Types of Attackers

  1. Organized crime groups realize that computer crime can be lucrative: their motives may include fraud, extortion, money laundering, and drug trafficking, among other financial-related reasons. Furthermore, they often use the money they steal during cyberattacks to finance other types of crimes they engage in.
  2. Terrorists. The term terrorism is defined as bringing fear and damage to people amid ideological views. Terrorists may use a computer in several ways to accomplish their attack:
    1. Setting computers as targets of attack, such as when destroying power plant and hospital computers.
    2. Using computers as methods of attack, e.g. by writing a virus and running it on a victim's computer.
    3. Using computers as enablers of attack, e.g. to communicate and coordinate with other terrorists.
    4. Using computers as enhancers of attack, e.g. by recruiting additional terrorists to amplify the attack.
  3. Governments. As technology gets commonplace and many vital services and infrastructures increasingly depend on computers, governments realize the potential of using cyber-attacks for warfare and as a measure of defense from enemy countries. Governments, though, often avoid taking responsibility and keep such actions secret.