Learning Objectives
By the end of this chapter, you will be able to:
- Define computer sabotage and cybercrime.
- Differentiate between hackers, crackers, and other types of cybercriminals.
- Identify common types of computer crime.
Computer Sabotage and Cybercrime
Computer sabotage is any act of malicious destruction or disruption to a computer system. Cybercrime is a broader term that refers to any crime that involves a computer and a network.
Types of Perpetrators
- Hacker: Originally, a hacker was a creative programmer. Today, the term is often used to describe someone who illegally breaks into computer systems.
- Cracker: A person who breaks into a computer system with malicious intent (e.g., to steal data or cause damage).
- Script Kiddie: An amateur cracker who uses pre-made tools to attack systems.
- Insider: An employee or former employee who uses their authorized access to carry out a crime.
Common Types of Computer Crime
- Malware: Malicious software designed to disrupt computer operation, gather sensitive information, or gain access to private computer systems. (This is covered in more detail in the next section).
- Denial-of-Service (DoS) Attack: An attempt to make a machine or network resource unavailable to its intended users by flooding it with traffic.
- Phishing: An attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
Summary
Computer sabotage and cybercrime are serious threats. They are carried out by a range of perpetrators, from amateur script kiddies to sophisticated crackers and malicious insiders. Common forms of cybercrime include the use of malware, denial-of-service attacks, and phishing scams. Protecting against these threats is a critical part of modern computer security.
Key Takeaways
- Cybercrime is any crime involving a computer and a network.
- A cracker is a hacker with malicious intent.
- Phishing is a common technique used to steal sensitive information.
Discussion Questions
- What is the difference between a hacker and a cracker?
- Why is an insider often the most dangerous type of threat?
- Have you ever received a phishing email? What were the signs that it was not legitimate?

