ABSTRACT

As demonstrated in previous chapters, the concept of hacking covers a wide range of activities associated with accessing computer resources belonging to a third party without authorisation.

All offensive uses of ICT in order to harm, degrade, inhibit, disrupt, deny, or destroy ICT resources are classified as cyberattacks. Cyberattacks are computer-driven attacks committed through cyberspace against targeted systems.