Cybersecurity Governance

Step 10: Prepare a Profile Matrix

Now that you have familiarized yourself with the concepts of hackers and standards, policies, and guidelines, it is important to understand how to match the two in an organization.

For this assignment, prepare a Profile Matrix that lists the different types of hackers in the first column, and for each, list the psychological profile, main motivations, threats to the organization, benefits to the organization, and whether or not a standard, guideline, or policy best applies to them. Be sure to identify an example of a standard, guideline, or policy that may apply.

You should identify a minimum of six hacker-type examples. This will assist you in both helping upper management identify insider threats and to prevent future breaches.

Finally, at this point in your assignment, you should have encountered concerns about using profiles to “watch” employees and the benefits and dangers of doing so. Include a short paragraph about your findings to the matrix.

Submit your Profile Matrix for feedback.


Additional info

Step 7: Ethical vs. Unethical Hackers

As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms “hackers” and “crackers” as threat actors, we will use the terms “ethical hackers” and “nonethical hackers” to make the same differentiation. Learn about the different types of hackers, or nonstate actors, and document the following:

  • How do the profiles for ethical and unethical hackers differ?
  • Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?
  • Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks? (e.g., revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation).

While you do not need to submit your findings, they will be essential to the completion of your matrix in a later step.


Step 8: Hacker Profiling

In the previous step, you learned about the psychological factors that motivate hackers. In this step, you will go a bit further by learning how to profile hackers—a skill that is essential to the success of cybersecurity professionals. Read about hacker profiling and document the following:

  • How do profiles of ethical and unethical hackers differ?
  • While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals?
  • What sort of things do we already know about the personalities of cybercriminals?
  • Do we have enough evidence to indicate there is a distinct psychological pattern that would help in the apprehension of cybercriminals?

In the next step, you will use all the information you’ve learned about hackers to create a matrix.

"96% of our customers have reported a 90% and above score. You might want to place an order with us."

Essay Writing Service
Affordable prices

You might be focused on looking for a cheap essay writing service instead of searching for the perfect combination of quality and affordable rates. You need to be aware that a cheap essay does not mean a good essay, as qualified authors estimate their knowledge realistically. At the same time, it is all about balance. We are proud to offer rates among the best on the market and believe every student must have access to effective writing assistance for a cost that he or she finds affordable.

Caring support 24/7

If you need a cheap paper writing service, note that we combine affordable rates with excellent customer support. Our experienced support managers professionally resolve issues that might appear during your collaboration with our service. Apply to them with questions about orders, rates, payments, and more. Contact our managers via our website or email.

Non-plagiarized papers

“Please, write my paper, making it 100% unique.” We understand how vital it is for students to be sure their paper is original and written from scratch. To us, the reputation of a reliable service that offers non-plagiarized texts is vital. We stop collaborating with authors who get caught in plagiarism to avoid confusion. Besides, our customers’ satisfaction rate says it all.

© 2022 provides writing and research services for limited use only. All the materials from our website should be used with proper references and in accordance with Terms & Conditions.