2.7 Consider how an actor may carry out a cyber attack