To understand threat actors and their motivation to hack into a system, we have first to examine their background, psychological factors and culture environment. Understanding threat actors include elements such as personality characteristics, motivations, and what drives or influence these criminals. Hackers break into systems for profit, thrills, bragging rights, and curiosity. There are several psychological factors which can often motivate hackers which can be money, fame, revenge, and personal thrills. Organizations today face many ominous cybersecurity concerns that must be addressed systematically and effectively to protect the organization, their customers, and employees. The specifics of Sony Picture Entertainment cyber …show more content…
However, the theory of North Korean connection to the Sony hacking as a consequence of North Korea outraged of Sony film, The Interview, where two American aspiring journalists are recruited by the Unites States government to murder their leader Kim Jong-Un. The FBI has confirmed North Korea’s involvement; however, the hacktivist’s have not been captured. North Korea may have not have been behind the assault, affirming its administration 's refusal of any association to Sony’s attack. On the other hand, a similar assault as Sony’s utilizing the coding “Dark Seoul” was previously used in an attack against South Korean in 2013. The South Korean government faults the North for hacking their government networks. Unfortunately, it remains unclear if North Korea involvement in the cyber-attack, however, these cyber criminals had insider assistance. A previous employee who was fired from the company due to organization reconstructing is believed to have helped the intruders, nevertheless the issue has not been confirmed (Krebs on …show more content…
Phishing is form of social engineering commonly done through email messages were hackers falsify the content of the email. The content appears to be genuine and requests users to login. Hackers are able to retrieve user’s credentials by the user’s clicking on the falsify link which direct the user’s to a bogus website and prompts a user to enter their username and password. A security company known as RSA Security LLC believes phishing was the cause of Sony’s hack. A series of phishing messages were delivered to high ranking officials and other personnel requesting user’s to check their Apple IDs. These falsify Apple emails appeared to be legitimate requesting the user confirm their Apple ID credentials because of suspicious account activity (Gregg Keizer). The hacker’s evidently exploited user’s Apple ID credentials to crack and access their Sony account to deploy the malware. Human beings are generally major threats with information systems which is an obscure concern. Sony’s careless representatives were a contributing variable in which added to their organizations cybersecurity threat