Information technology defense systems are now at greater risk. In the defense system it is usually prevented by looking at the type of attack. But it is far more difficult to figure out the type of attack in advanced quality information technology. How hackers attack cyber tactically if it is understood in advance, we can very easily put a guard on our defense system.
The cyber criminal community is ever changing. Once upon a time, they used their skills to run various experiments. Most of which had no specific goal, but now for the most part there is a specific purpose behind it. Currently, cryptocurrency is the center of attraction for cyber-criminals. For example,
3.A Comprehensive List of Cryptocurrency Exchange Hacks
In this case, some attackers attack to be financially viable and some attackers to perform politically motivated actions. This type of attack is known as hacktivism.
Recently cybercrime is used as a means to impose one's political ideology on others. But the use of cybercrime can never be a reasonable way to effect social and political change.
We have seen how to exacerbate public dissatisfaction, the use of cybercrime in the Iranian general elections in 2009 and the countless cybercrimes during Israel's invasion of the Gaza Valley. By the newspapers, we know that in the USA election, the foreign nation was attacking cyber. These politically motivated actions may go against or In favor of anyone, but they can never be good.
To keep up awareness against all types of cybercrime, today's first part of my series of blogs is here to help strengthen your own defense system. Your well-informed opinion and vote will encourage me to work.
Congratulations @alrashel! You received a personal award!
You can view your badges on your Steem Board and compare to others on the Steem Ranking
Do not miss the last post from @steemitboard:
Vote for @Steemitboard as a witness to get one more award and increased upvotes!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit