Reasons Why Systems Are Attacked

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/9

flashcard set

Earn XP

Description and Tags

Flashcards covering the motivations for cyber attacks and their impact on businesses.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

10 Terms

1
New cards

Fun/Challenge

Attackers may gain unauthorized access to systems without any intended goal, seeking personal satisfaction and the thrill of overcoming security measures.

2
New cards

Industrial Espionage

The act of stealing confidential data or intellectual property from rival businesses, sometimes conducted by government entities for competitive or strategic advantages.

3
New cards

Financial Gain

Motivation for an attack that involves direct or indirect theft of money or information, often through methods like ransomware.

4
New cards

Personal Attack

Attacks motivated by personal grudges, such as those conducted by disgruntled employees or individuals targeting groups due to ethical disagreements.

5
New cards

Disruption

Attacks aimed at interrupting an organization’s services for personal, political, or social reasons, often utilizing techniques like Denial-of-Service.

6
New cards

Data/Information Theft

The intention behind an attack to steal sensitive data, which can later be used for identity or financial fraud.

7
New cards

Impact of a Security Breach

The consequences of a cyber attack on a business, including data loss, damage to public image, financial loss, and potential legal action.

8
New cards

Data Loss

The result of stolen or corrupted data that can cause financial difficulties and harm a business's reputation.

9
New cards

Financial Loss

Losses incurred by businesses or individuals due to stolen money, reduced customer base, and the costs associated with a security breach.

10
New cards

Downtime

Period during which a system is unavailable, often due to attacks like malware or Denial-of-Service, leading to halted business operations.