Explain what psychological factor can often motivate hackers

Assignment Help Computer Engineering
Reference no: EM131434753

Assignment

Course Objective

Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.

The class discusses ethical and nonethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.

Topic 1: Hacker Motivation and Threat Mitigation

Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.

What can organizations do to be more proactive in identifying and mitigating hacker threats?

Background:

1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 - older but, I believe, still relevant and a solid short introduction]

2. Understanding a Hacker's Mind: A Psychological Insight into the Hijacking of Identities [2004 - RSA. Also still useful]

3. The Risk Propensity and Rationality of Computer Hackers [2010 ]

Topic 2: Ethical and Nonethical Hackers

As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation.

How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?

Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)? (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation....)

Background:?Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 - abstract only.

One page per topic with references on seprate page (4 pages total)

Reference no: EM131434753

Questions Cloud

Identification of the protein name and organism : Describe your observations during the main steps of the construction of the model in an essay-like document of 3000 words including figure legends and references.
Understand the risks of operating a small business : Know the benefits and risks of completion? Understand the risks of operating a small business? Know the basics of a business plan? se and interpret financial ratios? Know the various classifications of marketing?
Calculate the expected holding-period return : Calculate the expected holding-period return and standard deviation of the holding-period return. All three scenarios are equally likely. (Do not round intermediate calculations. Round your answers to 2 decimal places.)
What were the total cost and book value of property : What were the total cost and book value of property, plant, and equipment at September 27, 2014? Using the notes to find financial statements, what method or methods of depreciation are used by Apple for financial reporting purposes
Explain what psychological factor can often motivate hackers : Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.
What interventions are recommended for different bmis : Read Obesity Treatments and Controversies paying close attention to the difference between medical success in weight loss and success as defined by dieters. Also notice what interventions are recommended for different BMIs.
Calculating flotation costs : Suppose your company needs $35 million to build a new assembly line. Your target debt-equity ratio is .75. The flotation cost for new equity is 6 percent, but the flotation cost for debt is only 2 percent. Your boss has decided to fund the project..
Calculate the market potential for life insurance : The potential market represents all active duty military members, all veterans, and their families. Assume that according to the United States Department of Defense, as of December 31, 2014 there were 1, 360, 091 active duty personnel in all armed se..
Create a declaration in your style sheet to set font-family : Create a declaration in your style sheet to set the font-family, color, and font-size properties of level-one headings (optionally, you may create declarations for other levels of headings, as well).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write down an application that plays "guess the number"

Write an application that plays "guess the number" as follows: Your application chooses number to be guessed by selecting an integer at random in range 1-1000.

  Design a web page named taxes.html

design a Web page named taxes.html and enter the IncomeTax function into the HEAD (enclosed in SCRIPT tags). In the BODY of the page, prompt the user to enter values representing his or her income and itemized deduction. The page should call the I..

  Examine the ajax model in relation to good software design

examine the AJAX model in relation to good software design, and the essence of the quoted question. Will AJAX further promote the development of Web based software, or is it just another fad.

  How cookies can be used to store information on a computer

Describe how cookies can be used to store information on a computer and how the information can be retrieved by a PHP script. Assume that cookies are not disabled on the client.

  Give appropriate to string methods for all classes

create a class Employee with a name and salary.give appropriate to String methods for all classes

  What can be done to minimize the errors

Where are the majority of defects found in a final program introduced? What can be completed to minimize these errors.

  Example that utilizes some form of recursion

Java / XML example that utilizes some form of recursion. Include blocks of code and the XML with your example

  How the relationships can be classified

What are these different kinds of classifications? Do they overlap, or do they each tell us something unique about the entity relationship? Why is it important to classify each of these types in an ERD (entity relationship diagram) model?

  Create an application that generates a quiz

Create an application that generates a quiz

  Spreadsheet model of the heat transfer situation

Spreadsheet model of the heat transfer situation

  What are differences between oop and procedural programming

Response must be more than 250 words with a cited source. What are the differences between OOP and procedural programming?

  Classify traditional grade school algorithms

Classify traditional grade school algorithms

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd