Hacker Culture and Mitigation in the International Systems
The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance for hackers to attack the information systems of business organizations and collect sensitive information worth millions of dollars. Each year, businesses have been a victim of cyber-attacks in the United States. As an increasing number of people and businesses own internet-enabled devices, more businesses have become a victim of cyber-attacks, which has become a critical concern in the business and governmental environments. (Hacker news, n.d.).
The objective of this paper is to analyze the cyber incidents of the Sony Corporation and the psychological factors that motivate the crime.
a. Descriptive labels applied to the Incident
Sony Corporation is a multinational conglomerate specialized in the professional and consumer electronics, entertainments, and gaming. Sony is one of the leading companies in the electronic products and 116th company in the Fortune global list. This paper uses the cyber-attack of the Sony Corporation to illustrate the psychological motivation behind the cyber-attacks. The attack of Sony Corporation occurred on November 24, 2014, and was a high-profile cyber incident where the hackers stole personal details of customers that include the date of birth, names, and their home address. The attacker also stole millions of credit card details forcing the CEO (Chief Executive Officer) of the company to resign. The success of the Sony attacks has revealed the effectiveness of psychological cyber warfare because the attackers force the Sony Corporation to pull out the movie, a comedy about the assassination of the North Korean president, from the markets costing the company millions of dollars, and consequently damage the Sony's reputations. (FBI, 2014)
Sony attacks escalated from the data theft to the public blackmail because the assailants embarrassed the company by divulging the top executive confidential emails to the public. The Sony attack was more than the ordinary cyber-attacks; the attacks were categorized between cyber terrorism and cyber warfare since the terrorists can be the nation states and use the cyber-attacks to inflict damages on other countries infrastructures. (Atkinson, 2015). The psychological motivation behind the Sony attack is to pull the United States into the cyber warfare, and the Sony incidents are categorized as politically motivated cyber-attacks to inflict a psychological distress on other nations. (Atkinson, 2015).
b. Descriptive Information about the threat Actors
A press release by the FBI (2014) revealed that the North Korea was the sponsor of the attack showing that the attack was politically motivated. The Sony Pictures confirmed the attack and described how the perpetrators destroyed the company information systems and stole a large quantity of commercial and personal data. The attackers also rendered thousands of the Sony Pictures computer systems inoperable, and the issue forced the company to escalate their entire computer network systems offline consequently disrupt the Sony business operations. (FBI, 2014)
After the incidents, the Sony Picture seek for the FBI assistance, and the outcome of the FBI investigation revealed that North Korean government was responsible for the action. The motivation of the North Korean government was to inflict as much as possible psychological damage on the U.S. government. Typically, the North Korea government realized that they cannot win a military combat with the United States, thus, they decided to wage the war in proxy. (FBI, 2014).
People who go after the Information
This section discusses how the penetrators have been identified. The information they are after, how they get the information and method to identify the hackers. The penetrators of the Sony Pictures were sponsored by North Korea, although, they identify themselves as "Guidance of Peace," nevertheless, the North Korean government has sponsored them. The North Korea motivation is to weaken the economic superiority of the United States because Sony incidents sent a wave of terror to the entire corporate America. (Fotinger, & Ziegler, 2004). The FBI concluded that the intrusion consisted of deployment of the destructive malware to steal confidential and personal communication. (FBI, 2014).
The technical analysis conducted by the FBI has linked the Sony attacks to North Korea based on the similarities between...
This is also known as a vulnerability assessment (Shimonski, 2005). Enlisting senior management support so that security is taking seriously within the organization and so that employee and manager alike understand the value of assets and the seriousness threats that may exist (Shimonski, 2005; Schwartz, 2003). Establish a security budget so that from year to year an organization has the finances necessary to deal with security threats as they occur but
SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and
The following diagram represents the structure of the idea. Figure 2. Project flow pursuant to Plan Abu Dhabi 2030: Urban Structure Framework Plan Objectives of the Study The overarching objective of this study is to build a solid portfolio management application that connects all the local governments of Abu Dhabi emirates in ways that will allow them to collaborate on various projects pursuant to Plan Abu Dhabi 2030 through one unified system
How many work weeks are in the project timeline, where work will actually occur? The project timeline runs from 1 January 2017 to 31 March 2018. This implies that there are 65 weeks in total within this period. However, taking into consideration that there are three weeks for vacation, the number of weeks in the project timeline where work will actually occur is 62 weeks. How much money does the team cost
CYBER CRIME AND CORPORATE SECURITYAbstractIn the past, various businesses have lost huge sums of money to cybercriminals, while others have experienced severe service disruptions. This has been the case as cyber criminals execute schemes meant to advance certain agendas. For this reason, cybercrime is increasingly being seen as one of the most serious challenges that business enterprises (as well as government agencies) face today. Various surveys conducted in the past
Cyber Security Vulnerabilities in Space Vehicles Cyber Security VulnerabilitiesAbstract 1Introduction 3Background 4Overview of Space systems 4The developing threat in Cyberspace 5Space Vehicles attack surface 6Cyber Security Vulnerabilities in Current Space Systems 6Advanced Persistent Threats 7Improperly secured ground facilities 11Space Segments Vulnerabilities 12Small Satellites Vulnerabilities 12Current Cyber Security Mitigation Techniques 13Conclusion 16AbstractThe advancement of innovations, views, and funding alters the outer milieu by making it more accessible to many individuals. The
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now