perpetrator types

11
Perpetrator Types Group # 4 Member: Manalang Edzel Layug Tristan Jay Olmedo Allan Ray Dimabuyu Reymir Yusi Mark Francis Ocampo Nikko Paolo Dungo Matthew Alain Daluz Mary Hazel

Upload: api-3712561

Post on 11-Apr-2015

5.977 views

Category:

Documents


1 download

DESCRIPTION

this a research of mine

TRANSCRIPT

Page 1: Perpetrator Types

Perpetrator Types

Group # 4Member:Manalang Edzel Layug Tristan JayOlmedo Allan RayDimabuyu ReymirYusi Mark FrancisOcampo Nikko PaoloDungo Matthew AlainDaluz Mary HazelMunoz Claudia

Page 2: Perpetrator Types

Classification of Perpetrators of computer crime

Type of perpetrator Objective Resource available to Perpetrator

Level of risk taking acceptable to Perpetrator

Frequency of attack

Hacker Test the limits of system and gain publicity

Limited Minimal Medium

Cracker Cause problems, steal data and corrupt systems

Limited Moderate Medium

Insider Financial gain and disrupt company’s information systems

Knowledge of systems and passwords

Moderate Low

Industrial Spy Capture trade secrets and gain competitive advantage

Well-funded and well-trained

Minimal Low

Cybercriminal Financial gain Well-funded and well-trained

Moderate Low

Cyberterrorist Cause destruction key infrastructure components

No necessarily well-funded or well-trained

Very High Low

Page 3: Perpetrator Types

HACKER

-Are individuals who test the limitations of systems out of intellectual

curiosity to see whether they can gain access and ho far they can go.

-not all people call themselves "hacker" break into systems or commit computer crimes. Indeed, the term hacker originally meant anyone who loved computing, and loved making programs. However, people who break into systems who are belong to perpetrators also call themselves hackers and they refer to their tools as "hacking programs" and "Hacking worksheets".

TWO KINDS OF HACKER

BLACK-HAT is a term in computing for someone who compromises the security of a system without permission from an authorized party, usually with the intent of accessing computers connected to the network.

WHITE-HAT is used for a person who is ethically opposed to the abuse of computer systems.

Page 4: Perpetrator Types

CRACKER

- Break into other people’s networks and systems, deface web pages, crash computers, spread harmful programs or hateful messages and write scripts and automatic programs that let other people do this things.

-A person who engages in illegal or unethical circumvention of computer security systems (through passwords, systems or security, or software)

Page 5: Perpetrator Types

INSIDER

- Are not necessarily employee; they can be consultants as well. Nor do they need to be employees in IT-related positions; they may just be experience IT users. Their risk tolerance ranges from low to high, depending on whether they are motivated by financial gain, revenge on their employers or publicity.

-An insider is a malicious hackerWho is an employee or officer of a business, institution, or agency. The term can also apply to an outside person who poses as an employee or officer by obtaining false credentials.

Page 6: Perpetrator Types

INDUSTRIAL SPY

- Use illegal means to obtain trade secrets from the competitors of the firm for which they are hired. They is a trade secret for their own benefit or for the benefit of the other.

-Competitive intelligence uses legal information gathering techniques to obtain information that is not available to the public.

Page 7: Perpetrator Types

CYBERCRIMINALS

- They hack into corporate computers and steal money, often by transferring money from one account to another. Leaving a hopeless complicated trail for law enforcement officer to follow.

- A person who gains illegal entrance into a computer system or who diverts financial transfers into his or her own account.

Page 8: Perpetrator Types

CYBERTERRORIST

- Is someone who intimidates or coerces a government or organization to advance his or her political or social objectives by launching computer based attack against computers, network, and the information stored on them.

- Target’s computers and information technology, particularly via the Internet, to cause physical, real-world harm or severe disruption.

As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. members of an ethnic group or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring.