Some hackers break into or disrupt a system for the fun or challenge, but most have a strong motive for doing it. This section gives an overview of the problems a cyber attack can have on the victim.
Data Destruction

A person’s or businesses data is purposely deleted. This could be done manually by a hacker, or automatically by malware.
Why might someone want to do this?
- To damage a business or organisation by deleting important files.
- To cover their tracks after stealing or changing data.
Data Theft

Data, such as passwords; personal data; or business secrets, are stolen by an attacker.
Why might someone want to do this?
- To sell or use stolen data for profit.
- To blackmail or embarrass individuals or companies.
Denial of Service

A system is overloaded with useless requests, overwhelming it. Legitimate requests cannot be processed, so genuine users cannot use the service.
Why might someone want to do this?
- To damage a competitor
- To blackmail a business
An example of blackmail: Pay us or we will take your business offline, which will cost you even more money
Identity Theft

Someone uses another person’s personal information (e.g. name, address, or bank details) to pretend to be them
Why might someone want to do this?
- To open bank accounts, buy goods, or commit fraud in the victim’s name.
- To hide their real identity while committing other crimes.
Data Manipulation

Changing data to mislead others or produce false information.
Why might someone want to do this?
- To gain money, power, or advantage, such as changing sales figures or exam results.
- To spread false information to cause confusion or harm reputations.
Data Modification

Changing data on a system without the owner’s permission.
Why might someone want to do this?
- To commit theft or fraud (e.g. changing the amount of money in a bank account).
- To give themselves further access into a system (e.g. changing passwords or user permissions.
Misconception
Data manipulation and data modification are easily confused. Ensure you can fully describe the differences in an exam!
Data Manipulation
- Changing data to mislead others or produce false information.
- Often done with a long-term aim (e.g. changing a company’s figures in a financial report).
Data Modification
- Changing data on a system without the owner’s permission
- Often done with a short-term aim (e.g. changing a bank balance to withdraw money from an account).