Learning Objectives

By the end of this chapter, you will be able to:

  • Define computer sabotage and cybercrime.
  • Differentiate between hackers, crackers, and other types of cybercriminals.
  • Identify common types of computer crime.

Computer Sabotage and Cybercrime

Computer sabotage is any act of malicious destruction or disruption to a computer system. Cybercrime is a broader term that refers to any crime that involves a computer and a network.

Types of Perpetrators

  • Hacker: Originally, a hacker was a creative programmer. Today, the term is often used to describe someone who illegally breaks into computer systems.
  • Cracker: A person who breaks into a computer system with malicious intent (e.g., to steal data or cause damage).
  • Script Kiddie: An amateur cracker who uses pre-made tools to attack systems.
  • Insider: An employee or former employee who uses their authorized access to carry out a crime.

Common Types of Computer Crime

  • Malware: Malicious software designed to disrupt computer operation, gather sensitive information, or gain access to private computer systems. (This is covered in more detail in the next section).
  • Denial-of-Service (DoS) Attack: An attempt to make a machine or network resource unavailable to its intended users by flooding it with traffic.
  • Phishing: An attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.

Summary

Computer sabotage and cybercrime are serious threats. They are carried out by a range of perpetrators, from amateur script kiddies to sophisticated crackers and malicious insiders. Common forms of cybercrime include the use of malware, denial-of-service attacks, and phishing scams. Protecting against these threats is a critical part of modern computer security.

Key Takeaways

  • Cybercrime is any crime involving a computer and a network.
  • A cracker is a hacker with malicious intent.
  • Phishing is a common technique used to steal sensitive information.

Discussion Questions

  1. What is the difference between a hacker and a cracker?
  2. Why is an insider often the most dangerous type of threat?
  3. Have you ever received a phishing email? What were the signs that it was not legitimate?