Potential impact on individual organizations

Assignment Help Basic Computer Science
Reference no: EM131260222

Course Objective

Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.

The class discusses ethical and nonethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.

Topic 1:  Hacker Motivation and Threat Mitigation

Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.

What can organizations do to be more proactive in identifying and mitigating hacker threats?

Background:

1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 - older but, I believe, still relevant and a solid short introduction]

2. Understanding a Hacker's Mind: A Psychological Insight into the Hijacking of Identities [2004 - RSA.  Also still useful]

3. The Risk Propensity and Rationality of Computer Hackers [2010 ]

Topic 2:  Ethical and Nonethical Hackers

As the cybersecurity field expands, the larger community discourse leads to changes in terminology.  While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation.

How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?

Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)?  (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation....)

Background:?Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 - abstract only.

Topic 3:  Hacking as an "Addiction"

Some mental health and criminal justice professionals contend that hacking is an "addiction," and causes obsessive, risk-taking behavior in a manner similar to illegal narcotics-hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policy makers look toward treatment, rather than incarceration, as to the disposition of hacker cases? Why or why not?

How do profiles of ethical and non-ethical hackers differ?

Background:  https://bit.ly/PzE9fO.

Topic 4 - Profiling of Cybercriminals

While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals? What sort of things do we already know about the personalities of cybercriminals? Do we have enough evidence to indicate there is a distinct psychological pattern that would help in the apprehension of cybercriminals?

Background:

1. Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall [2011 -summary]

2. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics [2011]

Reference no: EM131260222

Questions Cloud

Variety of equipment to customers worldwide : Packard Bell leases a variety of equipment to customers worldwide. On January 2, 2015, Packard Bell leased a Robot Router Machine (Equipment) to Southwestern Bell. Prepare all journal entries for the calendar year 2015 for Packard Bell (Lessor) and S..
Linear programing formulation and sensitivity analysis : "If I follow your recommended approach to managing my farm so as to maximize my operating income next month, how much will I earn from selling the 100 hogs?" asks Igor. "How many hogs will I sell, and how much corn, food scraps, and potatoes shoul..
Prepare separate entries for each transaction on the books : On June 10, Tuzun Company purchased $8,000 of merchandise from Epps Company, FOB shipping point, terms 2/10, n/30. Tuzun pays the freight costs of $400 on June 11. Prepare separate entries for each transaction on the books of Tuzun Company
What is the total production of assignments : Determine the assignment of jobs to machines that will maximize total production. -  What is the total production of your assignments.
Potential impact on individual organizations : Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.
What do you feel about the impact of technology : Does it really matter if some of the older employees are having a hard time adjusting; aren't they on their way out anyway and they can be replaced by the technology? On balance, what do you feel about the impact of technology?
Discusses those conflicts could be seen in delivery system : Write a paper of 1,000-1,200 words that compares and contrasts the competing visions of health care administration among stakeholders, identifies the areas where they conflict, and discusses how those conflicts could be seen in the delivery system..
Using the LIFO inventory valuation method : Lawrence owns a small candy store that sells one type of candy. His beginning inventory of candy was made up of 10,000 boxes costing $1.50 per box ($15,000), and he made the following purchases of candy during the year: Calculate Lawrence's ending in..
What facts would you raise as red flags that need : What facts from these materials would you use to persuade someone to buy stock in the company? What facts would you raise as red flags that need further exploration?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd