Hackers Threat Analysis

Improved Essays
Introduction
To understand threat actors and their motivation to hack into a system, we have first to examine their background, psychological factors and culture environment. Understanding threat actors include elements such as personality characteristics, motivations, and what drives or influence these criminals. Hackers break into systems for profit, thrills, bragging rights, and curiosity. There are several psychological factors which can often motivate hackers which can be money, fame, revenge, and personal thrills. Organizations today face many ominous cybersecurity concerns that must be addressed systematically and effectively to protect the organization, their customers, and employees. The specifics of Sony Picture Entertainment cyber
…show more content…
However, the theory of North Korean connection to the Sony hacking as a consequence of North Korea outraged of Sony film, The Interview, where two American aspiring journalists are recruited by the Unites States government to murder their leader Kim Jong-Un. The FBI has confirmed North Korea’s involvement; however, the hacktivist’s have not been captured. North Korea may have not have been behind the assault, affirming its administration 's refusal of any association to Sony’s attack. On the other hand, a similar assault as Sony’s utilizing the coding “Dark Seoul” was previously used in an attack against South Korean in 2013. The South Korean government faults the North for hacking their government networks. Unfortunately, it remains unclear if North Korea involvement in the cyber-attack, however, these cyber criminals had insider assistance. A previous employee who was fired from the company due to organization reconstructing is believed to have helped the intruders, nevertheless the issue has not been confirmed (Krebs on …show more content…
Phishing is form of social engineering commonly done through email messages were hackers falsify the content of the email. The content appears to be genuine and requests users to login. Hackers are able to retrieve user’s credentials by the user’s clicking on the falsify link which direct the user’s to a bogus website and prompts a user to enter their username and password. A security company known as RSA Security LLC believes phishing was the cause of Sony’s hack. A series of phishing messages were delivered to high ranking officials and other personnel requesting user’s to check their Apple IDs. These falsify Apple emails appeared to be legitimate requesting the user confirm their Apple ID credentials because of suspicious account activity (Gregg Keizer). The hacker’s evidently exploited user’s Apple ID credentials to crack and access their Sony account to deploy the malware. Human beings are generally major threats with information systems which is an obscure concern. Sony’s careless representatives were a contributing variable in which added to their organizations cybersecurity threat

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    North Korea has been in several tense situations with the worlds superpower’s specifically the United States. They arrested two United States journalists, Euna Lee and Laura Ling, while filming a documentary on trafficking of women at the North Korea border. North Korea has launched several long range ballistic missiles and they have openly stated that they intended to plan out a nuclear test. The North Korean government has completed control of all media entering the country, robbing its citizens from an outside perspective on its country. They forbid their citizens to access any media, whether it is foreign TV or internet websites.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Sony Picture Entertainment was hacked by a group that calls themselves the Guardians of Peace. At the beginning of the case, no clear evidence about who were the attackers and what their motives are, but after digging deeper in the case and collecting pieces of evidence, someone can say for sure that these hackers are working for the North Korean government. The attackers “GOP” focused on stealing information and implanting malware to use them as a threat and revenge for SPE for producing a movie that humiliates the North Korea president “The interview.” However, they were successful in causing significant embarrassment and financial losses for the company, but they couldn’t stop the movie from spreading. Sony Picture Entertainment committed…

    • 280 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Zunis Investments

    • 1339 Words
    • 6 Pages

    It is imperative that we have the proper systems in place to ensure that those attacks don’t take place and even if they do, there are little to no damages. As with any organizations playing on the global stage especially one in the financial services industry, policy is key. I will ensure that there is a creation of an enterprise risk organization, in addition to a risk manager embedded within all of Zunis business unit. Enterprise risk will ensure that there is a framework in place and policies to handles cyber security issues of every nature that may affect the company, there will be updates to the incident and reporting awareness policy, there will be updates to electronic application use policy, there will be quarterly training sessions for all employees to bring them up to speed on how to detect social engineering techniques and email phishing. I will ensure that Zunis works closely with public policy unit to lobby lawmakers on national cyber security policy in the various countries of operations.…

    • 1339 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Phishing is one of the assaults that have become famous these days. it's far an identity robbery try with the intention to obtain exclusive and private data of people or companies for monetary or other profits. inside the latest component there had been many reports on phishing assault in lots of financial domains such as banking. It has emerge as a severe threat to establishments that deal with monetary transactions. If those threats aren't addressed thoroughly, people can’t trust on-line transactions that contain due authentication through credentials.…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Decent Essays

    Describe Card Stacking

    • 401 Words
    • 2 Pages

    1. What is identity theft? Why is this a problem in society? identity theft is where someone get you ssn number or debit card and then say there you and buy stuff or do crimes. it is a problem because when someone take your identity you don’t know it and someone can take all your money and make you go broke and you have nothing.…

    • 401 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Privacy and Chatroulette Using the website Chatroulette has a risk. Especially if you decide to show a bit of nudity yourself. In Chatroulette it is possible to de-anonymize the user and reveal their identity to the public. The information obtained can be used to threaten, humiliate or blackmail the user. Gaining personal information can be done by, for example, phishing (Kopecký, 2015).…

    • 370 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    North Korea also has well trained soldiers and special operation forces on ground, air, and cyberspace. Recently, the North Korean Army is launching missiles and rockets, also conducting major sized training to show the world that they are ready to fight the…

    • 1579 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Cybersecurity Policy Paper

    • 1062 Words
    • 5 Pages

    Introduction In today’s technological society it is very important that organizations maintain strong security policy documentation. The most important documentation that should be maintained is the cybersecurity policy. In this paper I will discuss the cybersecurity policy of the organization I have chosen (Apple INC). This paper will supply an analysis of the strategy that they use to protected themselves against fraud, hackers and theft.…

    • 1062 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Contrasting Acts of Terrorism The very mention of the words terrorism and terrorist incites a variety of negative emotions for most people. An individual’s dread of bodily harm or worries about the condition of the state creates a condition of extreme fear. (Levav) There are two very different aspects of terrorism affecting our world today.…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Conformity Bias

    • 1015 Words
    • 5 Pages

    How times have changed as technologies, have evolved, so too have the tools that cyber attackers use to hack into businesses to access personal information. Fraud has always existed and has hardly changed, only the disguises it uses. In today’s world people, have been taught to push and strive for more and to continue to push for more. This new way of thinking has quickly developed into something uncontrollable. It has caused a new stream of fraud to emerge for it has created higher levels of greed, new methods to detection, as well as new ways to prevention.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    Some hackers are harmless, however some are prepared to wreak havoc on America. As our country becomes more and more dependent on technology and computers in everyday life, technology also becomes an important tool for potential terrorist organizations. These organizations can cause critical damage to information systems used by our government. Cyber terrorism is a relatively new word that refers to terrorist organizations or individuals who seek to damage and destroy technological infrastructures such as the Internet (Furnell & Warren, 1998, 1). According to Mark M. Pollit, “the modern thief can steal more with a computer than with a gun” (Pollit, 2007, 65).…

    • 1252 Words
    • 6 Pages
    Superior Essays