Computer Crime

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 8

 Individuals who test the limitations of

systems out of intellectual curiosity – to see


whether can gain access and how far they
can go
 Technically inept hackers are called lamers
or script kiddies
 Break into other people’s networks and
systems, deface Web pages, crash
computers, spread harmful programs or
hateful messages, and write scripts and
automatic programs that let other people do
these things.
 Criminal fraud is the obtaining of title to
property through deception or trickery
 Extremely difficult to detect or stop because
they are often authorized to access the very
systems they abuse
 Use illegal means to obtain trade secrets
from the competitors of the firm for which
they are hired
 Industrial espionage can involve the theft of
new product design, production, or
marketing information
 Hackinto corporate computers and steral
money, often by transferring money from one
account to another to another– leaving a
hopelessly complicated trail for law
enforcement officers to follow
 Someone who intimidates or coerces a
government or organization to advance his or
her political or social objectives by launching
computer-based attacks against computers,
networks, and the information stored on
them
 Such attacks could be accomplished by the
sending of a virus or worm or through the
launching of denial-of-service attack.
TYPE OF PERPETRATOR OBJECTIVE
Test limits of system and gain
Hacker
publicity
Cause problems, steal data, and
Cracker
corrupt systems
Financial gain and disrupt
Malicious Insider
company's information systems
Capture trade secrets and gain
Industrial Spy
competitive advantage
Cybercriminal Financial gain
Cause destruction to key
Cyberterrorist
infrastructure components

You might also like