Direct attack is a hacker using a personal computer to break into a system. The hacker tries whether to cause trouble or to gain some important information from others.

Many international terrorist groups now actively use a computer the internet to communicate, and several may develop or acquire the necessary technical skills to direct a coordinated attack against computers.

Direct attacks originate from the threat itself. It would take the form of hacking into a computer system and rewriting or stealing information.

Another method of hacking is more concerned with attacking computer files and destroying modifying or extracting data. The hacker may want to plant false information to damage the company.

These types of hacking attacks may be less apparent to organizations, as they may not realize they have been a victim.

The impact of the attacks would be to publicize the hackers and destroy the credibility of the organization offering online services especially to current and future customers.

A cyber attack intended to harm the economy would likely target computers that operate the civilian critical infrastructure and government agencies.

It should also be remembered that hackers are available for hire on the open market and therefore their services can be easily acquired.

By actually hacking the data contained within the system, sales can be disrupted, or data altered.

The destruction of information denies everyone the use of information, Usually, destroying information makes it unavailable only temporarily, until it can be restored.

This would help to harm the organization’s effectiveness or allow frauds to take place. Cyber-terrorist attacks on commercial sites 

could easily damage users’ belief in secure transactions.

Overnight, the newly developed electronic commerce marketplace could disappear. However, not all hacking is undertaken with criminal intent although the act is a criminal offense.


If you like please share it