Appendix B: Motives, Goals, and Objectives of Malicious Attackers
There is a strong overlap between physical security and data privacy and integrity. Indeed, the goal of some attacks is not the physical destruction of the computer system but the penetration and removal or copying of sensitive information. Attackers want to achieve these goals for either personal satisfaction or for a reward.
Deleting and Altering Information
Malicious attackers who delete or alter information normally do this to prove a point or take revenge for something that has happened to them. Insider attackers normally act out of spite for the organization because they are disgruntled about something. Outsiders might attack just to prove that they can or for the fun of it.
Committing Information Theft and Fraud
Information technology is increasingly used to commit fraud and theft. Computer systems are exploited in numerous ways, both by automating traditional methods of fraud and by using new methods. Financial systems are not the only ones subject to