Blocks access to key components of the network (ransomware) Installs malware or additional harmful software. Covertly obtains information by transmitting data from the hard drive (spyware) Disrupts certain components and renders the system inoperable.