answersLogoWhite

0

The typical profile given for a hacker is a young male, typically a loner, somewhat deviant, and who has poor social skills. But that is only a start and does not tell the whole story. Some are the self-styled mavericks, some are white collar professionals, and some are con men and scammers. So their motives vary.

According to taxonomists such as Marcus Rogers, there are at least 8 types of computer criminals. They are:

1. Novices - They rely on rootkits, they have little actual computer knowledge, they may be looking for media exposure, and they may cause extensive damage because they don't know what they are doing.

2. Cyber-punks - They typically understand the systems they are hacking and can write code. They are likely to be involved in fraud, and they typically want bragging rights.

3. Company insiders, type A - These are company insiders. They may be disgruntled employees of IT jobs who use their privileges to help them in their criminal endeavors.

4. Company insiders, type B - They are petty thieves who work in an IT capacity and are computer literate. They may be opportunistic and motivated by greed, and they may have a drug habit or gambling debts.

5. Coders - They mentor the newbies, write tools that others use, and are motivated by power and prestige. They tend to have hidden agendas and use Trojan horses.

6. Old guard hackers - They seem to have no real criminal intent, but little respect for the property of others either. Their main motivation is intellectual.

7. Professional criminals - They are likely to specialize in corporate espionage, and usually are available for hire by others. They have access to sophisticated equipment. They are also highly motivated and skilled.

8. Cyber-terrorists - A good number of these are from Europe where they may have been a part of intelligence agencies. Their motivations are mainly political in nature though they may engage in criminal activities for income. They use hacking as a form of political activism.

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

How you can overcome a criminal mind?

Profile it.


What is a sentence for the word profile?

Her profile is a beautiful one. The profile of the criminal helped the police catch him. The psychologist can profile people based on their behavior.


How do you make a profile on your computer?

Computer Profiles are usually termed as being everything associated with a user. In windows, you can make a new user to make a new profile. In firefox, you can setup your browsing preferences with a profile.Or you could be talking about making a criminal profile on a specific person on your computer. There are several sites you can search to collect data.But since "profile" is a common term, there is no specific answer unless we know more about what type of profile you mean.


How does criminal profiling help criminals?

Criminal profiling doesn't help the criminal. It is used as a tool by law enforcement and detectives to narrow the field of suspects. Profiling is also helpful when interrigating a suspect, asking the right questions helps in getting the right answers.


What is a computer hijacker?

Computer HiJack is the crime where the criminal takes over your computer and you are unable to control anything that is being done to your computer. This is a federal offence and the criminal will be jailed if caught.


What is a computer that is controlled by a hacker or other computer criminal?

Zombie


How do you download your facebook profile pic to your computer?

Click on your profile picture from your profile, and then in the lower right hand corner, click download.


Is computer hacking is a criminal?

yes


What the difference between a local user profile and a roaming user profile?

a mandatory A local user profile is stored on the computer to which the user logs on.


Does computer predict the criminal behavior patterns?

Yes super computer does.


How do you automatically tweet Now Playing song on your computer to your twitter profile?

Here is a whole tutorial to do this: How to automatically tweet Now Playing song on your computer to your twitter profile ?


How are a roaming profile and a mandatory profile the same How are they different?

A Roaming profile is where setting established by a user at one computer are stored in a file on a file server on the network and shared with all computers in the workgroup, When a user moves from one computer to the next in the workgroup the roaming profile follows the user so that he or she does not have to redo settings at each computer. A Mandatory profile is a roaming profile that applies to all users in a user group, and individual users cannot change that profile. It is used in situations were users perform only specific job-related task.