Assignment: The Psychological Characteristics of a Hacker
Assignment: The Psychological Characteristics of a Hacker
Question:
Describe the characteristics of a typical hacker. Then provide descriptions of six typical types of hackers, based on psychological characteristics.
ORDER NOW FOR COMPREHENSIVE, PLAGIARISM-FREE PAPERS
The different types of hackers that you have to describe and elaborate on in the assignment:
-Pioneers. Individuals who are fascinated by the evolving technology of telecommunications and explore it without knowing exactly what they are going to find are called pioneers; few hard-core criminals are found among this group.
-Scamps. Hackers with a sense of fun, with no intention to harm, are referred to as scamps.
-Explorers. Explorers are hackers motivated by their delight in discoveries associated with breaking into new computer systems—the farther away geographically such systems are from the hackers’ physical locations or the more secure such systems are, the greater the excitement associated with breaking into them.
-Game players. Game players enjoy defeating software or system copy protection and may seek to illegally access computer systems with games to play. Hacking itself becomes a game for this sort of hacker.
-Vandals. Malicious hackers who deliberately cause damage with no apparent gain for themselves are called vandals. The original 414 Gang in Milwaukee, which broke into the Sloan-Kettering Cancer Institute’s computers and wiped out patient records, is an example of this type of hacker.
-Addicts. Classic computer nerds who are addicted to hacking and to computer technology are addicts. They may also be addicted to illicit drugs (some hacker bulletin board systems post information on drugs as well as on modems, passwords, and vulnerable systems)
-
T05KAssignment8.docx
Assignment 08
T05 Criminal Behavior
Directions: Be sure to make an electronic copy of your answer before submitting it to Ashworth College for grading. Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be four (4) pages in length; refer to the “Assignment Format” page for specific format requirements.
Describe the characteristics of a typical hacker. Then provide descriptions of six typical types of hackers, based on psychological characteristics.
Grading Rubric
Please refer to the rubric below for the grading criteria for this assignment.
CATEGORYExemplarySatisfactoryUnsatisfactoryUnacceptable
15 points 10 points 8 points 6 points
Student provides a clear,
logical definition of a typical
hacker.
Student provides a mostly
clear, logical definition of a
typical hacker.
Student provides a weak or
unclear definition of a typical
hacker.
Student provides a poor
definition of a typical hacker.
60 points 50 points 40 points 30 points
Student clearly and logically
describes all 6 types of
common hackers. Student
must describe pioneers,
scamps, explorers, game
players, vandals, and addicts
in order to receive full credit.
Student is mostly clear and
logical in describing 5-6 types
of common hackers.
Student provides weak or
unclear descriptions of 3-4
types of common hackers.
Student provides poor
descriptions of 1-2 types of
common hackers.
10 points 8 points 5 points 2 points
Student makes no errors in
grammar or spelling that
distract the reader from the
content.
Student makes 1-2 errors in
grammar or spelling that
distract the reader from the
content.
Student makes 3-4 errors in
grammar or spelling that
distract the reader from the
content.
Student makes more than 4
errors in grammar or spelling
that distract the reader from
the content.
15 points 12 points 8 points 5 points
The paper is written in
proper format. All sources
used for quotes and facts are
credible and cited correctly.
Excellent organization,
including a variety of
thoughtful transitions.
The paper is written in
proper format with only 1-2
errors. All sources used for
quotes and facts are credible
and most are cited correctly.
Adequate organization
includes a variety of
appropriate transitions.
The paper is written in
proper format with only 3-5
errors. Most sources used for
quotes and facts are credible
and cited correctly. Essay is
poorly organized, but may
include a few effective
transitions.
The paper is not written in
proper format. Many sources
used for quotes and facts are
less than credible (suspect)
and/or are not cited
correctly. Essay is
disorganized and does not
include effective transitions.
Format – APA Format,
Citations,
Organization,
Transitions (15 Points)
Definition of a Typical
Hacker (15 Points)
Descriptions of
Common Hackers
(60 Points)
Mechanics -Grammar,
Punctuation, Spelling
(10 Points)