Вы находитесь на странице: 1из 8

Perpetrator Types

Group # 4
Member:
Manalang Edzel
Layug Tristan Jay
Olmedo Allan Ray
Dimabuyu Reymir
Yusi Mark Francis
Ocampo Nikko Paolo
Dungo Matthew Alain
Daluz Mary Hazel
Munoz Claudia
Classification of Perpetrators of computer crime

Type of perpetrator Objective Resource Level of risk Frequency


available to taking of attack
Perpetrator acceptable to
Perpetrator
Hacker Test the limits of Limited Minimal Medium
system and gain
publicity

Cracker Cause problems, Limited Moderate Medium


steal data and
corrupt systems
Insider Financial gain and Knowledge Moderate Low
disrupt company’s of systems
information and
systems passwords
Industrial Spy Capture trade Well-funded Minimal Low
secrets and gain and well-
competitive trained
advantage
Cybercriminal Financial gain Well-funded Moderate Low
and well-
trained

Cyberterrorist Cause destruction No Very High Low


key infrastructure necessarily
components well-funded
or well-
trained
HACKER

-Are individuals who test the limitations of systems out of intellectual


curiosity to see whether they can gain access and ho far they can go.

-not all people call themselves "hacker" break into systems or commit
computer crimes. Indeed, the term hacker originally meant anyone who
loved computing, and loved making programs. However, people who break
into systems who are belong to perpetrators also call themselves hackers and
they refer to their tools as "hacking programs" and "Hacking worksheets".

TWO KINDS OF HACKER

BLACK-HAT is a term in computing for someone who compromises the


security of a system without permission from an authorized party, usually
with the intent of accessing computers connected to the network.

WHITE-HAT is used for a person who is ethically opposed to the abuse of


computer systems.

CRACKER
- Break into other people’s networks and systems, deface web pages, crash
computers, spread harmful programs or hateful messages and write scripts
and automatic programs that let other people do this things.

-A person who engages in illegal or unethical circumvention of computer


security systems (through passwords, systems or security, or software)

INSIDER
- Are not necessarily employee; they can be consultants as well. Nor do they
need to be employees in IT-related positions; they may just be experience IT
users. Their risk tolerance ranges from low to high, depending on whether
they are motivated by financial gain, revenge on their employers or
publicity.

-An insider is a malicious hacker


Who is an employee or officer of a business, institution, or agency. The term
can also apply to an outside person who poses as an employee or officer by
obtaining false credentials.

INDUSTRIAL SPY
- Use illegal means to obtain trade secrets from the competitors of the firm
for which they are hired. They is a trade secret for their own benefit or for
the benefit of the other.

-Competitive intelligence uses legal information gathering techniques to


obtain information that is not available to the public.

CYBERCRIMINALS
- They hack into corporate computers and steal money, often by transferring
money from one account to another. Leaving a hopeless complicated trail for
law enforcement officer to follow.

- A person who gains illegal entrance into a computer system or who diverts
financial transfers into his or her own account.
CYBERTERRORIST

- Is someone who intimidates or coerces a government or organization to


advance his or her political or social objectives by launching computer based
attack against computers, network, and the information stored on them.

- Target’s computers and information technology, particularly via the


Internet, to cause physical, real-world harm or severe disruption.

As the Internet becomes more pervasive in all areas of human endeavor,


individuals or groups can use the anonymity afforded by cyberspace to
threaten citizens, specific groups (i.e. members of an ethnic group or belief),
communities and entire countries, without the inherent threat of capture,
injury, or death to the attacker that being physically present would bring.

Вам также может понравиться