answersLogoWhite

0


Best Answer

People that attempt to gain unauthorized access to a computer or called crackers. There is a difference between a cracker and a hacker and the terms are often mistaken or used interchangeably. A cracker is one who is trying to cause harm or gain unauthorized information. A hacker is some one that attempts to break into computers and software for the purpose of fixing or discovering security holes to prevent crackers from getting in.

User Avatar

Wiki User

14y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

14y ago

administrator

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: People who gain unauthorized access to computers for the purpose of doing damage are called?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Proctor when talking about computers?

A clever or expert programmer who can gain unauthorized access to other computers


What a two purpose for configuring a banner on a router?

One purpose for configuring a banner on a router is to assist in legal prosecution for unauthorized access. Another purpose is to provide a welcome message to users who access the router.


A PII breach is an actual or possible loss of control unauthorized accessof personal information where blank users gain access or potential access to such information for an other than blank purpose w?

(a) = Unauthorized (b) = Authorized


Why do people attempt to gain unauthorized access?

Curiosity, control, money.


What are purposes for configuring a banner on a router?

One purpose for configuring a banner on a router is to assist in legal prosecution for unauthorized access. Another purpose is to provide a welcome message to users who access the router.


What are two purposes for configuring a banner on a router?

One purpose for configuring a banner on a router is to assist in legal prosecution for unauthorized access. Another purpose is to provide a welcome message to users who access the router.


An unauthorized person manages to access the computers in the hospital where you work and downloads information Who is the most likely person to handle the disaster?

Security officer


Can we take remote access on my gait computers?

Yes for this purpose use Microsoft Remote Access Control.


What is the difference between unauthorized access and unauthorized use?

Unauthorized access is the use of a computer or network without permission. Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities.


What is data thief?

A data of an organization is confidential and may contain some important information. For the security reasons the access to database is given only to authorized users. When an unauthorized user try to access that data , he is known as data thief.Data thief is an unauthorized user who have illegal access to the data in the data base . Data thief is just like hacker who access the data for illegal purpose.


Why is it important to prevent unauthorised access to the workplace?

If unauthorized people have access to the workplace, then people ignorant of hazards and safety procedures for that workplace will be in it and can cause or be impacted by an event.


What laws outlaws unauthorized access to a system to acquire national defense information damage protected computers or perpetrate fraud?

Computer Fraud & Abuse Act