Incident handling at its core is the response to an attack in order to minimize loss. The restoration and reconstruction of events are used to understand the compromise, thus the effect is treated as a weakness and then the vulnerability is realized (Cook, 2000). Technical methods to investigate, understand and protect are commonplace within all incident management plans. It would be rare within those plans to see any items concerning the ‘person’ behind the incident; it would be even rarer that the understanding of the ‘person’ be treated with as much rigor as the technical investigation.
This paper’s premise is to build a profile of hackers; this is categorized according to the stereotypes that exist within the hacking ecosystem. The technical threats are established, what is need is the understanding of what psychological motives that is at play. When psychological theory is applied, the process to build the motivational factors that promote a hacker conscience is initiated. If applied correctly, the motivation can be applied to the methods of cracking systems and a technological response to each group of hackers is revealed (Jaishankar, 2011).
2015 Energy Industry Cybersecurity Report
Strategic Cybersecurity: A Toolkit for Prioritizing, Coordinating, and Transforming Your Cybersecurity Program