Cyber Threats: Motives And Attacks Part 1