answersLogoWhite

0

The typical profile given for a hacker is a young male, typically a loner, somewhat deviant, and who has poor social skills. But that is only a start and does not tell the whole story. Some are the self-styled mavericks, some are white collar professionals, and some are con men and scammers. So their motives vary.

According to taxonomists such as Marcus Rogers, there are at least 8 types of computer criminals. They are:

1. Novices - They rely on rootkits, they have little actual computer knowledge, they may be looking for media exposure, and they may cause extensive damage because they don't know what they are doing.

2. Cyber-punks - They typically understand the systems they are hacking and can write code. They are likely to be involved in fraud, and they typically want bragging rights.

3. Company insiders, type A - These are company insiders. They may be disgruntled employees of IT jobs who use their privileges to help them in their criminal endeavors.

4. Company insiders, type B - They are petty thieves who work in an IT capacity and are computer literate. They may be opportunistic and motivated by greed, and they may have a drug habit or gambling debts.

5. Coders - They mentor the newbies, write tools that others use, and are motivated by power and prestige. They tend to have hidden agendas and use Trojan horses.

6. Old guard hackers - They seem to have no real criminal intent, but little respect for the property of others either. Their main motivation is intellectual.

7. Professional criminals - They are likely to specialize in corporate espionage, and usually are available for hire by others. They have access to sophisticated equipment. They are also highly motivated and skilled.

8. Cyber-terrorists - A good number of these are from Europe where they may have been a part of intelligence agencies. Their motivations are mainly political in nature though they may engage in criminal activities for income. They use hacking as a form of political activism.

User Avatar

Wiki User

11y ago

What else can I help you with?

Related Questions

How you can overcome a criminal mind?

Profile it.


What is a sentence for the word profile?

Her profile is a beautiful one. The profile of the criminal helped the police catch him. The psychologist can profile people based on their behavior.


How do you make a profile on your computer?

Computer Profiles are usually termed as being everything associated with a user. In windows, you can make a new user to make a new profile. In firefox, you can setup your browsing preferences with a profile.Or you could be talking about making a criminal profile on a specific person on your computer. There are several sites you can search to collect data.But since "profile" is a common term, there is no specific answer unless we know more about what type of profile you mean.


How does criminal profiling help criminals?

Criminal profiling doesn't help the criminal. It is used as a tool by law enforcement and detectives to narrow the field of suspects. Profiling is also helpful when interrigating a suspect, asking the right questions helps in getting the right answers.


What is a computer hijacker?

Computer HiJack is the crime where the criminal takes over your computer and you are unable to control anything that is being done to your computer. This is a federal offence and the criminal will be jailed if caught.


What is a computer that is controlled by a hacker or other computer criminal?

Zombie


How do you download your facebook profile pic to your computer?

Click on your profile picture from your profile, and then in the lower right hand corner, click download.


Is computer hacking is a criminal?

yes


What the difference between a local user profile and a roaming user profile?

a mandatory A local user profile is stored on the computer to which the user logs on.


Does computer predict the criminal behavior patterns?

Yes super computer does.


How do you automatically tweet Now Playing song on your computer to your twitter profile?

Here is a whole tutorial to do this: How to automatically tweet Now Playing song on your computer to your twitter profile ?


How are a roaming profile and a mandatory profile the same How are they different?

A Roaming profile is where setting established by a user at one computer are stored in a file on a file server on the network and shared with all computers in the workgroup, When a user moves from one computer to the next in the workgroup the roaming profile follows the user so that he or she does not have to redo settings at each computer. A Mandatory profile is a roaming profile that applies to all users in a user group, and individual users cannot change that profile. It is used in situations were users perform only specific job-related task.

Trending Questions
How do you remove stored screensavers from your drive? How do you update a computer file? When you upgrade a network to 10Gbase-T and the users can not log on and even the department vice president in the CAD CAM Do you suspect that the CAD CAM users network access is the problem? Can you export from Quickbooks to open office? What is a chart of zones and seasonal areas? How are meerkats simalar to humans? What happens when you click the Minimize button on a program window? How much should one expect to pay for a 500 GB portable HDD? What age group is Pixar movies aimed towards? How does the magic wand tool determine which areas of an image to select? How do you make a happy face using the keyboard? How do you fix Unable to install manycam virtual webcam Use video source instead problem for Manycam? Which region of the stomach is a temporary storage area and sometimes fills with swallowed air? What does man's bidding or somebody's bidding mean? How many logical conditions can you include in Excel in the AND function? What term refers to the process by which material in memory is located brought to awareness and used? Can you use two different prepaid credit cards to pay for something on your pay pal? Should you turn off your computer before pulling out the removable hard drive? What is a popular metaphor for visualizing a Windows 7 file system? Which menu conventions indicate that you must make additional selections after you make your current selection and will lead to a dialog box?