The attacks that we look at today are in one of three categories and have the following goals:
Prevent another user from using a network connection
Disable a host or service
Monitor traffic
The reasons for these goals vary:
Usually the prevention of network, host, or service usability is a result of some revenge.
Monitoring traffic usually has two eventual goals:
New compromised accounts from which attacks can be staged
Espionage of some type, resulting in embarrassment or blackmail