without the knowledge or consent of the owner of the equipment
main goal is usually to gather information that ranges from tracking the general movements and searches conducted by authorized users to copying and forwarding key documents or information that is saved on the hard drive or serve
This article goes in depth about the technology, hardware and software of cyber-attacks and discusses what is technically qualified as a cyber-attack and what isn't. It also discusses the different impacts that different attacks have and the different methods of attacking.
IMPACT --> Health / SOCIAL --> Privacy & Anonymity
Like all reputable social networking sites, Facebook complies with the Children's Online Privacy Protection Act (COPPA) by not allowing children under 13 to have accounts (COPPA does make provisions for accounts for children under 13 but imposes certain conditions including parental consent). The only way for this young man to obtain a Facebook account would be to lie about his date of birth.
Once on Facebook, anything a person posts can, by default, be seen only by his friends or people in his network. If Xavier's profile was available to additional people, it was because he changed his default privacy settings.
Update on number of servers the company has to run the massively popular social website, Facebook. It has been updated from the orginal 10,000 to an existing 30,000 servers. Facebook is also responsible of logging 300 million users data. Facebook gets about 25 terabytes of log data everyday.