Threat modelling of hacktivist groups Organization, chain of command, and attack methods

Loading...
Thumbnail Image

Date

Type

Examensarbete för masterexamen
Master Thesis

Programme

Model builders

Journal Title

Journal ISSN

Volume Title

Publisher

Abstract

As the social web emerges, increasingly more people are starting to adopt the Internet as a means of communication. Activists are no exception to the rule, as can be seen by the number of online protests and movements organized through Facebook or Twitter. As a consequence of this, a particular branch of online activists, also known as hacktivists, have evolved into a full-blown online threat. The aim of this report is to provide a technical insight on the attack methods and motivations of hacktivist groups, and provide a solid understanding of the full extent of their capacities. The report includes a technical background on hacker and activist culture, which is essential in order to properly understand the hacktivist mindset. Some real-world incidents have been selected, and their attack scenarios have been reconstructed as precisely as possible in order to evaluate, in each case, the technical skills of the attacker. Based on an evaluation of both technical expertise and motivations, we have deduced a threat model that corresponds to most hacktivist groups. At last, the research also covers the way in which these kinds of threats fit into the geopolitical landscape; how important the threat is, and what are its limitations.

Description

Keywords

Informations- och kommunikationsteknik, Data- och informationsvetenskap, Information & Communication Technology, Computer and Information Science

Citation

Architect

Location

Type of building

Build Year

Model type

Scale

Material / technology

Index

Endorsement

Review

Supplemented By

Referenced By