1. A person who breaks into, or attempts to break into, or use, a computer network or system without authorization, often at random, for personal amusement or gratification, and not necessarily with malicious intent
(Source: ATIS)
2. A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. The term is often misused in a pejorative context, where "cracker" would be the correct term. See also: cracker.
(Source: RFC 1392)
3. An individual whose objective is to penetrate the security defences of a third party computer system or network.
(Source: ISO/IEC 27002:2005)
4. A person who uses a computer resource in a manner for which it is not intended or which is in conflict with the terms of an acceptable-use policy, but (unlike the work of a cracker) is not necessarily malicious in intent.
(Source: ATIS) |