Sign In
Not register? Register Now!
Pages:
5 pages/≈1375 words
Sources:
7 Sources
Style:
APA
Subject:
Social Sciences
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 24.3
Topic:

Week 8: Hacker culture, Psychological Aspects and Motivation Factors

Essay Instructions:

Individual Assignment #3 Instructions: Hacker Culture and Mitigation Course Objective: Examine hacker culture and related psychological and cultural aspects of cybersecurity from both the malicious actor and user's perspectives. Competencies: Critical thinking, communication skills Each student may choose one of the following organizations (e.g., a private company or a government agency), attack, or perpetrator and should identify a significant past incident in cybercrime or cyberwarfare related to it. The student will fully discuss the specifics of the cyber incident and analyze the motivation of the threat actors/attackers. Analyze the possible motivations of those who worked to defend assets against disruption, and describe motivations of any possible third-parties that may also have been involved. The student will also suggest methods for the organization to discourage hackers or intruders with similar motives and suggest management, policy or technology controls to protect the organization against similar attacks. Organizations, Attacks, and Perpetrators: Home Depot Target Sony Office of Personnel Management Saudi Aramco Turbo Tax NASA Operation Aurora US Bureau of Justice Statistics Stuxnet and Flame (US Government?) Dupont Chemical Boeing Johnson & Johnson Pfizer 4Chan Tricare Medical Opi Israel Sony News of the World Motorola Omega Engineering Syrian Electronic Army Njrat The Jester Blue Army Project Chanology The Estonian Cyberwar Shamoon (Iran?) Your paper should describe the type of incident and the actors: personalities, motivations, and other contributing cultural or psychological characteristics. You will find Module "Psychological Aspects of Cybersecurity" helpful with this assignment. Link your analysis to previous readings, interactive modules, and discussion topics, with appropriate citations. 
 At a minimum, the questions you must address are listed below: a. What descriptive labels might apply to this type of threat/incident? b. Regarding the threat actors: What sort of people would go after this information? Why would they want it? What will/can they do with it? How would they get it? How would potential attackers be identified? c. How would the organization try to discourage, or reduce the incentives that could attract possible threat actors? d. How would the organization protect against, or reduce damaging effects due to attempted attacks? Length 5-7 pages, due at the end of Week 8. Prepare your paper in Word format. It should be double-spaced with one-inch margins all around. The citations and the reference list in the paper should be formatted in accordance with APA 6th edition guidelines. Papers must include: cover page, table of contents, introduction, section headings and subheadings, conclusions, APA compliant in-text citations and list of references, and page numbers. The page count begins with the introduction and ends with the conclusions. The questions asked in the assignment should first be outlined (the outline is not included in the document), then the outline should be used to create the Table of Contents and the document sub-headings. The Introduction should briefly preview each sub-heading in the document. IMPORTANT: Before you submit your paper, you will need to run your assignment through Turnitin.com and receive an originality report. DO NOT WAIT UNTIL THE LAST MINUTE TO DO THIS. It may take several hours to a day or two for Turnitin.com to do this. After your paper meets all of the stated criteria in the posting, attach the paper AND the originality report in your Assignments Folder by the end of Week 8: Sunday, 11:59 p.m. eastern time.

Essay Sample Content Preview:

Hacker culture, Psychological Aspects and Motivation Factors
Name:
Institutional Affiliation:
Table of Contents Introduction. 3 Bureau of Justice Statistics incident 3 Psychological Aspects. 4 Hackers’ motivations. 4 Threat factors. 5 How hackers are identified. 6 Conclusion. 7 References. 9
Hacker culture, Psychological Aspects and Motivation Factors
Introduction
Bureau of Justice Statistics incident
The Bureau of Justice Statistics is a subdivision of the US’s Justice Department. The core function is to collect, analyze and publish data that are related to the crime committed throughout the United States of America. They have vital information that should be stored securely since its breach results in the loss of data considering that the department houses data on the crime and computer security incidences. The Bureau of Justice Statistics forms part of the 60% of the US organizations affected by hacking between 2005 and 2012 (BJS, 2015). Some of the computer security occurrences recorded in the US BJS include cases of information theft, pinging, spoofing, phishing, adware, and spyware. However, in 2012, the Bureau of Justice Statistics, an organization that stores computer security cases faced an incident where hackers who claimed to be the affiliates of an anonymous group hacked the organization’s website server. The incident claimed 1.7 gigabytes of data, such as e-mails from the public website belonging to the United States Bureau of Justice Statistics and documents were later uploaded to Pirate Bay, a file-sharing platform (PHYS, 2012). The hackers paraded themselves as Anonymous and the later examination of the hackers revealed that they were affiliated with AntiS3curityOPs Website, which has a history of attacking a Chicago summit by launching a distributed DOS attack just before the protest revolving around the NATO Chicago summit. From the BJS incident, it is evident that any organization that avails its data online for customer access requires effective defensive measures and protection against hackers and leakages. The protection systems should have the ability to detect and categorize criminal activities for further investigation. The Department of Bureau of Justice has an ineffective cybercrime measures to safeguard its sites and servers from hacking threats, distributed DOS and data breaches (Ribeiro, 2012).
Psychological Aspects
Hackers’ motivations
The inner working and motivations of the hackers in the contemporary technological savvy society are mysteries and complex, but the efforts to stop their actions are important as far as an organization wishes to secure its data. The damages as a result of hacking are perilous and complex following the difficulties in understanding the reasons why hackers engaged in the activity (Regis University, 2015). The initial step to mitigate hacking for IT experts is understanding the principal factors motivating the hackers. Various motivating factors lead to the hackers gaining access and control to the company. The motivational factors include hacking for political machinations, personal and financial gains, network vulnerability, and idealism to hacking as a thrilling or challenging activity. ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to culture essays:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!