: 437

17 Sep 2023
Technology

The 5G Networks: How They Work, and What They Mean for the Future

The world of technology is rapidly developing with the reliance of the internet at its core. 4G has been the primary platform of the internet but based on the slow speed, and the high dependence of technology has led...

Words: 284

Pages: 1

Views: 112

17 Sep 2023
Technology

How to Write a Successful Business Case

A successful business case is based on a need. One of the most disturbing problems in the health sector is cybercrime. We intend to develop a strategy that will leverage IT-based techniques and measures to reduce...

Words: 263

Pages: 1

Views: 63

17 Sep 2023
Technology

The 5nm Transistor: The Future of Computing

The November 16th, 1904 invention of the vacuum tube was the humble beginning of the modern-day transistor. The first working transistors were developed at Bell Labs by William Shockley, John Bardeen, and Walter...

Words: 2221

Pages: 4

Views: 55

17 Sep 2023
Technology

Wireless Communication Technologies

Wireless communication taken analogically simply refers to the channel of telephony communication that does not apply the use of wires (Bose, 2010) . Such a channel makes use of electromagnetic waves available in the...

Words: 1046

Pages: 4

Views: 159

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration