What is the least likely motivator of a black-hat hacker in todays cyber world?

Dr Magda Chelly’s Post

Co-Founder Responsible Cyber | World Economic Forum Expert Network Cyber Security | 3 Books📚| TEDx Speaker | On Forbes Poland 🇵🇱| Cyber Insurance & Supply Chain Risk | PhD, S-CISO, CISSP, Cert SCI (General Insurance)

2mo

I am very proud and happy to share that today our startup Responsible Cyber Pte. Ltd. has two smart and talented engineers from #Tunisia 🇹🇳 ! I hope I will be able to find more talented and motivated people to join our journey! #cyber #startup #people

See more comments

More from this author

Explore topics

This is a preview. Log in to get access

Abstract

Cybercrime is now recognised as a major international problem, with continual increases in incidents of hacking, viruses, and other forms of abuse having been reported in recent years. However, although many people may recognise cybercrime-related terminology, agreeing and defining what they actually mean can prove to be somewhat difficult. As a result, alternative classifications have emerged from a range of authoritative sources, which are similar in some respects, but markedly different in others. This paper considers the difficulty associated with categorising cybercrime, and identifies that a harmonised nomenclature would be beneficial to individuals and organisations concerned with combating the problem, as well as to those concerned with reporting the issue to the general public. The discussion presents a variety of different top-level classifications of cybercrime, each of which has been utilised in practice by authoritative sources in the field. The need for further sub classification is then illustrated by examining the specific issue of hacking, which reveals that numerous types and motivations can be identified, and that the simple, yet frequently used, label of ‘hacker’ is consequently inappropriate to convey any real impression of the activities in many cases.

Journal Information

Dr. Bill Hutchinson founded the Journal of Information Warfare 15 years ago, and the staff of the JIW wanted to bring him back so that this publication could focus on its original intent – namely to deliver high quality, highly technical papers on cutting edge IW and Cyber Warfare topics. This will be done by linking closely with the academic IW conferences, to deliver new and exciting articles for publication in the JIW. Dr Armistead received his PhD in IW and has written three books.

Publisher Information

Peregrine Technical Solutions LLC (Peregrine) is a small disadvantaged business, 8(a), Alaska Native Corporation (ANC), operating with a primary NAICS code of 541513, under the three-year size standard under $27.5M. Our CAGE Code is 68PP4: our DUNS # is 96-6658028, and we have an approved DCAA accounting system. Based in Hampton Roads, Peregrine was founded in 2011 to meet the expanding requirements of Cyber offense/defense activities, including full-spectrum Information Operations (IO) and security engineering.

Rights & Usage

This item is part of a JSTOR Collection.
For terms and use, please refer to our Terms and Conditions
Journal of Information Warfare © 2001 Peregrine Technical Solutions
Request Permissions

The Present Threat LandscapeWhat does TOR stand for?1.) The Other Realm.2.) The Onion Router.3.) The Outside Ransomware.4.) The Outer Reach.2.) The Onion Router

What is the LEAST likely motivator of a black-hat hacker in today's cyber world?

5.) NotorietyWhich of the following are popular exploit kits?

Which statements describe the characteristics of an Advanced Persistent Threats?

Recommended textbook solutions

What is the least likely motivator of a black-hat hacker in todays cyber world?

Anderson's Business Law and the Legal Environment, Comprehensive Volume

23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene

369 solutions

What is the least likely motivator of a black-hat hacker in todays cyber world?

Social Psychology

10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson

525 solutions

What is the least likely motivator of a black-hat hacker in todays cyber world?

Human Resource Management

15th EditionJohn David Jackson, Patricia Meglich, Robert Mathis, Sean Valentine

249 solutions

What is the least likely motivator of a black-hat hacker in todays cyber world?

Applied Calculus for the Managerial, Life, and Social Sciences

8th EditionSoo Tan

6,275 solutions

What type of exploit is often considered the most critical?

The zero-day vulnerabilities are by far the most dangerous, as they occur when software contains a critical security vulnerability of which the vendor is unaware. The vulnerability only becomes known when a hacker is detected exploiting the vulnerability, hence the term zero-day exploit.

What term describes a person method operation technique?

The term "modus operandi" is a Latin term that describes an individual or group's habitual way of operating, which represents a discernible pattern.

What term best describes the technique or method used to exploit a vulnerability or deliver a malware payload?

An attack vector is a path or means by which an attacker or hacker can gain access to a computer or network server in order to deliver a payload or malicious outcome. Attack vectors enable hackers to exploit system vulnerabilities, including the human element.

What term best describes the Wireshark tool program?

Wireshark is a network protocol analyzer, or an application that captures packets from a network connection, such as from your computer to your home office or the internet.