Why Systems Are Attacked - Categories

Drag answers into the correct category. Once all of the answers have been categorised press submit to check your answers.

For Fun or for the Challenge
Industrial Espionage
Financial Gain through Extortion
Personal Attack
Disruption
Data and Information Theft
Reward

Answers
Hacktivists defacing a government website to protest a policy
Competitors conducting DDoS attacks to disrupt each other's online services
Organised criminals stealing credit card information from a retail database
Ethical hackers participating in a company-sponsored hacking event to improve system security
An individual spying on a former employer to provide confidential information to a new employer
A company hacking a competitor to steal trade secrets or new product designs
A disgruntled former employee launching a cyberattack to disrupt their ex-employer's operations
An individual targeting their former partner's business with malicious online activities
A skilled teenager hacking into a school's website to display a prank message
Security researchers finding vulnerabilities in software for bug bounties
Cybercriminals deploying ransomware to lock a company's data and demand payment for its release
Attackers threatening to leak sensitive data unless a large sum of money is paid
Hackers accessing personal information from a healthcare provider's system for identity theft
A hacker group infiltrating a well-protected corporate website to boast about their abilities
Log in or sign-up to access the categorising activity



Don't have a login?

You can still revise this topic