Hackers Threat Analysis

Improved Essays
Introduction
To understand threat actors and their motivation to hack into a system, we have first to examine their background, psychological factors and culture environment. Understanding threat actors include elements such as personality characteristics, motivations, and what drives or influence these criminals. Hackers break into systems for profit, thrills, bragging rights, and curiosity. There are several psychological factors which can often motivate hackers which can be money, fame, revenge, and personal thrills. Organizations today face many ominous cybersecurity concerns that must be addressed systematically and effectively to protect the organization, their customers, and employees. The specifics of Sony Picture Entertainment cyber
…show more content…
However, the theory of North Korean connection to the Sony hacking as a consequence of North Korea outraged of Sony film, The Interview, where two American aspiring journalists are recruited by the Unites States government to murder their leader Kim Jong-Un. The FBI has confirmed North Korea’s involvement; however, the hacktivist’s have not been captured. North Korea may have not have been behind the assault, affirming its administration 's refusal of any association to Sony’s attack. On the other hand, a similar assault as Sony’s utilizing the coding “Dark Seoul” was previously used in an attack against South Korean in 2013. The South Korean government faults the North for hacking their government networks. Unfortunately, it remains unclear if North Korea involvement in the cyber-attack, however, these cyber criminals had insider assistance. A previous employee who was fired from the company due to organization reconstructing is believed to have helped the intruders, nevertheless the issue has not been confirmed (Krebs on …show more content…
Phishing is form of social engineering commonly done through email messages were hackers falsify the content of the email. The content appears to be genuine and requests users to login. Hackers are able to retrieve user’s credentials by the user’s clicking on the falsify link which direct the user’s to a bogus website and prompts a user to enter their username and password. A security company known as RSA Security LLC believes phishing was the cause of Sony’s hack. A series of phishing messages were delivered to high ranking officials and other personnel requesting user’s to check their Apple IDs. These falsify Apple emails appeared to be legitimate requesting the user confirm their Apple ID credentials because of suspicious account activity (Gregg Keizer). The hacker’s evidently exploited user’s Apple ID credentials to crack and access their Sony account to deploy the malware. Human beings are generally major threats with information systems which is an obscure concern. Sony’s careless representatives were a contributing variable in which added to their organizations cybersecurity threat

Related Documents

  • Superior Essays

    Contrasting Acts of Terrorism The very mention of the words terrorism and terrorist incites a variety of negative emotions for most people. An individual’s dread of bodily harm or worries about the condition of the state creates a condition of extreme fear. (Levav) There are two very different aspects of terrorism affecting our world today.…

    • 1292 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 3 Term Paper

    • 621 Words
    • 3 Pages

    Security Ecommerce site Phishing, “brand spoofing” or “carding”, is not a “pass-time” process but is a business-like on which organized crime groups extensively use and make a big deal of money. Phishing, being one of the most security challenges, is a hacking technique of malicious and fraudulent mass mailing, masquerade as emails from government agencies, business partners or even company executives using modern way such as social media, phone calls and any other communications to get access to usernames and passwords, credit cards or other sensitive information to steal valuable data. According to Anti-Phishing Working Group (APWG), an increase of 86% of phishing attacks in companies from 2013 to 2015 has been analyzed (source: Forbes).…

    • 621 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    ENGINEERING TECHNICAL DEFINITION PAPER Name Institution Date Annotated bibliography Harknett, R. J. and Stever, J. A. (2011), The New Policy World of Cybersecurity. Public Administration Review, 71: 455–460. doi: 10.1111/j.1540-6210.2011.02366.x…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Miller, J. and J. Miller., (2009). 21st Century Criminology: A Reference Handbook. 1st ed.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cybersecurity Policy Paper

    • 1062 Words
    • 5 Pages

    Introduction In today’s technological society it is very important that organizations maintain strong security policy documentation. The most important documentation that should be maintained is the cybersecurity policy. In this paper I will discuss the cybersecurity policy of the organization I have chosen (Apple INC). This paper will supply an analysis of the strategy that they use to protected themselves against fraud, hackers and theft.…

    • 1062 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Phishing is one of the assaults that have become famous these days. it's far an identity robbery try with the intention to obtain exclusive and private data of people or companies for monetary or other profits. inside the latest component there had been many reports on phishing assault in lots of financial domains such as banking. It has emerge as a severe threat to establishments that deal with monetary transactions. If those threats aren't addressed thoroughly, people can’t trust on-line transactions that contain due authentication through credentials.…

    • 205 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Cora Garcia Mrs. Briscoe Honors English 1 Were You Hacked, Or Nah? It’s more than likely that you have been hacked before. Records say that more than 145 million Americans have been victims to hackers. It can be useful to think of hackers as burglars and malicious software as their burglary tools.…

    • 342 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Describe Card Stacking

    • 401 Words
    • 2 Pages

    1. What is identity theft? Why is this a problem in society? identity theft is where someone get you ssn number or debit card and then say there you and buy stuff or do crimes. it is a problem because when someone take your identity you don’t know it and someone can take all your money and make you go broke and you have nothing.…

    • 401 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    The Intruder Analysis

    • 176 Words
    • 1 Pages

    There is always a time in a person’s life when they reach the point that they are no longer a child and they begin to take the steps to become an adult. During those steps, they are in the “coming of age” part of their life. In coming of age stories the author often uses an extreme or dramatic moment to have the protagonist reach the stage of adulthood. It is these moments that signify to the reader the difficulty of coming of age.…

    • 176 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Sony Picture Entertainment was hacked by a group that calls themselves the Guardians of Peace. At the beginning of the case, no clear evidence about who were the attackers and what their motives are, but after digging deeper in the case and collecting pieces of evidence, someone can say for sure that these hackers are working for the North Korean government. The attackers “GOP” focused on stealing information and implanting malware to use them as a threat and revenge for SPE for producing a movie that humiliates the North Korea president “The interview.” However, they were successful in causing significant embarrassment and financial losses for the company, but they couldn’t stop the movie from spreading. Sony Picture Entertainment committed…

    • 280 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    How does the agency ensure diversity in the recruiting process? The FBI has a serious commitment to ensure diversity and inclusiveness of all races, genders, and cultures. To ensure that the agency commitment is being fulfilled, the agency track the successes of their diversity initiatives (Hartmann,2002). The particular initiatives includes; providing EEO-related training, such as cultural diversity, to every employees.…

    • 1402 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Privacy and Chatroulette Using the website Chatroulette has a risk. Especially if you decide to show a bit of nudity yourself. In Chatroulette it is possible to de-anonymize the user and reveal their identity to the public. The information obtained can be used to threaten, humiliate or blackmail the user. Gaining personal information can be done by, for example, phishing (Kopecký, 2015).…

    • 370 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The dark and gloomy day dragged on as thousands of north korean veterans gathered before the start of the Kim Jong Un parade. The picture is simple but yet effective, all that is seen is the gray cylindrical service caps of the corrupt North Korean military. The photo is taken from behind while the veterans are facing the opposite direction. The most powerful piece about this image is one North Korean veteran looking back with the look of bitter sadness on his face. The view of the image gives off a sense being trapped, the North Korean military is being trapped into a state of mind where they believe that the dictative leader Kim Jong Un is a perfect genius, but the image shows differently.…

    • 761 Words
    • 4 Pages
    Improved Essays