Profiling Hackers - Raoul Chiesa, Stefania Ducci, Silvio Ciappi

Profiling Hackers

Buch | Softcover
279 Seiten
2008
Auerbach (Verlag)
978-1-4200-8693-5 (ISBN)
53,60 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Offers insight into the hacking realm by featuring tales about characters that practice hacking as an art. Focusing on the relationship between technology and crime and drawn from the research conducted by the Hackers Profiling Project (HPP), this volume applies the behavioral science of criminal profiling to the world of internet predators.
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing tales about bizarre characters that practice hacking as an art.





Focusing on the relationship between technology and crime and drawn from the research conducted by the Hackers Profiling Project (HPP), this volume applies the behavioral science of criminal profiling to the world of internet predators. The authors reveal hidden aspects of the cyber-crime underground, answering questions such as: Who is a real hacker? What life does a hacker lead when not on-line? Is it possible to determine a hacker’s profile on the basis of his behavior or types of intrusion? What is the motive behind phishing, pharming, viruses, and worms?





After gaining notoriety for breaking into many high-profile computer systems, the Italian hacker Raoul Chiesa turned to ethical hacking in 1995. Today he uses his skills and abilities to find ways to protect networks and computer systems. Stefania Ducci is a member of the Counter Human Trafficking and Emerging Crimes Unit at the United Nations Interregional Crime and Justice Research Institute (UNICRI). Silvio Ciappi is a criminologist who lectures at the University of Pisa and studies criminal profiling. These three experts with vastly different backgrounds explore the clandestine network of cyber-criminals, providing an unparalleled glimpse into the secret lives of these malevolent individuals.

Mediaservice.net, Italy United Nations Interregional Crime and Justice Research Institute, Turin, Italy University of Pisa, Italy

Introduction to Criminal Profiling


Brief History of Criminal Profiling


Serial Crimes and Criminal Profiling: How to Interpret Them


Criminal Profiling: Applying it to Study Hackers


Introducing "Cybercrime"


Information Technology and Digital Crimes


1980, 1990, 2000: Three Ways of Looking at Cybercrime


Mr. Smith, Hackers and Digital Crimes in the IT Society


Digital Crimes vs. Hacking: Terminology and Definitions


Conclusions


To Be, Think, and Live as a Hacker


Evolution of the Term


The Artifacts of the Hacker Culture


One Ethics or More?


Understanding Hackers: How Far Have We Gone?


What are the Motives Behind Hacking?


The Colours of the Underground


Commonly Recognized Hacker Categories


The HPP Project


The Planning Phase


The Questionnaires


First Level Analysis


Second Level Analysis


Who are Hackers? Part 1


What are We Trying to Understand?


Gender and Age Group


Background and Place of Residence


How Hackers View Themselves


Family Background


Socio-Economic Background


Social Relationships


Leisure Activities


Education


Professional Environment


Psychological Traits


To Be or to Appear: the Level of Self-Esteem


Presence of Multiple Personalities


Psychophysical Conditions


Alcohol & Drug Abuse and Dependencies


Definition or Self-Definition: What is a Real Hacker?


Relationship Data


Who are Hackers? Part 2


Handle and Nickname


Starting Age


Learning and Training Modalities


The Mentor's Role


Technical Capacities (Know-How)


Hacking, Phreaking or Carding: the Reasons Behind the Choice


Networks, Technologies and Operating Systems


Techniques Used to Penetrate a System


Individual and Group Attacks


The Art of War: Examples of Attack Techniques


Operating Inside a Target System


The Hacker’s Signature


Relationships with the System Administrators


Motivations


The Power Trip


Lone Hackers


Hacker Groups


Favourite Targets and Reasons


Specializations


Principles of the Hacker Ethics


Acceptance or Refusal of the Hacker Ethics


Crashed Systems


Hacking/Phreaking Addiction


Perception of the Illegality of Their Actions


Offences Perpetrated with the Aid of IT Devices


Offences Perpetrated without the Use of IT Devices


Fear of Discovery, Arrest and Conviction


The Law as Deterrent


Effect of Convictions


Leaving the Hacker Scene


Beyond Hacking


Conclusions


Appendices

Erscheint lt. Verlag 26.11.2008
Zusatzinfo 4 Illustrations, black and white
Verlagsort London
Sprache englisch
Maße 156 x 234 mm
Gewicht 408 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
Recht / Steuern Strafrecht Kriminologie
ISBN-10 1-4200-8693-6 / 1420086936
ISBN-13 978-1-4200-8693-5 / 9781420086935
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99