Hackers Threat Analysis

Improved Essays
Introduction
To understand threat actors and their motivation to hack into a system, we have first to examine their background, psychological factors and culture environment. Understanding threat actors include elements such as personality characteristics, motivations, and what drives or influence these criminals. Hackers break into systems for profit, thrills, bragging rights, and curiosity. There are several psychological factors which can often motivate hackers which can be money, fame, revenge, and personal thrills. Organizations today face many ominous cybersecurity concerns that must be addressed systematically and effectively to protect the organization, their customers, and employees. The specifics of Sony Picture Entertainment cyber
…show more content…
However, the theory of North Korean connection to the Sony hacking as a consequence of North Korea outraged of Sony film, The Interview, where two American aspiring journalists are recruited by the Unites States government to murder their leader Kim Jong-Un. The FBI has confirmed North Korea’s involvement; however, the hacktivist’s have not been captured. North Korea may have not have been behind the assault, affirming its administration 's refusal of any association to Sony’s attack. On the other hand, a similar assault as Sony’s utilizing the coding “Dark Seoul” was previously used in an attack against South Korean in 2013. The South Korean government faults the North for hacking their government networks. Unfortunately, it remains unclear if North Korea involvement in the cyber-attack, however, these cyber criminals had insider assistance. A previous employee who was fired from the company due to organization reconstructing is believed to have helped the intruders, nevertheless the issue has not been confirmed (Krebs on …show more content…
Phishing is form of social engineering commonly done through email messages were hackers falsify the content of the email. The content appears to be genuine and requests users to login. Hackers are able to retrieve user’s credentials by the user’s clicking on the falsify link which direct the user’s to a bogus website and prompts a user to enter their username and password. A security company known as RSA Security LLC believes phishing was the cause of Sony’s hack. A series of phishing messages were delivered to high ranking officials and other personnel requesting user’s to check their Apple IDs. These falsify Apple emails appeared to be legitimate requesting the user confirm their Apple ID credentials because of suspicious account activity (Gregg Keizer). The hacker’s evidently exploited user’s Apple ID credentials to crack and access their Sony account to deploy the malware. Human beings are generally major threats with information systems which is an obscure concern. Sony’s careless representatives were a contributing variable in which added to their organizations cybersecurity threat

Related Documents

  • Superior Essays

    What Is Cyber Security?

    • 1268 Words
    • 6 Pages

    They much occur when system hackers exploit employees through scams and social engineering. With the sophistication and advancement in technology, hackers are becoming more sophisticated also at searching for loopholes and crack in corporate security systems and can easily gain access to protected files and data, staging a noble cyber security threat. Spear phishing is also a major security concern to the It industry (Shoemaker & Sigler, 2014). As opposed to regular phishing emails that randomly target people, victims who normally sphere head spear phishing scams are by all means looking for profitable business or private information to earn them money. Spear phishing occurs when malicious hackers target employees via emails that may appear conversant and by so doing gain access and steal personal information.…

    • 1268 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Hackers uses this collecteddata to find a way which will help them executing an attack on the Operating System, Installed Software, Open Ports, IP Addresses or user accounts. Hacker uses this accumulated informationfor gaining access to the system which is the third phase of ethical hacking. They do tedious amount of work to break the passwords and often utilizes tools like legion. Only gaining access to the system isn 't everything, but to maintain their access in it, they develops a different system paththrough which he can intrude the system as an anonymous. Thisanonymous hacker does its best toremove all the evidences of the system thats being hack, defy the intrusion detection alarms and thus avoid any form of legal actions against him.…

    • 1032 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Malware has become a serious issues , as we know the world now depending for technology to communicate , shopping , and educations. So I will explain what type of of malware and how to prevent from it. Malware is a serious problem and customer are mostly victim. The malware basically is a software design by hacker to perform a malicious work. Publish the the advertisements in browser and gain the password account.…

    • 1452 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    The purpose behind the policy brief is to inform the Department Heads and all City branch department of the Federal Bureau of Investigation on the rising cyber security breaches due to the fact of human error. This brief will outline the major instances and reason behind a successful cyber security attack. The Failure of Cyber Security Systems Humans Executive Summery Without human’s computer viruses and cybersecurity systems would be stuck in a stand still because they are built to combat perfectly. It is human error that makes helps hackers and cyber-attackers get what they want. “Only amateurs attack machines, professionals target people” (Gallagher) Introduction With cyberwarfare becoming a huge part of how nations and terror groups are…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The Dangers of Cyberspace: Identifying the threats on the web in Charles Koppelman’s Zero Days The documentary Zero Days, directed by Charles Koppelman, studies computer exploits and cyber-espionage that are conducted over cyberspace. This 2015 documentary interviews multiple professional computer hackers to explain what hacking skills they rely on in order to conduct either legal or illegal activities across the web. Whereas the scholars in this discipline focus on studying the psychology of hackers along with their communication skills used to deceive users online. Through interviews with professional hackers, this documentary analyzes why hackers are dangerous while scholars study their behaviorism and non-technical skills. Zero Days…

    • 1542 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Essay On Cybersecurity

    • 1115 Words
    • 5 Pages

    However, the hackers are always a step ahead of us. Is there a way to stop the hackers? Cybersecurity, as known as Computer Security, is the “method of protecting information, computer programs, and other computer system assets (“Computer Security”).” However, today is not only computers. According to my friend, Alex Cormier, who works at MassMutual in their IT department, all electronics are vulnerable to attacks. “Anything that can connect to the Internet can be vulnerable to certain exploits, and that could end up helping someone get into a network or system and cause much data loss, as well as disruption of services that are provided by the group being affected the by ‘hacker’ (Cormier)”.…

    • 1115 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    A Trojan horse is a type of malware that is often disguised as appropriate software. Trojans can be applied by cyber criminals and hackers trying to gain access to user’s systems (Fritsch et al, 2015). Users are normally tricked by some form of social engineering into loading and executing Trojans on their systems. When activated, Trojans can enable cyber-criminals to spy on an individual, steal sensitive data, and gain backdoor access to the system. The activities include: deleting, blocking, modifying, copying data and, interrupting the performance of computers and their…

    • 1458 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    Cyber Crime is a malicious activity including the illegally receiving data, system interferences that compromises network and integrity and availability and copyright infringements. In other words, Cyber Crime is an illegal activity performed with the help of a computer system. It was started with hackers trying to break into computer networks. Some did it for thrill of accessing high level security networks, but others have quest to gain sensitive, classified material. Eventually, criminals started to infect computer systems with computer viruses, which led to breakdown on personal and business.…

    • 1830 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Social Engineering Threats

    • 1514 Words
    • 7 Pages

    The vice president spoke with authority and used perfect French. However, the invoice was a fake and the vice president who called her was an attacker.” (Symantec, 2013) The purpose of this attack was to install a remote access Trojan (RAT) onto the computer of the administrative assistant. This RAT was used to log keystrokes, view the desktop, and browse files. With this information they can claim passwords, screenshots of emails, and remotely download sensitive information without the assistant knowing what was going on. According to Symantec, this kind of attack is highly unusual, using both email and a phone call with perfect French.…

    • 1514 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Cyber terrorism could be also considered to be using the web to inform people of a Terrorist group. For example, hacking into a government control centers important files. However, people can protect themselves against the use of cyber terrorism. People’s passwords for google should be unusual, instead, check venders for for any new upgrades, or could create a unique email address and make it unknown to anyone. Using cyber terrorism is a serious crime and should be stopped.…

    • 1184 Words
    • 5 Pages
    Improved Essays