Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Course Objective

Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole.

The class discusses ethical and nonethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats.

Topic 1:  Hacker Motivation and Threat Mitigation

Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc....), and give examples where these motivations were a factor in a cyberattack.

What can organizations do to be more proactive in identifying and mitigating hacker threats?

Background:

1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 - older but, I believe, still relevant and a solid short introduction]

2. Understanding a Hacker's Mind: A Psychological Insight into the Hijacking of Identities [2004 - RSA.  Also still useful]

3. The Risk Propensity and Rationality of Computer Hackers [2010 ]

Topic 2:  Ethical and Nonethical Hackers

As the cybersecurity field expands, the larger community discourse leads to changes in terminology.  While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation.

How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?

Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)?  (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation....)

Background:?Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 - abstract only.

Topic 3:  Hacking as an "Addiction"

Some mental health and criminal justice professionals contend that hacking is an "addiction," and causes obsessive, risk-taking behavior in a manner similar to illegal narcotics-hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Should policy makers look toward treatment, rather than incarceration, as to the disposition of hacker cases? Why or why not?

How do profiles of ethical and non-ethical hackers differ?

Background:  http://bit.ly/PzE9fO.

Topic 4 - Profiling of Cybercriminals

While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals? What sort of things do we already know about the personalities of cybercriminals? Do we have enough evidence to indicate there is a distinct psychological pattern that would help in the apprehension of cybercriminals?

Background:

1. Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall [2011 -summary]

2. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics [2011]

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92015007
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Can someone right the code for hangman in java the game

Can someone right the code for Hangman in java. The game would start off by asking the user if they were playing 1 person or two person hangman. If the user said 1 person then the game would print the spaces for the word ...

Question suppose that we want to create a divide and

Question : Suppose that we want to create a divide and conquer matrix multiplication algorithm for square matrices. Assuming that n is a power of three, the algorithm divides each matrix of A, D, and C into nine equi-siz ...

You are the senior information security manager for a

You are the senior information security manager for a federal agency. You received a phone call from an employee stating that his laptop was stolen from his workstation. He tells you that the laptop has at least 20 cases ...

Requirementsdesign and implement an application with a

Requirements Design and implement an application with a graphical user interface to manage a library of songs. A song is uniquely identified by name and artist (case insensitive). Your application should have a SINGLE WI ...

We live in kapurkua a small island in the mediterranean

We live in Kapurkua, a small island in the mediterranean between Greece and Spain (no, it doesn't really exist so don't look it up in the map). In the island we produce and consume canoes, latreks (a garment that is comf ...

Question suppose three items r s and t are placed in a

Question : Suppose three items R, S, and T are placed in a queue in that order. Then one item is removed from the queue before a fourth item, X is placed in the queue. Then one item is removed from the queue, the items Y ...

Understanding the digital revolution assignment - parchment

Understanding the Digital Revolution Assignment - Parchment Purgatory Overview - For this assignment, you will use skills acquired through practical laboratory exercises to automate a business process, and to visualize t ...

Suppose that on your birthday you checked the balance on

Suppose that on your birthday you checked the balance on your retirement account and you decided to make a $1,000 payment at the end of every month until you retire at the specified age. If you disreagard the inflation ( ...

Two one-cent coins were weighed on an electronic balance of

Two one-cent coins were weighed on an electronic balance of high sensitivity, and an average mass per coin of 2.4918 g was obtained from the data. How could you use the same number of significant figures as the value obt ...

C programminghelp with a program positivec that include the

***C PROGRAMMING*** Help with a program positive.c that include the following function: void extract(int *a, int n, int *positive, int *size); The function should use pointer arithmetic, not subscripting. The extract fun ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As