Threat modelling of hacktivist groups Organization, chain of command, and attack methods

dc.contributor.authorCHOPITEA, THOMAS
dc.contributor.departmentChalmers tekniska högskola / Institutionen för data- och informationsteknik (Chalmers)sv
dc.contributor.departmentChalmers University of Technology / Department of Computer Science and Engineering (Chalmers)en
dc.date.accessioned2019-07-03T13:07:21Z
dc.date.available2019-07-03T13:07:21Z
dc.date.issued2012
dc.description.abstractAs the social web emerges, increasingly more people are starting to adopt the Internet as a means of communication. Activists are no exception to the rule, as can be seen by the number of online protests and movements organized through Facebook or Twitter. As a consequence of this, a particular branch of online activists, also known as hacktivists, have evolved into a full-blown online threat. The aim of this report is to provide a technical insight on the attack methods and motivations of hacktivist groups, and provide a solid understanding of the full extent of their capacities. The report includes a technical background on hacker and activist culture, which is essential in order to properly understand the hacktivist mindset. Some real-world incidents have been selected, and their attack scenarios have been reconstructed as precisely as possible in order to evaluate, in each case, the technical skills of the attacker. Based on an evaluation of both technical expertise and motivations, we have deduced a threat model that corresponds to most hacktivist groups. At last, the research also covers the way in which these kinds of threats fit into the geopolitical landscape; how important the threat is, and what are its limitations.
dc.identifier.urihttps://hdl.handle.net/20.500.12380/173222
dc.language.isoeng
dc.setspec.uppsokTechnology
dc.subjectInformations- och kommunikationsteknik
dc.subjectData- och informationsvetenskap
dc.subjectInformation & Communication Technology
dc.subjectComputer and Information Science
dc.titleThreat modelling of hacktivist groups Organization, chain of command, and attack methods
dc.type.degreeExamensarbete för masterexamensv
dc.type.degreeMaster Thesisen
dc.type.uppsokH
Ladda ner
Original bundle
Visar 1 - 1 av 1
Hämtar...
Bild (thumbnail)
Namn:
173222.pdf
Storlek:
3.64 MB
Format:
Adobe Portable Document Format
Beskrivning:
Fulltext