Wednesday, December 3, 2014

6.5 Cyberintruders (Trolls, Spies, Hackers, and Thieves)


•Trolls aren’t necessarily destructive, but they can be disruptive on online comment boards. A troll is a person who posts intentionally offensive, incendiary, or off-topic comments online, to upset people.

•Many companies have extensive data-collection efforts that constantly track (spy on) our personal activities.


  • Malicious hackers break into computers for malicious purposes.
  • Script kiddies are technically unsophisticated teenagers who use downloadable software for perform break-ins.
  • Hacktivists are hacker activists who break into systems for a political or a socially motivated purpose.
  • Black-hat hackers break into computers to steal or destroy information or to use it for illegal profit.
  • Cyberterrorists attack computer systems so as to bring physical, political or financial harm to groups, companies, or nations.
  • Benign hackers (thrill-seeker hackers) illegally access computer systems simply for the challenge of it, not to damage or steal anything; their reward is the achievement of breaking in.
  • Benevolent hackers (ethical hackers or white-hat hackers) are usually computer professionals who break into computer systems and networks with the knowledge of their owners to expose security flaws that can then be fixed





Thieves may be a company’s employees or suppliers or professionals.
•Employees
•Outside partners & suppliers
•Hardware thieves
•Con artists, scammers, & counterfeiters