Crackers or hackers (people)
Write programs; manipulate technologies
Obtain unauthorized access to computers and networks
White hat hacker and black hat hacker
Distinction between good hackers and bad hackers
Good security scheme implementation
Identify risks
Determine how to protect threatened assets
Calculate costs to protect assets