Motivation behind Hacking Attacks essay
Since the Internet protocol suit was designed for the use of researchers in universities and in labs, the users were trusted parties and thus there are many vulnerabilities in the protocol suits that is being exploited by the hackers. Many different types of threats to the confidentiality, integrity and availability of electronically-stored information all exist …