.

Friday, February 10, 2017

Phreaks and Hackers

Hackers are not only restricted to that the United States and have been plunge in every nook on the country where there computer technology is make available ( Britz, 2013). When it comes to Hacking computers can each be employ as either the point of the turn offense or the instrument to level the crime ( Britz, 2013). The primary motif for these hackers to commit these types of crimes range anywhere from vendettas and or r eveningge, showing off their skills, jokes, hoaxes and pranks to act of terrorism and political and military espionage. there are actually sestet fundamental motivations for computer intrusions, or theft of information.\nThe first being that the hacker is suffering from boredom, the certify being that they are want an intellectual challenge, revenge to an elderly friend or even an old employer would be the third, stintingal being the fourth, this is mostly through with(p) by the criminal hackers, an man-to-man seeking sexual bliss would be an new(prenominal) motivation this usually involves stalking and or harassment of another, and lastly there is political motivation which is use mainly by terrorist groups as a motivation ( Britz, 2013). Phreaks (or phreakers) are usually the ones motivated by more the technical curio of the act ( Britz, 2013). In the tooth root the motivation for them was simply to cracking the governing body ( Britz, 2013).\nThe difference in the midst of Hackers and Crackers are that hackers are individuals who recognize and exploit system vulnerabilities but who lack economic motivation and crackers were originally known as criminal hackers and were the more sophisticated users who active their knowledge for more personal gain ( Britz, 2013). Crackers, are individuals who target information such as proprietary data, or honorable mention card information which thence may be used to further any other criminal activity ( Britz, 2013). being called a hacker was at one time considered to be a heavy(p) compliment to your technical abilities as well ...

No comments:

Post a Comment