Explain what psychological factor can often motivate hackers

Assignment Help Computer Engineering
Reference no: EM131434753

Assignment

Course Objective

Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.

The class discusses ethical and nonethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.

Topic 1: Hacker Motivation and Threat Mitigation

Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.

What can organizations do to be more proactive in identifying and mitigating hacker threats?

Background:

1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 - older but, I believe, still relevant and a solid short introduction]

2. Understanding a Hacker's Mind: A Psychological Insight into the Hijacking of Identities [2004 - RSA. Also still useful]

3. The Risk Propensity and Rationality of Computer Hackers [2010 ]

Topic 2: Ethical and Nonethical Hackers

As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation.

How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?

Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)? (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation....)

Background:?Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 - abstract only.

One page per topic with references on seprate page (4 pages total)

Reference no: EM131434753

Questions Cloud

Identification of the protein name and organism : Describe your observations during the main steps of the construction of the model in an essay-like document of 3000 words including figure legends and references.
Understand the risks of operating a small business : Know the benefits and risks of completion? Understand the risks of operating a small business? Know the basics of a business plan? se and interpret financial ratios? Know the various classifications of marketing?
Calculate the expected holding-period return : Calculate the expected holding-period return and standard deviation of the holding-period return. All three scenarios are equally likely. (Do not round intermediate calculations. Round your answers to 2 decimal places.)
What were the total cost and book value of property : What were the total cost and book value of property, plant, and equipment at September 27, 2014? Using the notes to find financial statements, what method or methods of depreciation are used by Apple for financial reporting purposes
Explain what psychological factor can often motivate hackers : Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.
What interventions are recommended for different bmis : Read Obesity Treatments and Controversies paying close attention to the difference between medical success in weight loss and success as defined by dieters. Also notice what interventions are recommended for different BMIs.
Calculating flotation costs : Suppose your company needs $35 million to build a new assembly line. Your target debt-equity ratio is .75. The flotation cost for new equity is 6 percent, but the flotation cost for debt is only 2 percent. Your boss has decided to fund the project..
Calculate the market potential for life insurance : The potential market represents all active duty military members, all veterans, and their families. Assume that according to the United States Department of Defense, as of December 31, 2014 there were 1, 360, 091 active duty personnel in all armed se..
Create a declaration in your style sheet to set font-family : Create a declaration in your style sheet to set the font-family, color, and font-size properties of level-one headings (optionally, you may create declarations for other levels of headings, as well).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd