Potential impact on individual organizations

Assignment Help Basic Computer Science
Reference no: EM131260222

Course Objective

Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.

The class discusses ethical and nonethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.

Topic 1:  Hacker Motivation and Threat Mitigation

Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.

What can organizations do to be more proactive in identifying and mitigating hacker threats?

Background:

1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 - older but, I believe, still relevant and a solid short introduction]

2. Understanding a Hacker's Mind: A Psychological Insight into the Hijacking of Identities [2004 - RSA.  Also still useful]

3. The Risk Propensity and Rationality of Computer Hackers [2010 ]

Topic 2:  Ethical and Nonethical Hackers

As the cybersecurity field expands, the larger community discourse leads to changes in terminology.  While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation.

How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?

Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)?  (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation....)

Background:?Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 - abstract only.

Topic 3:  Hacking as an "Addiction"

Some mental health and criminal justice professionals contend that hacking is an "addiction," and causes obsessive, risk-taking behavior in a manner similar to illegal narcotics-hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policy makers look toward treatment, rather than incarceration, as to the disposition of hacker cases? Why or why not?

How do profiles of ethical and non-ethical hackers differ?

Background:  https://bit.ly/PzE9fO.

Topic 4 - Profiling of Cybercriminals

While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals? What sort of things do we already know about the personalities of cybercriminals? Do we have enough evidence to indicate there is a distinct psychological pattern that would help in the apprehension of cybercriminals?

Background:

1. Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall [2011 -summary]

2. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics [2011]

Reference no: EM131260222

Questions Cloud

Variety of equipment to customers worldwide : Packard Bell leases a variety of equipment to customers worldwide. On January 2, 2015, Packard Bell leased a Robot Router Machine (Equipment) to Southwestern Bell. Prepare all journal entries for the calendar year 2015 for Packard Bell (Lessor) and S..
Linear programing formulation and sensitivity analysis : "If I follow your recommended approach to managing my farm so as to maximize my operating income next month, how much will I earn from selling the 100 hogs?" asks Igor. "How many hogs will I sell, and how much corn, food scraps, and potatoes shoul..
Prepare separate entries for each transaction on the books : On June 10, Tuzun Company purchased $8,000 of merchandise from Epps Company, FOB shipping point, terms 2/10, n/30. Tuzun pays the freight costs of $400 on June 11. Prepare separate entries for each transaction on the books of Tuzun Company
What is the total production of assignments : Determine the assignment of jobs to machines that will maximize total production. -  What is the total production of your assignments.
Potential impact on individual organizations : Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.
What do you feel about the impact of technology : Does it really matter if some of the older employees are having a hard time adjusting; aren't they on their way out anyway and they can be replaced by the technology? On balance, what do you feel about the impact of technology?
Discusses those conflicts could be seen in delivery system : Write a paper of 1,000-1,200 words that compares and contrasts the competing visions of health care administration among stakeholders, identifies the areas where they conflict, and discusses how those conflicts could be seen in the delivery system..
Using the LIFO inventory valuation method : Lawrence owns a small candy store that sells one type of candy. His beginning inventory of candy was made up of 10,000 boxes costing $1.50 per box ($15,000), and he made the following purchases of candy during the year: Calculate Lawrence's ending in..
What facts would you raise as red flags that need : What facts from these materials would you use to persuade someone to buy stock in the company? What facts would you raise as red flags that need further exploration?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Channel width needs to be twice range of frequencies

Based on the protocol,assume the channel width needs to be twice the range of frequencies used. How wide must the band be to accommodate 100 channels?

  Business software applications

Business software applications (apps) are computer programs that support a specific task or business process. Describe what you think an application program is. What are some of your favorite apps, why?

  Add text in dialog balloons or thought bubbles

In addition, the text should match the personality of the character with whom it is associated or the tone of the message itself.

  Different version of grade calculator program

Create a different version of the Grade Calculator program from the zybook chapter 3 that calculates the overall grade for four equally-weighted programming assignments, where each assignment is graded out of 50 points.

  How many bits in the physical address specify the frame

How many bits in each page table entry? Assume each page table entry contains a valid/invalid bit.

  What are ways that data can be hidden within storage media

What are some of the ways that data can be hidden within storage media? Describe two methods in detail and possible ways this hidden data can be detected.

  What is the final value of loopcount

What is the final value of loopCount after control exits the following loo? loopCount = 1; NL while ( loopCount

  Create a list of all the arrival and departure events

create a list of all the arrival and departure events before the simulation begins?

  Write a web application that will view the report

Write a Web application that will view the report of Exercise 1

  Estimate benefit of a revenue-generating system

Is management able to estimate the benefit of a revenue-generating system or must the system be built on faith? Why?

  Attention-for international business

Please read the proposal from Senator Schumer about taxing on overseas customer calls (http://www.observer-review.com/schumer-wants-tax-on-outsourced-calls-cms-1407). Please present and discuss at least two reasons to support his proposal and two..

  When is the esd equipment needed

1. When changing the CPU on a system board, what is the most critical item to replace? 2. Where is the BIOS stored on the computer? 3.What tools do you use to open the case on the laptop/LCD? 4. When is the ESD equipment needed?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd