Reference no: EM131260222
Course Objective
Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.
The class discusses ethical and nonethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.
Topic 1: Hacker Motivation and Threat Mitigation
Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.
What can organizations do to be more proactive in identifying and mitigating hacker threats?
Background:
1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 - older but, I believe, still relevant and a solid short introduction]
2. Understanding a Hacker's Mind: A Psychological Insight into the Hijacking of Identities [2004 - RSA. Also still useful]
3. The Risk Propensity and Rationality of Computer Hackers [2010 ]
Topic 2: Ethical and Nonethical Hackers
As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation.
How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?
Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)? (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation....)
Background:?Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 - abstract only.
Topic 3: Hacking as an "Addiction"
Some mental health and criminal justice professionals contend that hacking is an "addiction," and causes obsessive, risk-taking behavior in a manner similar to illegal narcotics-hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policy makers look toward treatment, rather than incarceration, as to the disposition of hacker cases? Why or why not?
How do profiles of ethical and non-ethical hackers differ?
Background: https://bit.ly/PzE9fO.
Topic 4 - Profiling of Cybercriminals
While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals? What sort of things do we already know about the personalities of cybercriminals? Do we have enough evidence to indicate there is a distinct psychological pattern that would help in the apprehension of cybercriminals?
Background:
1. Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall [2011 -summary]
2. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics [2011]
Variety of equipment to customers worldwide
: Packard Bell leases a variety of equipment to customers worldwide. On January 2, 2015, Packard Bell leased a Robot Router Machine (Equipment) to Southwestern Bell. Prepare all journal entries for the calendar year 2015 for Packard Bell (Lessor) and S..
|
Linear programing formulation and sensitivity analysis
: "If I follow your recommended approach to managing my farm so as to maximize my operating income next month, how much will I earn from selling the 100 hogs?" asks Igor. "How many hogs will I sell, and how much corn, food scraps, and potatoes shoul..
|
Prepare separate entries for each transaction on the books
: On June 10, Tuzun Company purchased $8,000 of merchandise from Epps Company, FOB shipping point, terms 2/10, n/30. Tuzun pays the freight costs of $400 on June 11. Prepare separate entries for each transaction on the books of Tuzun Company
|
What is the total production of assignments
: Determine the assignment of jobs to machines that will maximize total production. - What is the total production of your assignments.
|
Potential impact on individual organizations
: Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.
|
What do you feel about the impact of technology
: Does it really matter if some of the older employees are having a hard time adjusting; aren't they on their way out anyway and they can be replaced by the technology? On balance, what do you feel about the impact of technology?
|
Discusses those conflicts could be seen in delivery system
: Write a paper of 1,000-1,200 words that compares and contrasts the competing visions of health care administration among stakeholders, identifies the areas where they conflict, and discusses how those conflicts could be seen in the delivery system..
|
Using the LIFO inventory valuation method
: Lawrence owns a small candy store that sells one type of candy. His beginning inventory of candy was made up of 10,000 boxes costing $1.50 per box ($15,000), and he made the following purchases of candy during the year: Calculate Lawrence's ending in..
|
What facts would you raise as red flags that need
: What facts from these materials would you use to persuade someone to buy stock in the company? What facts would you raise as red flags that need further exploration?
|