Cyber threats 

The Information Systems Audit and Control Association identify and address many cyber threats that can cause malicious activity. Hacking can occur when an unathorized person gains access to information that is not supposed to be accessed from an comupter system or personal information. Most hacking incidents are made to be suspicious and intended to steal sensitive information such as financial documents and finance paperwork which can result to steal credit card information. Which lead to more serious problems in the further future for the victim such as losing personal money, disruption to businesses and spread of sensitive information each incident varies from how severe the event might be. There are different types of hackers like the cracker, ethical hacker and grey hat to name a few. The cracker hacker gain access of the computers network the motive of this type of hacker is to gain personal information like stealing money from online bank accounts and violate privacy rights of the victims. The ethical hacker cracking vulnerable passcodes and accessing crucial data for security reasons, these types of hackers are paid professionals. Grey hat access unathorized information but this type of hacker doesn’t have any intent to cause harm or damage. Another cyber threat is phishing which involves duplicating an already official website to scam for credit card information, banks are the targets for theses types of cyber threats. The attack is unexpected because it is disgusied as a real legit website and is trusted to put sensitive information such as credit cards and passwords. 

Hackernoon.com. 2021. What is Hacking? Common Objectives, Types, and How to Guard Against It | Hacker Noon. [online] Available at: <https://hackernoon.com/what-is-hacking-common-objectives-types-and-how-to-guard-against-it-ab99897ff00b> [Accessed 26 September 2021].

Services, P. and Security, E., 2021. What Is Phishing? Examples and Phishing Quiz. [online] Cisco. Available at: <https://www.cisco.com/c/en/us/products/security/email-security/what-is-phishing.html> [Accessed 26 September 2021].