In a paper of three pages, the writer looks at cybersecurity psychology. Threat actors and their basic motivations are examined in the context of a case study. Paper uses four sources.