![]() |
If the intruder achieves access, the next step may be accessing the company's resources for financial gain. The hacker may try to:
The hacker may later inform the site owners that their network has been compromised, tell them how it was done, and allow them to patch the holes. |