Types of Attackers
- Organized crime groups realize that computer crime can be lucrative: their motives may include fraud, extortion, money laundering, and drug trafficking, among other financial-related reasons. Furthermore, they often use the money they steal during cyberattacks to finance other types of crimes they engage in.
- Terrorists. The term terrorism is defined as bringing fear and damage to people amid ideological views. Terrorists may use a computer in several ways to accomplish their attack:
- Setting computers as targets of attack, such as when destroying power plant and hospital computers.
- Using computers as methods of attack, e.g. by writing a virus and running it on a victim's computer.
- Using computers as enablers of attack, e.g. to communicate and coordinate with other terrorists.
- Using computers as enhancers of attack, e.g. by recruiting additional terrorists to amplify the attack.
- Governments. As technology gets commonplace and many vital services and infrastructures increasingly depend on computers, governments realize the potential of using cyber-attacks for warfare and as a measure of defense from enemy countries. Governments, though, often avoid taking responsibility and keep such actions secret.