Final answer:
Hackers employ computer attacks and insider attacks to compromise systems and information. They use the data they steal for various malicious purposes, including financial gain and identity theft. To reduce hacking, organizations implement multiple cybersecurity measures and ensure proper staff training.
Step-by-step explanation:
Modes of Attack Used by Hackers
Hackers use a variety of methods to compromise systems and obtain unauthorized access to sensitive data. They often use sophisticated techniques to break into websites, lure individuals with phishing links, or exploit vulnerabilities in software. One of the primary modes of attack is a computer attack, which involves direct actions taken to disrupt, deny, degrade, or destroy information residing in computers or computer networks. An example of this would be a Distributed Denial of Service (DDoS) attack.
The second mode of attack is an insider attack, where someone with legitimate access, such as an employee, intentionally or unintentionally brings harm to the organization by leaking or mishandling data. In contrast, an external attack comes from individuals or groups without authorized access to the system they are targeting.
When considering the two modes of attack stated in the options, both computer attacks (Option 1) and insider attacks (Option 2) are valid. They can work independently or in combination to create a multitude of threats to an organization. Hackers can steal a wide array of data including personal information, financial data, and intellectual property. They may use this information for identity theft, financial gain, or to gain competitive advantages. To combat hacking, organizations can implement robust cybersecurity measures, employee training, and incident response plans to reduce the likelihood of successful attacks.