PROJECT2 Social Psychology Report Vincent Ssuuna (id1115603) UMUC COURSE: CMP 610-9042 Foundations of Cybersecurity Management Instructor: Professor T. Santiago May01,, 2017 CMP 610 9042 PROJECT2: Social Psychology Report The psychology aspects of cybersecurity define the hacker motives or psychology. Hackers are driven from monetary gains to political to pleasure-seeking to intimidation to intuition to revenge or to a desire to make systems more secure. But black and grey hat hackers are normally driven by monetary gains. Some hacking that impact on human factors may be ethical, legal or purely psychological. Some common behaviors of hacking individuals or groups are: 1. Fame: Oftentimes, hackers are interested in boasting …show more content…
This is unethical behavior. 8. Political Activism: Hacktivists’ attacks may be applied to governments or organizations when they vent out very strong political views by attacking the entity’s communications system. There are state and non-state actors among hacktivists. State actors spy against or for, powerful nations like China, Russia, Iran, North Korea and United States. These are often hard to apprehend. Infamous examples of cyberattacks attributed to state actors include denial-of-service (DoS) and defacement on Estonia in 2007 and Georgia in 2008 (attributed to Russia), the 2010 STUXNET attack on Iranian nuclear plant (US and Israel), the 2014 SONY breach (North Korea), and the OPM breach (China) (Mandiant, 2013). Non-state actors are any group or individuals carrying out malicious hacking to convey a message, disrupt a service, or further a cause. Examples include hacktivists like Anonymous, religious groups, NGOs, and national groups. ISIS a non-state actor. Non-state actors look for ways to justify their concern unlike state actors (Blank, 2013; Pomorleau, 2015). Threat actors are hackers and or actors, normally residing inside or outside an organization. Their intentions range from money to political to fun or fright-instilling, and they act according to certain personalities, material/financial welfare, or
In the early days of computing, a hacker was primarily referred to as a computer guru, someone who is extremely technical with a high expertise in computer also known as “Expert Programmers”. Nevertheless, as technology is advancing at a face pace, hacking has adopted a completely different definition. The modern definition is someone who access a computer system primarily to steal or destroy information. Hacking has caused major harm in the realm of technology. Over the years, hackers have become much more lethal in their craft. They manage to break into complex information systems from entities such as banks, government agencies, and private businesses. Furthermore, they often manipulate their victims through social engineering in order to obtain financial benefits. Hackers hold different label such as: black hat hacker and white hat hacker in which all have their own motives.
With hacktivism comes a hacktivist. A hacktivist is someone who takes part in the sharing, creating, and execution of attacks on the internet. This may be someone working towards change by using a set of technical skills they may have. Most hacktivist tend to be critical thinkers whom already have jobs in the tech industry. Depending on who may be using the word
The Facebook,Instagram, and Twitter social media sites with passwords that can be hacked no matter the “strength” of the password. Peter Ludlow effectively persuades using ethos,logos and pathos in the reading What is a ‘Hacktivist’? By talking about events that have happened to “Hacktivist” in the recent years due to “Lexical Warfare.” Lexical Warfare irs a phrase that I like to use for battles over a term is to be understood. When people think of hackers, the first thing to mind is people who sit on computers all day and steal information from everyone possible. The previous sentence provides an example of how people think of the word “hacker” because of what media tells people. It either gives them a good thought if you think “hacktivist” are doing right or unpleasing thought because it makes people feel unsafe since hackers can hack into whatever they please.
18. Instead of being motivated by a desire to prove their art, hackers today are motivated by ____ and political ends.
An article published by TheWeek.com titled Inside America’s Hacking Epidemic states that cyberattacks initiated by hackers is a growing threat that could lead to a number of serious problems. Some of these problems include the shutting down of the electrical grid and water supply. The author writes, “These cybercriminals can potentially target every aspect of our lives that involves an internet connection. They could suddenly apply the brakes on smart cars or take over a passenger jet’s avionics system.” In this passage, the author is trying to convey that there are many things that hackers can do to cause chaos. Some countries, such as Russia and China, sponsor hacking groups. Hacking groups such as Cozy Bear and Guccifer 2.0 are some examples of hacking groups sponsored by Russia. In conclusion, the author believes that cyberattacks are becoming more threatening and can be catastrophic to all aspects of society.
Kenneth first premise is that hacktivism with political motivation is digital civil disobedience. She argues that the characteristics of hacktivists and the motivation of the act decided
The hacktivist group has claimed responsibility for several cyberattacks carried out against governments, companies, and religious groups in the last 12 years, the report details.
Adam Segal’s “The Hacked World Order” reveals many prevalent issues in today’s technologically centered society. Starting at Year Zero, June 2012 to June 2013, the battle over cyberspace witnessed world-changing cyberattacks. This was accomplished due to the fact that nearly 75% of the world’s population has easy access to a mobile phone, and the Internet connects nearly 40% of the total human population, which is nearly 2.7 billion people. With that being said, cyberattacks are becoming a more realistic form of terror.
One of the biggest computer crimes is Distributed Denial of Service attacks (DDoS) defined as “techniques or actions involving the use of one or more damaged computers to damage another computer or a targeted computer system in order to shut the computer or computer system down and deny the service of the damaged computer or computer systems to legitimate users” by the Arkansas code. These DDoS attacks are one-way attack someone by affecting their computer network. DDoS attacks send a message to the people running the network that they can be affected, many people use DDoS attacks to make a political statement. One recent DDoS attack against the Luxembourg government was made in late February of this year “According to reports from the Luxemburger Wort, the attack started at 9.30 am, forcing the web servers of many state authorities offline or difficult to reach. Just over an hour later, the state-owned IT operator "Centre des Techniques de l 'information de l 'Etat" (CTIE) sent a message via Twitter, to confirm that the network was the victim of a DDoS attack” (Millman, 2017) there cannot be a sure reason for the attack but these types of attacks are used in a political context to protest the actions of that nation. Computer crime can be more than just for money it can be a political statement, a warning, or threat of worse to come. It is clear that computer crime is not slowing down or going to slow down “In the
Anonymous would go on to lead the first cyber battle between non-state actors . Anonymous is a hacker collective who believes that all information should be free; if not, Anonymous will attack to pressure the release of information . Anonymous harnessed the collective power
The film Killswitch was about the government trying to monopolize and control user traffic on the internet. Whether it is for security purposes or financial gain, our system of democracy is being compromised at a technological level. Several speakers including Tim Wu, expressed how “hacktivism” was a revolutionary tool used to take a stand against government interference.
In this paper I will discuss a total of four Advanced Persistent Threat Groups (APT). I will discuss their motives, attack objectives, targets of the attacks, tactics, techniques, and procedures (TTP), and attack vectors. I will propose strategies that would deter and provide defense against the group or that type of threat. I will also discuss if the APT is state backed or if it is a rogue actor.
What comes to mind when you hear the word ‘hacker’? For most it means stealing information through the Internet, gaining illegal access to another person’s PC, or simply - disruptive behavior using a computer. The subject of hacking is no secret to the general public. Many people have been exposed to it by a bad experience or through the news and media. The idea of hacking that is stuck in the minds of people is that of which they have seen in the movies. The movies portray hackers as young and devious criminals. However, in reality these individuals are, talented people who use their abilities to find new and challenging ways to change how computers work. According to the Cult of the Dead Cow (weird name), a hacking organization, true
Subversives – Cause- Oriented Subversives, Political and Industrial Spies, Saboteurs, Cults/ Dedicated Activist Groups, Hackers, Invasion of Privacy Threat Actors & Persistent Rule Violators.
The potential threats of dark web to the government are many especially breach of important and private information. There is another group separate from the hackers known as hactivists. Hacktivism can be referred to as the act of breaking or hacking into the computer network or gaining access to unauthorized networks with the intention of promoting information ethics, political ends, free speech and human rights. As websites become more secure hackers are using more sophisticated methods. In the past hacking was done by a group of hackers but recently it is done by individuals. The individuals who perform the act of hacktivism are known as hacktivists (Ortiz-Arroyo, 2013). Hacktivists has similar tools and techniques as hackers, but they do so with the intention of disrupting services, and take the public’s attention to the social or political cause. Hacktivism started in the early 1980s when hacking was done for fun and profit. It was then that hacking was marked as a threat. At first it was in the form of worms, and computer viruses that were used to spread protest messages. An example is the WANK (Worms against Nuclear Killers).