Gain access and do nothing, then leave
Gain access and do nothing with data but implement some
methods to gain access at any time
Gain access and take over the system and deny privileged
user
’
s access
Gain access and implemented procedures that cause network
to fail or host to shutdown
Gain access and destroy or corrupt data