These actions typically consist of collecting information, modifyingdata integrity, or attacking the availability of services and devices, but thevictim system can also be used as a starting point for infecting other systemsor for expanding access to the local network.