About: List of computer criminals     Goto   Sponge   NotDistinct   Permalink

An Entity of Type : dbo:EthnicGroup, within Data Space : dbpedia.org associated with source document(s)
QRcode icon
http://dbpedia.org/describe/?url=http%3A%2F%2Fdbpedia.org%2Fresource%2FList_of_computer_criminals

Convicted computer criminals are people who are caught and convicted of computer crimes such as breaking into computers or computer networks. Computer crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (or identity theft) and electronic fraud.

AttributesValues
rdf:type
rdfs:label
  • List of computer criminals (en)
  • 被捕黑客列表 (zh)
rdfs:comment
  • 被捕駭客是指電腦犯罪(為之一),例如非法闖入電腦及電腦網絡,經法院審判後罪行成立的人。「電腦犯罪」大體上可被定義為影響資訊科技基礎建設的犯罪行為,包括非法入侵(未經授權的存取)、非法截取(透過技術手段截取電腦傳送的非公開性質電腦資料)、資料干擾(未經授權破壞、刪除、毀損、修改、隱藏電腦資料)、系統干擾(透過輸入、傳送、破壞、刪除、毀損、修改、隱藏電腦資料干擾電腦系統運作)、設備濫用、偽造(包括身份盜竊)、電子詐騙等。 在駭客次文化與電腦地下活動興起之初,由於白帽駭客間遵守著不成文的道德守則,電腦犯罪並不常見。電腦入侵的擁護者聲稱其動機是達到藝術與政治目的,但卻忽略了其手段的違法性。白帽駭客入侵電腦系統不為獲得不當得利、也不造成破壞,而是藉由此過程學習、深入了解電腦與電子安全系統。有些駭客甚至是為了讓系統的管理人員知道系統存在漏洞,以便在其他心懷不軌之徒利用此漏洞入侵前進行修補()。電腦工業成熟後,便出現許多為獲取自身利益而惡意入侵的駭客(),電腦犯罪因而漸形猖狂。 (zh)
  • Convicted computer criminals are people who are caught and convicted of computer crimes such as breaking into computers or computer networks. Computer crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (or identity theft) and electronic fraud. (en)
foaf:depiction
  • http://commons.wikimedia.org/wiki/Special:FilePath/Lamo-Mitnick-Poulsen.png
  • http://commons.wikimedia.org/wiki/Special:FilePath/Abene9_2005.jpg
dcterms:subject
Wikipage page ID
Wikipage revision ID
Link from a Wikipage to another Wikipage
Link from a Wikipage to an external page
sameAs
dbp:wikiPageUsesTemplate
Faceted Search & Find service v1.17_git139 as of Feb 29 2024


Alternative Linked Data Documents: ODE     Content Formats:   [cxml] [csv]     RDF   [text] [turtle] [ld+json] [rdf+json] [rdf+xml]     ODATA   [atom+xml] [odata+json]     Microdata   [microdata+json] [html]    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 08.03.3330 as of Mar 19 2024, on Linux (x86_64-generic-linux-glibc212), Single-Server Edition (378 GB total memory, 67 GB memory in use)
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2024 OpenLink Software