Potential impact on individual organizations

Assignment Help Basic Computer Science
Reference no: EM131260222

Course Objective

Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.

The class discusses ethical and nonethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.

Topic 1:  Hacker Motivation and Threat Mitigation

Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.

What can organizations do to be more proactive in identifying and mitigating hacker threats?

Background:

1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 - older but, I believe, still relevant and a solid short introduction]

2. Understanding a Hacker's Mind: A Psychological Insight into the Hijacking of Identities [2004 - RSA.  Also still useful]

3. The Risk Propensity and Rationality of Computer Hackers [2010 ]

Topic 2:  Ethical and Nonethical Hackers

As the cybersecurity field expands, the larger community discourse leads to changes in terminology.  While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation.

How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?

Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)?  (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation....)

Background:?Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 - abstract only.

Topic 3:  Hacking as an "Addiction"

Some mental health and criminal justice professionals contend that hacking is an "addiction," and causes obsessive, risk-taking behavior in a manner similar to illegal narcotics-hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policy makers look toward treatment, rather than incarceration, as to the disposition of hacker cases? Why or why not?

How do profiles of ethical and non-ethical hackers differ?

Background:  https://bit.ly/PzE9fO.

Topic 4 - Profiling of Cybercriminals

While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals? What sort of things do we already know about the personalities of cybercriminals? Do we have enough evidence to indicate there is a distinct psychological pattern that would help in the apprehension of cybercriminals?

Background:

1. Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall [2011 -summary]

2. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics [2011]

Reference no: EM131260222

Questions Cloud

Variety of equipment to customers worldwide : Packard Bell leases a variety of equipment to customers worldwide. On January 2, 2015, Packard Bell leased a Robot Router Machine (Equipment) to Southwestern Bell. Prepare all journal entries for the calendar year 2015 for Packard Bell (Lessor) and S..
Linear programing formulation and sensitivity analysis : "If I follow your recommended approach to managing my farm so as to maximize my operating income next month, how much will I earn from selling the 100 hogs?" asks Igor. "How many hogs will I sell, and how much corn, food scraps, and potatoes shoul..
Prepare separate entries for each transaction on the books : On June 10, Tuzun Company purchased $8,000 of merchandise from Epps Company, FOB shipping point, terms 2/10, n/30. Tuzun pays the freight costs of $400 on June 11. Prepare separate entries for each transaction on the books of Tuzun Company
What is the total production of assignments : Determine the assignment of jobs to machines that will maximize total production. -  What is the total production of your assignments.
Potential impact on individual organizations : Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.
What do you feel about the impact of technology : Does it really matter if some of the older employees are having a hard time adjusting; aren't they on their way out anyway and they can be replaced by the technology? On balance, what do you feel about the impact of technology?
Discusses those conflicts could be seen in delivery system : Write a paper of 1,000-1,200 words that compares and contrasts the competing visions of health care administration among stakeholders, identifies the areas where they conflict, and discusses how those conflicts could be seen in the delivery system..
Using the LIFO inventory valuation method : Lawrence owns a small candy store that sells one type of candy. His beginning inventory of candy was made up of 10,000 boxes costing $1.50 per box ($15,000), and he made the following purchases of candy during the year: Calculate Lawrence's ending in..
What facts would you raise as red flags that need : What facts from these materials would you use to persuade someone to buy stock in the company? What facts would you raise as red flags that need further exploration?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the hazards of going off the end

What are the hazards of "going off the end" of a list, an array, or a string. What are some strategies I could use to prevent this from happening, or to detect it?

  Assignment on corporate responsibility and marketing

Use the Internet to research the Apple Corporation, its current position and reputation regarding ethical and social responsibility, and the strategies that it currently employs to market its products.

  Static methods for processing an array of marks

For this task you will create a class containing a number of static methods for processing an array of marks, which are scores in a test. Each mark is an integer in the range 0 to 100 inclusive. On the Interact site for this subject, you will be p..

  Process of preparing the truth table

After the fourth clock pulse, the machine has to be again in the reset state, ready for the next sequence. Minimize the number of states needed.

  Largest and smallest number of the numbers

Write a program, using mainline logic (modules), that will takes an unlimited amount of positive integers (one at a time) and print out the largest and smallest number of the numbers. The program should read the numbers one at a time.

  Create a new project named introductory19

The file should contain four payroll amounts, with each amount appearing on a separate line in the file. Close the Introductory19.txt file.

  Create an online questionnaire

Create an online questionnaire using your account on SurveyMonkey® or QuestionPro, Give your participants a few days to complete the online questionnaire.

  Relationship between software and hardware

What can the relationship between software and hardware can be characterized as?

  What interval ratios in hyperfine quadruplet are expected

A D5/2 term in the optical spectrum of 39 19K has a hyperfine structure with four components. Find the spin of the nucleus.

  Planning database design-database modeling

The proper implementation of a database is essential to the success of the data performance functions of an organization.  Identify and evaluate at least three considerations that one must plan for when designing a database.

  Example of a working virtual circuit whose path traverses

Packets sent along this path should not, however, circulate indefinitely.

  Why might an executive sponsor act in this manner

Should a client have the right to communicate directly to the project staff (i.e., project office) rather than directly to the project manager, or should this be at the discretion of the project manager?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd