Presentation1
Presentation1
Presentation1
Prepared by፡
Cyber shield
25/12/2023
Content
Introduction
Digital Addiction
Conclusion
Introduction
• As reliance on technology continues to grow, so need of effective
cybersecurity measures is critical. However, in order to truly understand the
threats we face, we must also examine the psychological factors that drive
both digital addiction and hacking behavior.
Depression
Social Isolation
Sleep Deprivation
• Kevin Mitnick
• Hacked into large technology and telecom companies including Nokia,
Fujitsu, and Motorola.
• Served a five year sentence and released on parole.
• He referred to his hacking as social engineering.
Famous Hacker Cases
• Kevin Poulson
• Hacked into phones to make sure he would win contests.
• Had an alias named Dark Dante.
• Hacked into a federal investigation database.
• After release from prison he entered journalism.
Famous Hacker Cases
• Adrian Lamo
• Noted as homeless hacker because he used coffee shops, libraries
and internet cafes.
• Broke into internet sites and showed vulnerabilities to companies.
• Broke into New York Times – used the LexisNexis account to view
information on high profile people.
Famous Hacker Cases
• Stephen Wozniak
• While at college he created “blue boxes – devices for bypassing the
phone system.
• After dropping out of college he co-founded Apple.
Famous Hacker Cases
• Loyd Blankenship
• Member of elite hacking groups like the Legend of Doom.
• Author of the Hacker Manifesto – cornerstone of hacker philosophy.
• Views the activities of a hacker motivated by curiosity.
• Currently a writer.
famous hacker cases
- short summary
• Hack into
• Companies
• Phones
• Federal databases
• What they achieved
• Win contests
• View info of other people
In the following slides, we will use these key words to help you understand concepts
Integrated theory to explain hacker behavior
• Xu et al. [1] proposed a model that integrates Social Learning Theory,
Routine Activity Theory and Situational Activity Theory to explain hacker
behavior.
• Social Learning Theory
• Popularized by Albert Bandura supports the idea that people learn from each other
and often times model or imitate others.
• Routine Activity Theory
• Supports the idea that if an individual is motivated and lacks a guardian they will
likely engage in criminal activity.
• Situational Activity Theory
• Posits the idea that an individual has a moral lexicon and interacts with their specific
environmental circumstances.
[1] Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer hackers.
Communications of the ACM, 58(4), 64-74.
XU et al Integrated theory to explain hacker
behavior
Social Learning Theory
adventure or accomplishment
detection
chaos
07 Insider Threats
08 Social Justice / Positive Change
Some common psychological tactics used by hackers include:
Social Engineering
• Phishing
• Pretexting: Creating a fabricated scenario or pretext to manipulate someone into providing information or
taking actions that compromise security.
• Baiting: Offering something enticing (such as free software, downloads, or rewards) to lure individuals into
clicking on malicious links or downloading malware-infected files.
.
Cybersecurity
Culture and
Organizational
User Behavior Psychological Behavior Ethical
Social and Awareness Implications and
Profiling of
Engineering and Digital Ethics
Attackers
Manipulation
03
Ways to address the motivations of 04
hackers through security measures Vulnerability to security
01 and law enforcement efforts breaches due to digital
addiction
digital addiction can
lead to security 06
breaches. E.g. clicking
on for CS developing
• phishing emails User Behavior
• sharing sensitive and Awareness
information programs
online)
05
Psychological Profiling of
02 Attackers
Strategies for preventing and
treating digital addiction (e.g.
mindfulness practices, setting
boundaries)
Conclusion
Hackers
Cyber psychology
Psychology