friends may give respect
for the hacking achievment
distruption
attacks such as
Denial-Of-Service stop
websites working
viruses can slow down
computers and delte
files
financial gains
ransoms can be made
to prevent attacks
from happening
ransomware can be
used to encrypt a
computer until you pay
a payment is given to
carry out an attack on a
organisatioon
Industrial espionage
the aim is to find intellectual
property such as designs or
blueprints for products , business
stratagies or software source
code
personal attack
employees that are
unhappy might try and
attack the company
friends/family may attack each
other if upset over something
information/data theft
credit card and financial
details are stolen to gain
money
company information may
also be stolen
Malware
Malicious Software
This is an umbrella term given to software
that is designed to harm a digital system,
damage data or harvest sensitive
information.
Virus
A piece of malicious code that
attaches to a legitimate program.
It is capable of reproducing itself
and usually capable of causing
great harm to files or other
programs on the same computer
Worm
Similar to virus but unlike a virus it is a self
contained program. It is capable of spreading
on it own, without help from humans. Worms
get around by exploiting vulnerabilities in
operating systems and attaching themselves
to emails. They self replicate at a tremendous
rate, using up hard drive space and
bandwidth, overloading servers.
Trojan Horse
is a type of malware that
is often disguised as
legitimate software.