• Register

A tilt shifted space shooter set in an asteroid field. Fight ever increasing numbers of enemies and fire your thruster for high speed maneuvering. Collect fuel pods to power your thruster, and use time dilation to slow time to a crawl. Use this advantage to better attack and evade your enemies. Control the zoom of the camera with a button press to take a closer look or to get a wider view of your surroundings. And most important..Have Fun! This game is built to be, and is most fun when played with a gamepad or controller, but keyboard input is also fully supported.

Post feature Report RSS Hacktivism, Cyber Espionage, and Cyber War. The Rationales of a Hacker. #hackinggame

Some are in it for the money. Others are in it for the cause. Some are in it for the challenge, and others for the thrill. Some are in it for truth and justice, and still others have more sinister motivations. The rationales of a hacker are many, and equally numerous are the lucrative contract opportunities of prospective clientele. In an age where data is both our most valuable and most vulnerable asset, everyone has a motive. In this post, we will explore the rationales of a hacker.

Posted by on

In the world of Terminal Contract, one of the main sources of income will be carrying out contracts for a variety of entities with a variety of motivations, both inside and outside the technical limits of the law. The content of these contracts are as diverse as the employers reputations, and can range from activities such as Security Audits and Reputation Management to Data Breaches and State Sponsored Terrorism. Of course, a hacker’s own reputation within the realm they operate is also heavily dependent upon the employers they choose, as well as, the manner in which the objectives of the contract are executed.

header

Some are in it for the money...

Cyber Espionage

Cyber espionage is focused on gaining illicit access confidential information, typically held by a government or other organization. Carried out at the expense of the target, for the benefit of the employer and for the monetary compensation to the contractor, espionage objectives typically require the theft or destruction of private data.

Some are in it for truth and justice...

Cyber Security

Motivated to protect networks, systems, and data, those that pursue cyber security seek to expose vulnerabilities before they can be maliciously detected and exploited. Carried out at he expense of the employing contractor themselves, Security objectives typically require exposing the same vulnerabilities that are exploited to commit espionage.

Some are in it for the cause...

Hacktivism

Hacktivists are motivated by politics or religion, while others may wish to expose wrongdoing, or exact vigilante justice upon a person, organization,the government or foreign entity for a perceived injustice. Carried out at the expense of a somewhat questionable entity, for somewhat questionable motivations, for the benefit of somewhat questionable beneficiaries (including no one at all), Hacktivism objectives typically involve Reputation Management , Data Breaches, and Denial of Service(DDOS) Attacks.

And still others, are in it for more sinister motivations...

Cyber War

Cyber War objectives are typically highly sensitive and their details usually remain hidden as a state secret within the military or intelligence agencies of the nations involved(with rare exceptions). Carried out with the intent of inflicting damage to the economy, industry, government, and military, the nature of Cyber War objectives can only be guessed at. It is safe to assume they include activities such as the penetration of the protected systems and networks through which a nation's critical infrastructures operate.

Post a comment

Your comment will be anonymous unless you join the community. Or sign in with your social account: