Provide an example based on your professional experience of what motivate hackers to attack computer networks? (See page 113)