Verified Document

Psychological Factors That Motivatehackers Research Paper

¶ … Psychological Factors Motivating Hackers Recent advances in IT (Information Technology) has revolutionized the business model where different organizations have launched online businesses to achieve global competitive market advantages. Despite the benefits that businesses derive from the new business model, hackers have taken the advantages of changes in the business landscape to penetrate into the database of different organizations and steal sensitive information. Many companies have lost an enormous amount of money from these events. Some hackers have gone to the extent of defacing the websites of legitimate business organizations. While some hackers are motivated by financial gains, some hackers are politically motivated. However, some hackers are motivated to enhance their social status in the hacking community.

Investigating the psychological factor that motivates hackers is the best strategy to understand motives behind the hacking. Woo, (2003) argue personal and financial benefits are the major factors that make hackers indulging in hacking activities. In the United States, many companies have been subject to hacking attacks where hackers stole millions of credit cards and later sell them in the black markets. For example, some hackers busted into the database of the Target Company in 2013 and stole over 40 million credit card information, 70 million email addresses, and other contact information. Along this event, hackers also busted into the database of Home Depot database and cast away the credit card information of 56 million shoppers. (Hawkins, 2015). These events show that personal and financial benefits are the major factors that make hackers indulge in hacking activities. Despite the lesson learned from the hacking event of the Target Companies, hackers still busted into the websites of many companies that accept credit cards in 2014 and stole millions of credit cards in 2014.

The second major factor that motivates hacker is that some people like to prove their hacking skills to enhance their status in the hacking community. This motivation is particularly rampant among novice hackers, street kiddies, or inexperienced hackers. In this scenario, these group of hackers will not attempt to tamper with the websites integrated with high-level security. These hackers will only like to boost their ego attacking companies with trivial...

The motivation has made many businesses with no sensitive information to be stolen to be a victim of hacking. This issue is particular common nowadays where hackers have defaced the websites of non-trivial businesses to demonstrate the ego and hacking skills.
Politically motivated hackers are springing up within the last few years where some state and non-state actors are sponsoring hackers to satisfy their political goals. Some countries such as North Korea, Iran, China, and Russia are the example of state-sponsored hackers. For example, China is currently sponsoring some hackers for the economic gains stealing the intellectual properties of some U.S. companies, makes the copies of their products and later to be sold at cheaper prices. However, Russia, North Korea, and Iranian hackers are politically motivated. Most of these hackers target the database of the U.S. government agencies to steal their military and security intelligence. In 2013, there were approximately 61,000 cyber-attacks on federal agencies across the United States. Moreover, Nork Korea deliberately attacked the Sony picture and unleashed much embarrassing information to the public to damage the market superiority of the company. Political motivated non-state actors such as terrorists and some group of organizations are implementing their hacking skills to unleash their political goals. The best strategy that organizations can employ to identify hackers is to install a powerful (intrusion detection system) to detect any potential hacking activities in their systems before hackers carry out a comprehensive attack. Moreover, the organizations should carry out a comprehensive research to identify hackers profile and their IP address. Organizations should also install the stronger servers with the encryption systems. They should also install strong filtering rules, a powerful firewall, close open ports, and patch the systems.

Topic 2

An ethical hacker is a networking and computer expert hired by a legitimate organization to penetrate into their computer to test their systems to identify the vulnerability in the systems. The ethical hackers test the information systems of the organization on behalf of the owner to identify the vulnerabilities that malicious hackers could have exploited. The goal of ethical hackers is to evaluate the information system of the…

Sources used in this document:
Reference

Campbell, Q., & Kennedy, D.M. (2014). The psychology of computer criminals. In Bosworth, et al. (Eds.), Computer security handbook (6th ed., pp.12.1 -12.33. New York, NY: John Wiley & Son.

Hawkins, B. (2015). Case Study: The Home Depot Data Breach. SANS Institute.

Nykodym, N., Ariss, S., & Kurtz, K. (2008). Computer addiction and cyber crime. Journal of Leadership, Accountability and Ethics, 35, 55-59

Woo, J.(2003). The Hacker Mentality: Exploring Relationship between Psychological Variables and Hacking Activities. PHD Dissertation, University of Georgia.
Cite this Document:
Copy Bibliography Citation

Related Documents

Internet Addiction
Words: 3578 Length: 10 Document Type: Term Paper

Internet started way back 3 to 4 decades, but it really took the world by storm through the 90's and till now it has become one of the main assets of modern day computer user. More people get the information through Internet, especially those who use it than by any other means. The world has become a cyber village where simply anyone from anywhere can communicate with other person living

Internet Addiction It Is Thought That Nearly
Words: 1369 Length: 4 Document Type: Article Critique

Internet Addiction It is thought that nearly five million people today are addicted to the Internet. With that many people experiencing addiction symptoms, it is important for the mental health community to develop methods of treatment. In an article in the March-April 1998 issue of Psychology Today, author Carol Potera explores the questions and realities of online use and addictions. Although use of the Internet became common in the early 1990s, it

Internet Addiction From Education to
Words: 1895 Length: 7 Document Type: Thesis

Paradoxical as it might seem the Internet, which is being touted as a broad socializing medium is silently causing social isolation among some of the users. In some countries like Korea and China, increasing number of adolescents are addicted to online gaming portals seriously damaging their personal and social lives. Internet addiction related deaths in these countries has forced the governments to take a new regulatory approach to managing

Internet Addiction Since the Internet
Words: 1854 Length: 6 Document Type: Thesis

How often do you lose sleep due to late-night log-ins? 15. How often do you feel preoccupied with the Internet when off-line, or fantasize about being online? 16. How often do you find yourself saying "just a few more minutes" when on- line? 17. How often do you try to cut down the amount of time you spend online and fail? 18. How often do you try to hide how long you've been online? 19.

Internet Addiction There Are Several
Words: 1544 Length: 5 Document Type: Term Paper

At the same time, irrespective of age, race, and gender, a group of people become overly aggressive and obsessive in making frequent use of the Internet, who tend to relegate other activities in order to browse the Internet. Traditionally, television consumed a much bigger portion of people's time than newspapers; however, with the use of the Internet, there has been a massive change. Not only television use has become down,

Internet Addiction the Internet Has
Words: 2083 Length: 6 Document Type: Thesis

4. Solutions From the above discussion we can deduce that Internet addiction is not just another popular from of 'hype' but is a serious condition that is need of solutions. As awareness of the disorder becomes more prevalent so do the number of proposed solution and techniques to combat this problem. One possible solution suggested by medical practitioners begins with the realization of the addiction; in other words, the first step is

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now