CRIM 380- Midterm Exam Guide - Comprehensive Notes for the exam ( 12 pages long!)

212 views12 pages

Document Summary

Take a system and create something completely different. Old definition: law abiding, create tools to benefit: did not have motives. Greyhat: someone who not necessary have bad intention but have no permission to do what he is doing. Blackhat: no permission and will take advantage of it. Largest sub-pop: usually referred to as (cid:858)s(cid:272)ript kiddies(cid:859, use downloaded hacker tools. [early days] all aspects of hacking were done individually. [today] most jacks are done in small groups of trusted members: quickly in & out. Disorganized groups some hacks are done by volunteers who form groups based on motivation about certain topic (ex: anonymous loosely formed attack: quickly in & out. State-sponsored groups lots of financing available, in it for the long-term: working for government security or defending against external attacks, offensive. Toolkit/newbies: very low technical skills and know-how, use ready-made software & how-to documentation. Cyber punks capable of writing small programs themselves: (cid:373)ai(cid:374)ly (cid:862)defa(cid:272)i(cid:374)g(cid:863) we(cid:271) pages, spa(cid:373)(cid:373)i(cid:374)g, or (cid:272)redit (cid:272)ard theft.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers

Related Documents

Related Questions