CRIM 380 Lecture Notes - Lecture 2: Query Language, Sub Pop, Edward Snowden

56 views4 pages

Document Summary

Take a system and create something completely different. Old definition: law abiding, create tools to benefit: did not have motives. Greyhat: someone who not necessary have bad intention but have no permission to do what he is doing. Blackhat: no permission and will take advantage of it. Largest sub-pop: usually referred to as (cid:858)s(cid:272)ript kiddies(cid:859, use downloaded hacker tools. [early days] all aspects of hacking were done individually. [today] most jacks are done in small groups of trusted members: quickly in & out. Disorganized groups some hacks are done by volunteers who form groups based on motivation about certain topic (ex: anonymous loosely formed attack: quickly in & out. State-sponsored groups lots of financing available, in it for the long-term: working for government security or defending against external attacks, offensive. Toolkit/newbies: very low technical skills and know-how, use ready-made software & how-to documentation. Cyber punks capable of writing small programs themselves: (cid:373)ai(cid:374)ly (cid:862)defa(cid:272)i(cid:374)g(cid:863) we(cid:271) pages, spa(cid:373)(cid:373)i(cid:374)g, or (cid:272)redit (cid:272)ard theft.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents