Question

Describe the differences between digital crimes and hackers. Are there differences? If there are or if...

Describe the differences between digital crimes and hackers. Are there differences? If there are or if there are not, discuss your views in your own words. 

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Hackers vs. crackers

Activities embody System intrusion System injury Cyber hooliganism Intentional disruption, defacement, destruction of internet site or company system Hacking is that the gaining of unauthorized access to a automatic data processing system, and maybe sterilization its contents. It’s going to be tired pursuit of a criminal activity or it's going to be a hobby, with hackers acting alone or passing info to at least one another. Hacking is also harmless if the participant is simply enjoying the challenge of breaking systems defences, however sever injury will be caused to the pc system owner. A cracker (also known as a black hat or dark facet hacker) may be a malicious or criminal hacker. Sometimes a cracker may be a one who maintains data of the vulnerabilities he or she finds and exploits them for personal advantage, not revealing them to either the final public or the manufacturer for correction. Several nuts promote individual freedom and accessibility over privacy and security.

HACKERS AND DIGITAL CRIME

  1. Spoofing Misrepresenting oneself by exploitation pretend addresses or masquerading as some other person Redirecting net link to deal with totally different from meant one, with website masquerading as meant destination somebody Eavesdropping program that monitors info travel over network allows hackers to steal proprietary info like , company files, etc.
  2. Denial-of-service attacks (DoS) Flooding server with thousands of false requests to crash the network. Distributed denial-of-service attacks (DDoS) Use of various computers to launch a DoS Botnets Networks of “zombie” PCs infiltrated by larva malware Worldwide, million computers function zombie PCs in thousands of botnets
  3. Fraud stealing of non-public info (social security id, driver’s license or MasterCard numbers) to impersonate some other person Phishing putting in pretend internet sites or causation messages that seem like legitimate businesses to raise users for confidential personal information. Evil twins Wireless networks that faux to supply trustworthy Wi-Fi connections to the net
  4. Pharming Redirects users to a counterfeit online page, even once individual varieties correct online page address into his or her browser Click fraud happens once individual or malicious program fraudulently clicks on on-line ad with none intention of learning a lot of regarding the adman or creating an acquisition Cyber terrorism and Cyber warfare
  5. PC Viruses sorts of malicious codes written with associate aim to hurt a automatic data processing system and destroy info. Will replicate them and hurt the pc systems on a network while not the data of the system users. Viruses unfold to alternative computers through network filing system, through the network, web or by the means that of removable devices like USB drives and CDs. Writing pc viruses may be a criminal activity as virus infections will crash pc systems, thereby destroying nice amounts of vital information.
  6. Cyber stalking the employment of communication technology, in the main the net, to torture alternative people is thought as cyber stalking. False accusations, transmission of threats and injury to information and instrumentality constitute the category of cyber stalking activities. Cyber stalkers usually target the users by means that of chat rooms, on-line forums and social networking websites to collect user info and harass the users on the idea of the data gathered. Obscene s, abusive phone calls and alternative such serious effects of cyber stalking have created it a kind of pc crime.
Add a comment
Know the answer?
Add Answer to:
Describe the differences between digital crimes and hackers. Are there differences? If there are or if...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT