Access your Pro+ Content below.
The ideology of hacking
This article is part of the 13 August 2013 issue of Computer Weekly
Modern day information risk has evolved from amateur script kiddies, locked in their bedrooms at home seeking to outsmart their friends, to a highly organised and professional criminal activity. While the nature of the attacker has changed dramatically, has the victim’s response been adequate? We have previously spoken at length about the technical solutions necessary for a business to tackle that ever-increasing and evolving threat, but lately I have been thinking, "is that enough, or are other parameters as important?". In my view, to truly understand the threat you have to understand why a company could become a target. Why does the hacktivist community, even though their numbers swell and they become ever more organised in their operations, remain focused on targeting specific companies? Indeed, historic analysis suggests that there may be a number of indicators that point to why hacktivists undertake attacks on those specific companies and that, in many cases, it could be argued that the company itself is to blame. The ...
Access this CW+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Business skills are key components of any CISO says Paul Swarbrick, CISO at aeronautical information service, NATS
Business leaders need to be educated on the true threats their firms face and IT security professionals have to arm their executives with that information