Topic > Internet Crime - 390

An intentional breach of digital security often involves a deliberate act against the law.1 Cybercrime refers to illegal online or Internet-based acts such as the distribution of malicious software or identity theft . Cybercrime perpetrators typically fall into one of these categories: hackers, crackers, script kiddies, corporate spies, unethical employees, cyber extortionists, and cyber terrorists. The term hacker refers to someone who accesses a computer or network illegally. Some hackers claim that the purpose of their security breaches is to improve security. A cracker is also someone who illegally accesses a computer or network but has the intent to destroy data, steal information, or other malicious acts. Both hackers and crackers have advanced computer and networking skills. A script kiddie has the same intent as a cracker but lacks the technical skills and knowledge. Script Kiddies often use precompiled hacking and cracking programs. Corporate spies and unethical employees are other types of cybercrime perpetrators. Some corporate spies have excellent computer and networking skills and are hired to break into a specific computer and steal proprietary data and information or to help identify security risks in your organization. Unethical employees can break into their employers' computers for a variety of reasons. They may want to exploit a security weakness, receive financial gain from selling sensitive information, or even seek revenge (Gonzalez). A cyberextortionist is someone who demands payment to stop an attack on an organization's technology infrastructure. For example, these criminals threaten to disclose confidential information, exploit a security flaw, or launch an attack that will compromise the organization's network. A cyberterrorist is someone who uses the Internet or network to destroy or damage computers for political reasons. Cyber ​​warfare is an attack whose goal ranges from disabling a government's computer network to paralyzing a country. Cyberterrorism and cyberwarfare usually require a team of highly trained individuals, millions of dollars, and several years of planning (Zheng and Rutherford).