Discuss the seven different categories into which perpetrators of cybercrime and other intrusions fall.

What will be an ideal response?


Student responses will vary, but should be drawn from the following information from the text.

• The term hacker, although originally a complimentary word for a computer enthusiast, now has a derogatory meaning and refers to someone who accesses a computer or network illegally. Some hackers claim the intent of their security breaches is to improve security.
• A cracker also is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. Both hackers and crackers have advanced computer and network skills.
• A script kiddie has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often use prewritten hacking and cracking programs to break into computers and networks.
• Some corporate spies have excellent computer and networking skills and are hired to break into a specific computer and steal its proprietary data and information, or to help identify security risks in their own organization. Unscrupulous companies hire corporate spies, a practice known as corporate espionage, to gain a competitive advantage.
• Unethical employees may break into their employers' computers for a variety of reasons. Some simply want to exploit a security weakness. Others seek financial gains from selling confidential information. Disgruntled employees may want revenge.
• A cyberextortionist is someone who demands payment to stop an attack on an organization's technology infrastructure. These perpetrators threaten to expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization's network - if they are not paid a sum of money.
• A cyberterrorist is someone who uses the Internet or network to destroy or damage computers for political reasons. The cyberterrorist might target the nation's air traffic control system, electricity-generating companies, or a telecommunications infrastructure. The term, cyberwarfare, describes an attack whose goal ranges from disabling a government's computer network to crippling a country. Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.

Computer Science & Information Technology

You might also like to view...

Using a binary search, what is the maximum number of comparisons required to find a search key in a 31-element sorted array?

a. 4. b. 5. c. 32. d. 1

Computer Science & Information Technology

In US v. John Doe, evidence was thrown out of court because the defendant had been forced to reveal the password for an encrypted drive against his will. The judge in this case ruled that the defendant's right under ______________________ had been violated.

a. The Fourth Amendment b. The First Amendment. c. The Second Amendment d. The Fifth Amendment

Computer Science & Information Technology

A(n) ________ converts the flashes of light back into two voltages that can be used by a computer

A) laser diode B) photo detector C) electromagnetic wave D) repeater

Computer Science & Information Technology

You can use text within a formula

Indicate whether the statement is true or false

Computer Science & Information Technology