Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
Question
Book Icon
Chapter 1, Problem 16RQ
Program Plan Intro

Hacker:

  • A hacker is a skilled computer expert who may use their skills in a positive and a negative way where in a negative way they can use bus and exploit the computer system.
  • There are two types of hackers, they are
    • Expert hackers.
    • Unskilled hackers.
  • Expert hackers are those people who develop software or schemes to attack systems.
  • Unskilled or novice hackers are those who use the software and schemes created by the expert hackers.

Blurred answer
Students have asked these similar questions
What strategies does a social engineering hacker employ to obtain a user's login ID and password? How would this strategy be different if it was aimed at an administrator's assistant rather than a data-entry clerk?
What strategies do hackers use in the practise of social engineering in order to get a user's login id and password information?
What techniques do social engineering hackers employ in order to obtain knowledge about a user's login id and password information?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage