CYBERCRIME
CYBERCRIME
Or computer crime is any criminal offense that involves a computer and network.
It can take various forms including the creation of malicious programs, denial of service attacks,
rouge, wi-fi hotspots, data manipulation, identity theft, internet scams and cyberbullying
2. CRACKERS
- Hack into other peoples networks and systems to do things like deface websites, crash
computers, distributed malicious programs or hateful messages
3. MALICIOUS INISDERS
- Often granted access to the networks they misuse, they are difficult to track or avoid
4. INDUSTRIAL SPIES
- They procure trade secrets from their sponsor’s rivals by fraudulent means. Insiders such as
angry employers and ex-employees, are the most common thieves of trade secrets.
5. CYBER CRIMINALS
- Opportunity for materials to gain motivates cybercriminals. They rob by breaking into
company servers and converting funds from account to another, leaving a hopelessly
confusing path for law enforcement to trace.
6. CYBERTERRORISTS
- Advance such as political or social objectives, a cyber terrorist conducts a computer based
assault against other computers or networks in an effort to intimate or coerce a nation
CLASSIFICATION OF HACKERS
1. WHITE HATS HACKERS
- Ethical hackers
4. MISCELLANEOUS HACKER
- Types of hackers depending on what they hack and how they hack. The following are some
of them
a. RED HAT HACKER – combination of black and white hat hackers. They operate the level
of hacking government departments, top secret intelligence hubs
b. BLUE HAT HACKER – person who works independently of computer security consultancy
companies and is responsible for bug-testing
c. ELITE HACKER – hackers social standing that is used to identify the most experienced
hacker
d. SCRIPT KIDDIE – non-expert who breaks into computer systems using pre-packaged
programmed tools written by others and no knowledge of the underlying definition
e. GREEN HAT HACKER – newbie, someone who is new to hacking or phreaking and has
little to no understanding
f. HACKTIVIST – hackers who uses computers to spread a message that is psychological,
ideological, moral or governmental.
3. TROJAN HORSES
- Contains malicious code. Seen in free video games and screensaver applications that can be
downloaded from the internet
4. m