Sign In
Not register? Register Now!
Pages:
4 pages/β‰ˆ1100 words
Sources:
3 Sources
Style:
APA
Subject:
IT & Computer Science
Type:
Case Study
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 24.3
Topic:

Cybercriminals: Who they Are and their Motivations and Backgrounds

Case Study Instructions:

In previous lectures we discussed what a global cyber threat is as well as who is a cyber criminal. However, these a simply definitions and explanations of WHAT they are, not WHO they are. For this assignment, the goal is for you to dive into the mind of a cybercriminal, exploring their potential motivations and backgrounds.
For this assignment, prepare a short paper that is 2-3 pages double spaced with a professional cover page and bibliography (cover page and bibliography do not count towards the page limit). In this paper, treat it as a short report or briefing to senior leadership within your organization. Outline who these potential threat actors are and why it is important for us to understand them. Provide a brief detail of what constitutes a cybercriminal (the what), but be sure to focus more on the "who" aspect.
Utilize at least 3 professional references (wikipedia does not count) such as academic journal articles, news reports, government websites, consulting firm white papers etc. to help you build this profile and support your work
https://www(dot)securitymagazine(dot)com/articles/96146-5-cybersecurity-threats-for-businesses-in-2021and-3-tips-to-combat-them
https://expertinsights(dot)com/insights/the-top-10-phishing-simulation-and-testing-solutions/

Case Study Sample Content Preview:

Case Study: Cybercriminals
Name
Department, Institution Affiliation
Course Code; Course Name
Instructor's Name
Date
Case Study: Cybercriminals
Understanding who cybercriminals are is significant for every business due to increased technological advancement and the digital age. When addressing who are cybercriminals, it is necessary to focus on their potential motivations and background, making it easy to thwart their plans. After understanding the motivations and backgrounds of cybercriminals, it is also necessary to determine what constitutes them for effective management of their activities. Cybercriminals impose significant threats to contemporary businesses due to their ill intentions and high-level digital skills (Luchetti, 2018). It is only possible to offer adequate network security after identifying the motivations and backgrounds of the cybercriminals. The information on cybercriminals allows the business experts to focus on major testing and simulation solutions for business growth, such as tracking tools and reporting plugins. The paper addresses who cybercriminals are by diving into their minds and addressing their motivations, backgrounds, constitution, and importance of understanding them.
Who Cybercriminals are
Cybercriminals are teams or groups who participate in malicious activities using digital systems and technology advancement. They conduct such activities purposefully to steal vital and critical company information (Kigerl, 2018). They can also access specific underground markets in deep websites and participate in illegal trading of malicious goods. Some of the malicious goods most cybercriminals trade include stolen data and hacking tools. Cybercriminals may also coordinate with some company officials to execute their malicious damages. It is necessary to understand that there is a big difference between threats actors and cybercriminals. Threat actors focus on specific target attacks pursuing and targeting the company infrastructures, while cybercriminals are individuals who focus on a specific company or entity but work as a group with similar programs, online behaviors, and platforms. Cybercriminals use specific steps to identify the key information they need from different entities. Therefore, after understanding the cybercriminals, it is necessary to integrate their motivations.
Threat Actors
The major examples of these threat actors are identity thieves and phishing scammers. Identity thieves are critical groups of cybercriminals who gain access to the organization to acquire personal information (Luchetti, 2018). Some of the details they acquire include bank accounts, phone numbers, and addresses. They use the acquired information to execute specific financial transactions. Identity thieves can also use the information identified to jeopardize to trace the company's financial status leading to adverse impacts on the growth. They are a group of individuals with the main intention of profit gain and target different corporations and enterprises. Therefore, managing identity thieves is critical since their intentions are not clear. Lastly, phishing scammers are also cybercriminals who access the organization's computers to hold sensitive information that can allow them to mani...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Case Study Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!