Cyber AttacksType of AttackDescriptionExampleMotivationWormsSelf-replicating malware that tries to spread throughout a network Conficker worm that affected Windows systems when the autoplay feature for CDs and DVDs was executed. This could have been spread through a hoax email. It slows down network traffic.Slow down the competitor's network. Allows attacker access to machine for future use, Could be used in conjunction with ransomware, which usually has a monetary motive.TrojansThe software which malicious but looks legitimate and performs a malicious function (Dobran, 2019). Storm Worm used by hackers in 2007 to click an email link to an article titled "230 dead as stormhits Europe." The attack affected 1.5 million gadgets and led to a loss of $10 billion. Trick the user to create a gateway into the network. Downloading or installing trojans allows a hacker to install malware designed to perform a particular activity. The motive is to damage the system of gain control.VirusesMalicious program or code that affects computer operations and spreads from one device to another (Dobran, 2019).