Perpetrator Types
Perpetrator Types
Group # 4
Member:
Manalang Edzel
Layug Tristan Jay
Olmedo Allan Ray
Dimabuyu Reymir
Yusi Mark Francis
Ocampo Nikko Paolo
Dungo Matthew Alain
Daluz Mary Hazel
Munoz Claudia
Classification of Perpetrators of computer crime
-not all people call themselves "hacker" break into systems or commit
computer crimes. Indeed, the term hacker originally meant anyone who
loved computing, and loved making programs. However, people who break
into systems who are belong to perpetrators also call themselves hackers and
they refer to their tools as "hacking programs" and "Hacking worksheets".
CRACKER
- Break into other people’s networks and systems, deface web pages, crash
computers, spread harmful programs or hateful messages and write scripts
and automatic programs that let other people do this things.
INSIDER
- Are not necessarily employee; they can be consultants as well. Nor do they
need to be employees in IT-related positions; they may just be experience IT
users. Their risk tolerance ranges from low to high, depending on whether
they are motivated by financial gain, revenge on their employers or
publicity.
INDUSTRIAL SPY
- Use illegal means to obtain trade secrets from the competitors of the firm
for which they are hired. They is a trade secret for their own benefit or for
the benefit of the other.
CYBERCRIMINALS
- They hack into corporate computers and steal money, often by transferring
money from one account to another. Leaving a hopeless complicated trail for
law enforcement officer to follow.
- A person who gains illegal entrance into a computer system or who diverts
financial transfers into his or her own account.
CYBERTERRORIST