Assignment: The Psychological Characteristics of a Hacker

Assignment: The Psychological Characteristics of a Hacker

Assignment: The Psychological Characteristics of a Hacker

Question:

Describe the characteristics of a typical hacker. Then provide descriptions of six typical types of hackers, based on psychological characteristics.

ORDER NOW FOR COMPREHENSIVE, PLAGIARISM-FREE PAPERS

The different types of hackers that you have to describe and elaborate on in the assignment:

-Pioneers. Individuals who are fascinated by the evolving technology of telecommunications and explore it without knowing exactly what they are going to find are called pioneers; few hard-core criminals are found among this group.

-Scamps. Hackers with a sense of fun, with no intention to harm, are referred to as scamps.

-Explorers. Explorers are hackers motivated by their delight in discoveries associated with breaking into new computer systems—the farther away geographically such systems are from the hackers’ physical locations or the more secure such systems are, the greater the excitement associated with breaking into them.

-Game players. Game players enjoy defeating software or system copy protection and may seek to illegally access computer systems with games to play. Hacking itself becomes a game for this sort of hacker.

-Vandals. Malicious hackers who deliberately cause damage with no apparent gain for themselves are called vandals. The original 414 Gang in Milwaukee, which broke into the Sloan-Kettering Cancer Institute’s computers and wiped out patient records, is an example of this type of hacker.

-Addicts. Classic computer nerds who are addicted to hacking and to computer technology are addicts. They may also be addicted to illicit drugs (some hacker bulletin board systems post information on drugs as well as on modems, passwords, and vulnerable systems)

  • attachment

    T05KAssignment8.docx

    Assignment 08

    T05 Criminal Behavior

    Directions: Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be four (4) pages in length; refer to the “Assignment Format” page for specific format requirements.

     

    Describe the characteristics of a typical hacker. Then provide descriptions of six typical types of hackers, based on psychological characteristics.

     

    Grading Rubric

     

    Please refer to the rubric below for the grading criteria for this assignment.

    CATEGORYExemplarySatisfactoryUnsatisfactoryUnacceptable

    15 points 10 points 8 points 6 points

    Student provides a clear,

    logical definition of a typical

    hacker.

    Student provides a mostly

    clear, logical definition of a

    typical hacker.

    Student provides a weak or

    unclear definition of a typical

    hacker.

    Student provides a poor

    definition of a typical hacker.

    60 points 50 points 40 points 30 points

    Student clearly and logically

    describes all 6 types of

    common hackers. Student

    must describe pioneers,

    scamps, explorers, game

    players, vandals, and addicts

    in order to receive full credit.

    Student is mostly clear and

    logical in describing 5-6 types

    of common hackers.

    Student provides weak or

    unclear descriptions of 3-4

    types of common hackers.

    Student provides poor

    descriptions of 1-2 types of

    common hackers.

    10 points 8 points 5 points 2 points

    Student makes no errors in

    grammar or spelling that

    distract the reader from the

    content.

    Student makes 1-2 errors in

    grammar or spelling that

    distract the reader from the

    content.

    Student makes 3-4 errors in

    grammar or spelling that

    distract the reader from the

    content.

    Student makes more than 4

    errors in grammar or spelling

    that distract the reader from

    the content.

    15 points 12 points 8 points 5 points

    The paper is written in

    proper format. All sources

    used for quotes and facts are

    credible and cited correctly.

    Excellent organization,

    including a variety of

    thoughtful transitions.

    The paper is written in

    proper format with only 1-2

    errors. All sources used for

    quotes and facts are credible

    and most are cited correctly.

    Adequate organization

    includes a variety of

    appropriate transitions.

    The paper is written in

    proper format with only 3-5

    errors. Most sources used for

    quotes and facts are credible

    and cited correctly. Essay is

    poorly organized, but may

    include a few effective

    transitions.

    The paper is not written in

    proper format. Many sources

    used for quotes and facts are

    less than credible (suspect)

    and/or are not cited

    correctly. Essay is

    disorganized and does not

    include effective transitions.

    Format – APA Format,

    Citations,

    Organization,

    Transitions (15 Points)

    Definition of a Typical

    Hacker (15 Points)

    Descriptions of

    Common Hackers

    (60 Points)

    Mechanics -Grammar,

    Punctuation, Spelling

    (10 Points)