Chapter 8
The Cybercriminal’s Toolkits
8.1 Understanding the context
As demonstrated in previous chapters, the concept of hacking covers a wide
range of activities associated with accessing computer resources belonging to
a third party without authorisation.
All offensive uses of ICT in order to harm, degrade, inhibit, disrupt, deny,
or destroy ICT resources are classied as cyberattacks. Cyberattacks are com-
puter-driven attacks committed through cyberspace against targeted systems.
The impact of a cyberattack depends on its target and on how it functions.
The impact can vary innitely as a result of the precise nature of the target and
the abilities and the motivations of the cybercriminals. Some attacks consist
of hijacking or deceiving systems ...