Author Question: Describe the characteristics of hackers and explain the categories of the basic typology that is ... (Read 86 times)

a0266361136

  • Hero Member
  • *****
  • Posts: 538
Describe the characteristics of hackers and explain the categories of the basic typology that is based on psychological characteristics.
 
  What will be an ideal response?

Question 2

Compare and contrast phone phreaking with phishing.
 
  What will be an ideal response?



underwood14

  • Sr. Member
  • ****
  • Posts: 346
Answer to Question 1

Answer: The average hacker is a male between the ages of 16 and 25 who lives in the U.S. is a computer user but no5 a programmer, and who hacks with software written by others. His primary motivation is to gain access to Web sites and computer networks.

The six main types of hackers are:


  • Pioneers: people fascinated by the evolving technology of telecommunications who explore it without knowing what they will find

  • Scamps: hackers with a sense of fun who intend no overt harm

  • Explorers: hackers motivated by their delight in the discoveries associated with breaking into new computer systems

  • Game players: hackers who enjoy defeating software or system protections and who see hacking itself as a game

  • Vandals: malicious hackers who deliberately cause damage with no apparent gain for themselves

  • Addicts: classic computer nerds who are addicted to hacking and computer technology



Not all computer hackers are kids; some are high-tech computer operators using computers to engage in unlawful conduct

Answer to Question 2

Answer: Both types of crimes involve communication services. Phone phreaking involves using special telecommunications access codes and other restricted technical information to avoid paying long distance charges. A modern version involves the electronic theft of cellular telephone numbers and access codes.

Phishing is an Internet-based scam that is designed to steal valuable information such as credit card numbers, Social Security numbers, user IDs, and passwords. A typical phishing reaches up to 1 million e-mail inboxes.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

Egg cells are about the size of a grain of sand. They are formed inside of a female's ovaries before she is even born.

Did you know?

The Food and Drug Administration has approved Risperdal, an adult antipsychotic drug, for the symptomatic treatment of irritability in children and adolescents with autism. The approval is the first for the use of a drug to treat behaviors associated with autism in children. These behaviors are included under the general heading of irritability and include aggression, deliberate self-injury, and temper tantrums.

Did you know?

The human body's pharmacokinetics are quite varied. Our hair holds onto drugs longer than our urine, blood, or saliva. For example, alcohol can be detected in the hair for up to 90 days after it was consumed. The same is true for marijuana, cocaine, ecstasy, heroin, methamphetamine, and nicotine.

Did you know?

Street names for barbiturates include reds, red devils, yellow jackets, blue heavens, Christmas trees, and rainbows. They are commonly referred to as downers.

Did you know?

Looking at the sun may not only cause headache and distort your vision temporarily, but it can also cause permanent eye damage. Any exposure to sunlight adds to the cumulative effects of ultraviolet (UV) radiation on your eyes. UV exposure has been linked to eye disorders such as macular degeneration, solar retinitis, and corneal dystrophies.

For a complete list of videos, visit our video library