Author Question: Describe the characteristics of hackers and explain the categories of the basic typology that is ... (Read 38 times)

a0266361136

  • Hero Member
  • *****
  • Posts: 538
Describe the characteristics of hackers and explain the categories of the basic typology that is based on psychological characteristics.
 
  What will be an ideal response?

Question 2

Compare and contrast phone phreaking with phishing.
 
  What will be an ideal response?



underwood14

  • Sr. Member
  • ****
  • Posts: 346
Answer to Question 1

Answer: The average hacker is a male between the ages of 16 and 25 who lives in the U.S. is a computer user but no5 a programmer, and who hacks with software written by others. His primary motivation is to gain access to Web sites and computer networks.

The six main types of hackers are:


  • Pioneers: people fascinated by the evolving technology of telecommunications who explore it without knowing what they will find

  • Scamps: hackers with a sense of fun who intend no overt harm

  • Explorers: hackers motivated by their delight in the discoveries associated with breaking into new computer systems

  • Game players: hackers who enjoy defeating software or system protections and who see hacking itself as a game

  • Vandals: malicious hackers who deliberately cause damage with no apparent gain for themselves

  • Addicts: classic computer nerds who are addicted to hacking and computer technology



Not all computer hackers are kids; some are high-tech computer operators using computers to engage in unlawful conduct

Answer to Question 2

Answer: Both types of crimes involve communication services. Phone phreaking involves using special telecommunications access codes and other restricted technical information to avoid paying long distance charges. A modern version involves the electronic theft of cellular telephone numbers and access codes.

Phishing is an Internet-based scam that is designed to steal valuable information such as credit card numbers, Social Security numbers, user IDs, and passwords. A typical phishing reaches up to 1 million e-mail inboxes.



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question


 

Did you know?

There can actually be a 25-hour time difference between certain locations in the world. The International Date Line passes between the islands of Samoa and American Samoa. It is not a straight line, but "zig-zags" around various island chains. Therefore, Samoa and nearby islands have one date, while American Samoa and nearby islands are one day behind. Daylight saving time is used in some islands, but not in others—further shifting the hours out of sync with natural time.

Did you know?

More than 34,000 trademarked medication names and more than 10,000 generic medication names are in use in the United States.

Did you know?

As many as 28% of hospitalized patients requiring mechanical ventilators to help them breathe (for more than 48 hours) will develop ventilator-associated pneumonia. Current therapy involves intravenous antibiotics, but new antibiotics that can be inhaled (and more directly treat the infection) are being developed.

Did you know?

Addicts to opiates often avoid treatment because they are afraid of withdrawal. Though unpleasant, with proper management, withdrawal is rarely fatal and passes relatively quickly.

Did you know?

The use of salicylates dates back 2,500 years to Hippocrates’s recommendation of willow bark (from which a salicylate is derived) as an aid to the pains of childbirth. However, overdosage of salicylates can harm body fluids, electrolytes, the CNS, the GI tract, the ears, the lungs, the blood, the liver, and the kidneys and cause coma or death.

For a complete list of videos, visit our video library