Hacker Culture and Mitigation in the International Systems
The explosion of the internet technology in the contemporary business and IT environments has assisted more than 300 million computer users to be connected through a maze of internet networks. Moreover, the network connectivity has facilitated the speed of communication among businesses and individuals. (Hampton, 2012). Despite the benefits associated with the internet and network technologies, the new technologies have opened the chance for hackers to attack the information systems of business organizations and collect sensitive information worth millions of dollars. Each year, businesses have been a victim of cyber-attacks in the United States. As an increasing number of people and businesses own internet-enabled devices, more businesses have become a victim of cyber-attacks, which has become a critical concern in the business and governmental environments. (Hacker news, n.d.).
The objective of this paper is to analyze the cyber incidents of the Sony Corporation and the psychological factors that motivate the crime.
a. Descriptive labels applied to the Incident
Sony Corporation is a multinational conglomerate specialized in the professional and consumer electronics, entertainments, and gaming. Sony is one of the leading companies in the electronic products and 116th company in the Fortune global list. This paper uses the cyber-attack of the Sony Corporation to illustrate the psychological motivation behind the cyber-attacks. The attack of Sony Corporation occurred on November 24, 2014, and was a high-profile cyber incident where the hackers stole personal details of customers that include the date of birth, names, and their home address. The attacker also stole millions of credit card details forcing the CEO (Chief Executive Officer) of the company to resign. The success of the Sony attacks has revealed the effectiveness of psychological cyber warfare because the attackers force the Sony Corporation to pull out the movie, a comedy about the assassination of the North Korean president, from the markets costing the company millions of dollars, and consequently damage the Sony's reputations. (FBI, 2014)
Sony attacks escalated from the data theft to the public blackmail because the assailants embarrassed the company by divulging the top executive confidential emails to the public. The Sony attack was more than the ordinary cyber-attacks; the attacks were categorized between cyber terrorism and cyber warfare since the terrorists can be the nation states and use the cyber-attacks to inflict damages on other countries infrastructures. (Atkinson, 2015). The psychological motivation behind the Sony attack is to pull the United States into the cyber warfare, and the Sony incidents are categorized as politically motivated cyber-attacks to inflict a psychological distress on other nations. (Atkinson, 2015).
b. Descriptive Information about the threat Actors
A press release by the FBI (2014) revealed that the North Korea was the sponsor of the attack showing that the attack was politically motivated. The Sony Pictures confirmed the attack and described how the perpetrators destroyed the company information systems and stole a large quantity of commercial and personal data. The attackers also rendered thousands of the Sony Pictures computer systems inoperable, and the issue forced the company to escalate their entire computer network systems offline consequently disrupt the Sony business operations. (FBI, 2014)
After the incidents, the Sony Picture seek for the FBI assistance, and the outcome of the FBI investigation revealed that North Korean government was responsible for the action. The motivation of the North Korean government was to inflict as much as possible psychological damage on the U.S. government. Typically, the North Korea government realized that they cannot win a military combat with the United States, thus, they decided to wage the war in proxy. (FBI, 2014).
People who go after the Information
This section discusses how the penetrators have been identified. The information they are after, how they get the information and method to identify the hackers. The penetrators of the Sony Pictures were sponsored by North Korea, although, they identify themselves as "Guidance of Peace," nevertheless, the North Korean government has sponsored them. The North Korea motivation is to weaken the economic superiority of the United States because Sony incidents sent a wave of terror to the entire corporate America. (Fotinger, & Ziegler, 2004). The FBI concluded that the intrusion consisted of deployment of the destructive malware to steal confidential and personal communication. (FBI, 2014).
The technical analysis conducted by the FBI has linked the Sony attacks to North Korea based on the similarities between...
CYBER CRIME AND CORPORATE SECURITYAbstractIn the past, various businesses have lost huge sums of money to cybercriminals, while others have experienced severe service disruptions. This has been the case as cyber criminals execute schemes meant to advance certain agendas. For this reason, cybercrime is increasingly being seen as one of the most serious challenges that business enterprises (as well as government agencies) face today. Various surveys conducted in the past
Cyber Security Vulnerabilities in Space Vehicles Cyber Security VulnerabilitiesAbstract 1Introduction 3Background 4Overview of Space systems 4The developing threat in Cyberspace 5Space Vehicles attack surface 6Cyber Security Vulnerabilities in Current Space Systems 6Advanced Persistent Threats 7Improperly secured ground facilities 11Space Segments Vulnerabilities 12Small Satellites Vulnerabilities 12Current Cyber Security Mitigation Techniques 13Conclusion 16AbstractThe advancement of innovations, views, and funding alters the outer milieu by making it more accessible to many individuals. The
This is also known as a vulnerability assessment (Shimonski, 2005). Enlisting senior management support so that security is taking seriously within the organization and so that employee and manager alike understand the value of assets and the seriousness threats that may exist (Shimonski, 2005; Schwartz, 2003). Establish a security budget so that from year to year an organization has the finances necessary to deal with security threats as they occur but
The foolishness of this reversal of priorities would be clearly demonstrated in the contrast between the results of intelligence efforts on 9/11 and those just two years prior. After the resignation of Tenet, who submitted as his official reason for departure the desire to spend more time with his family, his spokesman noted that "no one in the U.S. government was more aggressive in calling attention to and dealing with
They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and
The following diagram represents the structure of the idea. Figure 2. Project flow pursuant to Plan Abu Dhabi 2030: Urban Structure Framework Plan Objectives of the Study The overarching objective of this study is to build a solid portfolio management application that connects all the local governments of Abu Dhabi emirates in ways that will allow them to collaborate on various projects pursuant to Plan Abu Dhabi 2030 through one unified system
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now