Explain what psychological factor can often motivate hackers

Assignment Help Computer Engineering
Reference no: EM131434753

Assignment

Course Objective

Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.

The class discusses ethical and nonethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.

Topic 1: Hacker Motivation and Threat Mitigation

Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.

What can organizations do to be more proactive in identifying and mitigating hacker threats?

Background:

1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 - older but, I believe, still relevant and a solid short introduction]

2. Understanding a Hacker's Mind: A Psychological Insight into the Hijacking of Identities [2004 - RSA. Also still useful]

3. The Risk Propensity and Rationality of Computer Hackers [2010 ]

Topic 2: Ethical and Nonethical Hackers

As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation.

How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?

Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)? (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation....)

Background:?Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 - abstract only.

One page per topic with references on seprate page (4 pages total)

Reference no: EM131434753

Questions Cloud

Identification of the protein name and organism : Describe your observations during the main steps of the construction of the model in an essay-like document of 3000 words including figure legends and references.
Understand the risks of operating a small business : Know the benefits and risks of completion? Understand the risks of operating a small business? Know the basics of a business plan? se and interpret financial ratios? Know the various classifications of marketing?
Calculate the expected holding-period return : Calculate the expected holding-period return and standard deviation of the holding-period return. All three scenarios are equally likely. (Do not round intermediate calculations. Round your answers to 2 decimal places.)
What were the total cost and book value of property : What were the total cost and book value of property, plant, and equipment at September 27, 2014? Using the notes to find financial statements, what method or methods of depreciation are used by Apple for financial reporting purposes
Explain what psychological factor can often motivate hackers : Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.
What interventions are recommended for different bmis : Read Obesity Treatments and Controversies paying close attention to the difference between medical success in weight loss and success as defined by dieters. Also notice what interventions are recommended for different BMIs.
Calculating flotation costs : Suppose your company needs $35 million to build a new assembly line. Your target debt-equity ratio is .75. The flotation cost for new equity is 6 percent, but the flotation cost for debt is only 2 percent. Your boss has decided to fund the project..
Calculate the market potential for life insurance : The potential market represents all active duty military members, all veterans, and their families. Assume that according to the United States Department of Defense, as of December 31, 2014 there were 1, 360, 091 active duty personnel in all armed se..
Create a declaration in your style sheet to set font-family : Create a declaration in your style sheet to set the font-family, color, and font-size properties of level-one headings (optionally, you may create declarations for other levels of headings, as well).

Reviews

Write a Review

Computer Engineering Questions & Answers

  What technology characteristics should be evaluated

explain how Web services can be used to effectively integrate business applications and data. Search the Web for resources on current Web services such as XML, SOAP, UDDI and WSDL. Discuss how each is used, including examples from industry.

  Pda and cell phone investigations

One of the aspects of the forensics procedure will be to secure and analyze the PDAs and Cell phones. What kinds of the tools may be selected for use in PDA and Cell phone investigations.

  Identity theft contribution to terrorism

Pharming, Phishing and Various types of Identity theft contribution to Terrorism in 21st Century.  Provide supporting facts in the form of "charts/graphs" (3 to 4 graphs, no more than 2 pages) and should provide citations for the source work.

  Give employee''s pay according to that employee''s pay code

A company pay its employees as managers (who receive a fixed weekly salary), hourly workers (who receive a fixed hourly wage for up to the 40 hours they work and "time-and-a-half"- 1.5 times their hourly wage- for overtime hours workers).

  Write down a recursive function "sumdigits"

modify a recursive function "sumDigits" in C++, that receives an integer as argument by reference and returns the sum of digits representing this integer. Also write a main function to test this function.

  Write an illustration of a nested if structure and build it

write a 200- to 300-word short-answer response to the followinga create an example of a nested if structure and build

  Assess the significance of measuring storage efficiency in

question 1. evaluate the importance of measuring storage efficiency in an organizations storage system. suggest the

  Prove that for all positive real numbers a and b

CSC165H1 Problem Set. Prove the following statements about little-oh, using only the definitions of little-oh and Big-Oh. You may not use any external properties of Big-Oh in this question. Prove that for all positive real numbers a and b, if a

  Find the difference between a blog and a wiki

Explains what blogs are and how they could be used in a business environment. Give two examples of how a business might use blogs. What is the difference between a blog and a wiki.

  You are required to investigate and research current

you are required to investigate and research current procurement and tendering systems.a comprehensive list comparing

  Determine the capacitance full-wave rectifier

Assume the input signal to a rectifier circuit has a peak value of Vm = 12 V and is at a frequency of 60 Hz. Assume the output load resistance is R = 2kΩ and the ripple voltage is to be limited to Vr= 0.4 V. Determine the capacitance required to y..

  What requirements analysis technique would you recommend

What requirements analysis technique or techniques would you recommend for this situation? Explain your answer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd