• Seek to gain unauthorized access • Disrupt the Internet • Waste resources • Destroy integrity • Compromise privacy • Involves negligence