Please enable JavaScript.
Coggle requires JavaScript to display documents.
Chapter 7 :Computer Security & Ethics - Coggle Diagram
Chapter 7 :Computer Security & Ethics
Computer Security Risks
hacker
cracker
script kiddie
corporate spies
unethical employees
cyberextortionist
cyberterrorist
hacker
someone who accesses a or network illegally
some hackers claim the intent of their security breaches to improve security.
cracker
accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action
script kiddie
has the same intent as a cracker but does not have the technical skills and knowledge.
Corporate spies
some corporate spies have excellent computer and net working skills and are hired to break into a specific computer and steal its proprietary data and information, or to help identify security risks in their own organization.
unethical employees
may break into their employers's computer for a variety of reasons
some simply want to exploit a security weakness.
others seek financial gains from selling confidential information.
cyber extortionist
is someone who uses e-mail as a vehicle for extortion
they will send an organization a threatening e-mail indicating they will expose confidential information and etc.
cyberterrorist
someone who uses the internet or network to destroy or damage computers for political reasons