MindTap Information Security, 1 term (6 months) Printed Access Card for Whitman/Mattord's Management of Information Security, 6th (MindTap Course List)
MindTap Information Security, 1 term (6 months) Printed Access Card for Whitman/Mattord's Management of Information Security, 6th (MindTap Course List)
6th Edition
ISBN: 9781337405751
Author: Michael E. Whitman; Herbert J. Mattord
Publisher: Course Technology
Question
Book Icon
Chapter 1, Problem 16RQ
Program Plan Intro

Hacker:

  • A hacker is a skilled computer expert who may use their skills in a positive and a negative way where in a negative way they can use bus and exploit the computer system.
  • There are two types of hackers, they are
    • Expert hackers.
    • Unskilled hackers.
  • Expert hackers are those people who develop software or schemes to attack systems.
  • Unskilled or novice hackers are those who use the software and schemes created by the expert hackers.

Blurred answer
Students have asked these similar questions
What techniques does a social engineering hacker employ in order to obtain information about a user's login id and password? What would this strategy look like if it was aimed at an administrator's assistant rather than a data-entry clerk?
What methods does a social engineering hacker use to gain information about user's login id and password? How would this method differ if it were targeted towards an administrator's assistant versus a data- entry clerk ?
What methods does a social engineering hacker use to gain information about a user’s login ID and password? How would this method differ if it targeted an administrator’s assistant versus a data-entry clerk?
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
CMPTR
Computer Science
ISBN:9781337681872
Author:PINARD
Publisher:Cengage