Menu

Why Systems Are Attacked - Categories

Drag answers into the correct category. Once all of the answers have been categorised press submit to check your answers.

For Fun or for the Challenge
Industrial Espionage
Financial Gain through Extortion
Personal Attack
Disruption
Data and Information Theft
Reward

Answers
An individual targeting their former partner's business with malicious online activities
A hacker group infiltrating a well-protected corporate website to boast about their abilities
A company hacking a competitor to steal trade secrets or new product designs
Ethical hackers participating in a company-sponsored hacking event to improve system security
Hackers accessing personal information from a healthcare provider's system for identity theft
An individual spying on a former employer to provide confidential information to a new employer
Security researchers finding vulnerabilities in software for bug bounties
Cybercriminals deploying ransomware to lock a company's data and demand payment for its release
Attackers threatening to leak sensitive data unless a large sum of money is paid
A disgruntled former employee launching a cyberattack to disrupt their ex-employer's operations
Organised criminals stealing credit card information from a retail database
Competitors conducting DDoS attacks to disrupt each other's online services
A skilled teenager hacking into a school's website to display a prank message
Hacktivists defacing a government website to protest a policy
Log in or sign-up to access the categorising activity



Don't have a login?

You can still revise this topic