Hackers, crackers, carders and thieves are putting the squeeze on your network security. But what do you really know about them? What draws them to your network, and why do they do the things they do? Knowing the motivations of digital intruders helps you understand their behaviors, says Dr. Max Kilger, a social psychologist for the Honeynet Project. And understanding those behaviors can help you better protect your networks. . . .
Hackers, crackers, carders and thieves are putting the squeeze on your network security. But what do you really know about them? What draws them to your network, and why do they do the things they do?

Knowing the motivations of digital intruders helps you understand their behaviors, says Dr. Max Kilger, a social psychologist for the Honeynet Project. And understanding those behaviors can help you better protect your networks.

With this in mind, Network World dug into three real cases to analyze the attackers' behaviors and motivations. The incidents include an outsider attack on a financial institution, the rooting of an e-commerce hosting provider to heist credit card numbers and an employee copying a client database from a brokerage firm to take to a new job at a competitor.

Identifying what is common and what is unique about these attacks gives you information you can use to further your own protection, detection and forensics practices.

* Profile 1: The External Attack
* Profile 2: Credit Card Crooks
* Profile 3: Filching Files from Within
* Adrian Lamo: Profiling network administrators
* Meeces to pieces: What motivates the computer criminal
* Profiling defined