This document outlines the anatomy of cyber attacks including reconnaissance, attack purposes and examples. Reconnaissance aims to discover vulnerabilities without detection and includes examining open sources, internal information, dumpster diving and scanning networks. Attacks can be distributed denial of service, intrusions for persistent access like botnets, or targeted information theft from industrial or medical systems.