Insider
Those are the objects or persons that add the virus software or piece of code into the organization's system or database for their personal gain or for the profit of another organization.
there can be an employee of that organization or company or part-time employee, any contractor or businessman person that can be a familiar of that company.
This type of person has some privileges and rights to access some private type of data that can't access by any unauthorized person. He or she misuses their privileges and give's that private information to another person who uses that information and harms that organization.
Criminal organization
A Cyber-Criminal is a criminal that makes a crime through a computer device or any other electrical smart device. they use the as a weapon.
They target any type of software system, Database, or personal computer.
They attack anyone for any personal gain or for the organization's profit and make a target in the loss.
They use computers in this crime in three components
As a weapon
As a target
As an accessory
- As a weapon The hacker or cracker uses the computer as a weapon to load the virus or threats into the target's computer. for sending spam messages to another's computer for fraud, theft of data, and getting back account/Id.
- As a target The hacker sends the malware and viruses to the target and clear all information and get access to those computer or PC. -They do some takes or get access like their ID and get those privileges and perform illegal tasks.
- As a accessory The hackers use the computer as an accessory to store the data it. And they store some illegal information in it and hide those from everyone.
The cybercriminals work in a group that was divided into 4 parts mainly:
Programmer:
They write the programs and make the software to hack the system or create tools that help to access data unauthorisedly.
Distributers:
They sell the data and information that comes after getting hack the system or any database for money or other there demands.
IT Expert:
They manage the overall server of their group and manage the devices and boost the performance of the device and help to go faster in work.
Hackers:
They actually exploit and damage the server and get those vulnerabilities.
Top comments (2)
Hi Yash, it looks like you are using dev.to as a store for various terms in computing and cyber security, perhaps you would like to tag your posts with #terminology, so others can both find them, and know what to expect before opening the post? π
Thank you so much sir for your Support. and I will include this tag in future posts.