Knowledge and background on hacktivists and hacktivist

Assignment Help Business Management
Reference no: EM131570926

Hacktivist

Hacktivists have roots in the hacker's culture. It is an up and coming movement where bad-actors use hacking as a method to promote a group's political agenda. The term originated in a forum called "The Cult of the Dead Cow". Hacktivist as the root of hacktivist can also border on acts of cyber terrorism for the effect of social change. Many hacktivist groups exist, however, one of the more well-known hacktivist groups is the group known as "Anonymous."

Now that you know a little knowledge and background on hacktivists and hacktivist, let's explore another case study.

Sandy was a friend of Jamie's from Dr. Wang's security lab course and was always a heavy advocate for different social causes around campus. He seemed to always be angry about something. He was secretly taking the course for two reasons: to learn different hacking and exploitation methods and to recruit other students during class for his cause. Sandy learned the exploitation techniques and methods very quickly. He gathered other students in the class that shared his beliefs and were quick studies as well. He and students that he had recruited often met directly after class on campus. Sandy was essentially starting his own hacktivist organization and encampment right there on campus.

He was always in tune with the latest social and local news of the day. He personally did not like the increase in reports of police brutality across the nation. Sandy did not like any of the potential 2016 presidential candidates, and he did not like how refugees were being treated in different nations and places abroad. Sandy organized the best and the brightest hackers that he could, and they happened to be from Dr. Wang's class. Sandy used the threat model and operandi of the well-known hacktivist group known as "Anonymous." Therefore, he named his first hacking operation "OpRefNation." He targeted different nations' embassies and department offices that handled refugee crises overseas. Sandy was able to Google and social engineer various IPs from the different embassies located inside of the United States. He started his various recon efforts to determine their operating systems and servers. Sandy and his team were soon ready to make their first strike.

"OpRefNation," was soon on its way to full execution. He loaded the IPs into the Metasploit and Armitage penetration testing tools and launched a very orchestrated Denial of Service attack which is also known as a DDOS attack against the targeted IPs. Metasploit and Armitage had embedded system tools such as "Nessus" and "nmap" to scan various systems to determine the victims' operating systems, IP networks and user directories.

The reconnaissance assisted the new hacktivist team in determining whether any types of vulnerabilities could be exploited by known zero-day exploits. One of the vulnerabilities allowed Sandy and his team to conduct a long DDOS campaign by SYN Flood attack. The SYN flood attack is usually conducted during the network connection of various network systems. It's the initial handshake process for synching the network packets for communication across the LAN.

Soon the embassy was inundated. Its network servers were not able to handle all of the packets coming in and crashed all of the embassy's system servers. "OpRefNation" was a success! Sandy and his team immediately announced the attack so that their hacktivist group could immediately take credit for the successful DDOS attack.

Case Study I Questions:

1. How did Sandy gain his cyber hacking skills?

2. What is a hacktivist?

3. What type of tools did Sandy and his team use to carry out the attack?

4. What type of attack was conducted?

5. How does this particular attack work?

6. What were some of the social issues that attributed to Sandy's hacktivist motivation in the first place?

Reference no: EM131570926

Questions Cloud

Increasing alphabetical order : Writing a program, which will ask the user how many names (one word, no spaces) they wish to enter. The program will then read that many names
How has social media helped solve and create problems : For this essay you are topic is ‘How has social media helped solve and create problems in countries outside the U.S.?' 5 or less use of the "to be" verb.
What is the state of addiction in u.s : What is the state of addiction in U.S.? What are the DAWN's two major concerns in the U.S. What do YOU personally consider the most important drug problem
Examine themes importance to childrens literature : Examine theme's importance to children's literature. Topics may include tricksters, anthropomorphic animals, the forest of transformation and ambiguous endings.
Knowledge and background on hacktivists and hacktivist : Now that you know a little knowledge and background on hacktivists and hacktivist, let's explore another case study.
Flag burning should be constitutionally protected speech : Do you think that flag burning should be constitutionally protected speech. What factors did you consider in reaching your determination?
What techniques algorithms ipsec : What techniques/algorithms IPSec uses to provide integrity property and whether these techniques also used to achieve confidentiality?
Systems development life cycle : The following are some of the phases in the systems development life cycle (SDLC): System analysis, system design, system implementation, system review.
Digital terrorism and criminology of computer crime : Digital Terrorism and Criminology of Computer Crime

Reviews

Write a Review

Business Management Questions & Answers

  Caselet on michael porter’s value chain management

The assignment in management is a two part assignment dealing 1.Theory of function of management. 2. Operations and Controlling.

  Mountain man brewing company

Mountain Man Brewing, a family owned business where Chris Prangel, the son of the president joins. Due to increase in the preference for light beer drinkers, Chris Prangel wants to introduce light beer version in Mountain Man. An analysis into the la..

  Mountain man brewing company

Mountain Man Brewing, a family owned business where Chris Prangel, the son of the president joins. An analysis into the launch of Mountain Man Light over the present Mountain Man Lager.

  Analysis of the case using the doing ethics technique

Analysis of the case using the Doing Ethics Technique (DET). Analysis of the ethical issue(s) from the perspective of an ICT professional, using the ACS Code of  Conduct and properly relating clauses from the ACS Code of Conduct to the ethical issue.

  Affiliations and partnerships

Affiliations and partnerships are frequently used to reach a larger local audience? Which options stand to avail for the Hotel manager and what problems do these pose.

  Innovation-friendly regulations

What influence (if any) can organizations exercise to encourage ‘innovation-friendly' regulations?

  Effect of regional and corporate cultural issues

Present your findings as a group powerpoint with an audio file. In addition individually write up your own conclusions as to the effects of regional cultural issues on the corporate organisational culture of this multinational company as it conducts ..

  Structure of business plan

This assignment shows a structure of business plan. The task is to write a business plane about a Diet Shop.

  Identify the purposes of different types of organisations

Identify the purposes of different types of organisations.

  Entrepreneur case study for analysis

Entrepreneur Case Study for Analysis. Analyze Robin Wolaner's suitability to be an entrepreneur

  Forecasting and business analysis

This problem requires you to apply your cross-sectional analysis skills to a real cross-sectional data set with the goal of answering a specific research question.

  Educational instructional leadership

Prepare a major handout on the key principles of instructional leadership

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd