whether can gain access and how far they can go Technically inept hackers are called lamers or script kiddies Break into other people’s networks and systems, deface Web pages, crash computers, spread harmful programs or hateful messages, and write scripts and automatic programs that let other people do these things. Criminal fraud is the obtaining of title to property through deception or trickery Extremely difficult to detect or stop because they are often authorized to access the very systems they abuse Use illegal means to obtain trade secrets from the competitors of the firm for which they are hired Industrial espionage can involve the theft of new product design, production, or marketing information Hackinto corporate computers and steral money, often by transferring money from one account to another to another– leaving a hopelessly complicated trail for law enforcement officers to follow Someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer-based attacks against computers, networks, and the information stored on them Such attacks could be accomplished by the sending of a virus or worm or through the launching of denial-of-service attack. TYPE OF PERPETRATOR OBJECTIVE Test limits of system and gain Hacker publicity Cause problems, steal data, and Cracker corrupt systems Financial gain and disrupt Malicious Insider company's information systems Capture trade secrets and gain Industrial Spy competitive advantage Cybercriminal Financial gain Cause destruction to key Cyberterrorist infrastructure components