This document outlines how criminals plan cyber-attacks, detailing three phases: reconnaissance, scrutiny of gathered information, and launching the attack. Cybercrime is characterized by unauthorized access to computer systems with the intent to cause harm, facilitated by malicious software. The increase in technology usage has complicated this issue, resulting in a rise in cybercriminal activity and victimization.