To engage in malicious activity against networking and computing systems while being undetected by networking security hardware.