Article in International Journal of Computer Networks and Communications Security · June 016 citations 56 reads 15,158 authors: Some of the authors of this publication are also working on these related projects



Download 274,58 Kb.
Pdf ko'rish
bet5/28
Sana17.05.2023
Hajmi274,58 Kb.
#940219
1   2   3   4   5   6   7   8   9   ...   28
Bog'liq
CybercrimeandCybercriminal-2016

White Hats
:
Individuals with hacking skills those 
act to protect networks in a defensive way. They 
work is corporate environments as security 
analysts. 
Gray Hats
:
Hackers that work both offensively 
and defensively at different situations. 
Suicide Hackers
:
Hackers that aim to bring down 
critical infrastructure for radical causes and are not 
afraid to go to jail. They are related to suicide 
bombers and are active member of cyber terrorism 
groups. 
Script Kiddies
:
The most unskilled hackers that 
are not well versed in hacking techniques. They 
tend to focus in getting high quantities of attacks 
rather than performing quality attacks. 
Spy Hackers
:
These hackers are on contract to 
penetrate and gain trade secrets of their employer‘s 
competitors.
Cyber Terrorists
:
These could be people or 
organized groups that are motivated by political or 
religious motives to cause harm by disrupting large 
scale computer networks. 
State Sponsored Hackers
:
State sponsored 
hackers that are employed to damage other 
countries‘ networks and information systems. 
Warren and Leitch (2009) have created an 
additional hacker category that was not considered 
before. The researchers have identified a sub group 
of hackers called ―Hacker Taggers‖. These hackers 
like to deface websites with the intention of leaving 
a ‗hacker tag‘ or ‗calling card‘ behind. This tag or 
card is updated to show hacker‘s individual scores. 
The website Zone-H (
www.zone-h.org
) contains 
an archive of website defacement history since 
1999.
In terms of hacker categories and classes, we 
remark that there is not a globally accepted 
categorization of hacker groups nor classes. While 
many organizations have agreed on certain 
categories, that intend to group hackers by their 
motives and actions. We agree that the most 
common categories are black, grey and white hat 
hackers and any resulting sub-categorizations are 
based on specific motives, propaganda, hacktivism, 
political or religious reasons. 

Download 274,58 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   ...   28




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish