{"id":372,"date":"2025-02-14T01:15:15","date_gmt":"2025-02-14T01:15:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/?page_id=372"},"modified":"2025-02-14T01:21:32","modified_gmt":"2025-02-14T01:21:32","slug":"journal-entry-5","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/journal-entry-5\/","title":{"rendered":"Journal Entry 5"},"content":{"rendered":"\n<p>I link the following from motives from most sense to least sense;<\/p>\n\n\n\n<ol>\n<li>For money \u2013\u00a0The\u00a0most\u00a0likely\u00a0motivation\u00a0of\u00a0cybercriminals\u00a0is\u00a0financial gain, as\u00a0in the article\u00a0of\u00a0spending\u00a0money\u00a0gained\u00a0through\u00a0hacking. Cybercrime\u00a0ishighly\u00a0lucrative,\u00a0hence\u00a0likely\u00a0to\u00a0be\u00a0their\u00a0motivation.<\/li>\n\n\n\n<li>Recognition \u2013\u00a0Hackers\u00a0also\u00a0hack\u00a0to\u00a0gain\u00a0recognition\u00a0in\u00a0their\u00a0groups. The article\u00a0of\u00a0cyberattacks\u00a0during\u00a0elections\u00a0indicates\u00a0that\u00a0hackers\u00a0gain\u00a0prestigethrough high-profile\u00a0hacks.<\/li>\n\n\n\n<li>Political \u2013 Hacktivism is a\u00a0new\u00a0trend,\u00a0whereby\u00a0hackers\u00a0hack\u00a0government\u00a0orbusiness\u00a0entities\u00a0for\u00a0political\u00a0motives. The article\u00a0of\u00a0young activists joining cyber\u00a0groups\u00a0indicates\u00a0political\u00a0motivation is high.<\/li>\n\n\n\n<li>Several\u00a0reasons \u2013 Hackers\u00a0use\u00a0multidimensional\u00a0motives\u00a0that\u00a0involve\u00a0financial,\u00a0political,\u00a0or\u00a0personal\u00a0motives,\u00a0such\u00a0as\u00a0in the article\u00a0of\u00a0varioushacker\u00a0motives.<\/li>\n\n\n\n<li>Revenge \u2013 Cyberattacks\u00a0also\u00a0happen\u00a0for\u00a0personal\u00a0motives\u00a0such\u00a0as\u00a0revenge\u00a0cases of revenge\u00a0porn\u00a0in\u00a0which\u00a0victims suffer\u00a0digital\u00a0abuse.<\/li>\n\n\n\n<li>Entertainment \u2013 Some hackers\u00a0hack\u00a0for\u00a0kicks,\u00a0such\u00a0as\u00a0in the LinkedIn data scraping.<\/li>\n\n\n\n<li>Boredom \u2013\u00a0Though\u00a0boredom\u00a0is\u00a0a\u00a0motivation\u00a0of\u00a0low-level attacks\u00a0or cyberbullying, it is\u00a0a\u00a0weak\u00a0motivation\u00a0compared to financial or\u00a0politicalmotives.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>I link the following from motives from most sense to least sense;<\/p>\n","protected":false},"author":30365,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/pages\/372"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/users\/30365"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/comments?post=372"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/pages\/372\/revisions"}],"predecessor-version":[{"id":377,"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/pages\/372\/revisions\/377"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/adryannasmithcyse201s\/wp-json\/wp\/v2\/media?parent=372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}