首页> 外文会议>International conference on human-computer interaction >A Psychological Approach to Information Security: Some Ideas for Establishing Information Security Psychology
【24h】

A Psychological Approach to Information Security: Some Ideas for Establishing Information Security Psychology

机译:信息安全的心理学方法:建立信息安全心理学的一些想法

获取原文

摘要

Information Systems are composed in four main portions, people, information, appliance and facilities. These four portions are called information assets. Information security protects information assets and keeps safe them from the view point of Confidentiality, Integrity and Availability (CIA). Recently, cyber-attacks to people in specific organizations are called advanced persistent threat (APT) or targeted attacks. APT attacks are attacks using psychological and behavioral science weakness of people, are not technical attacks. Kevin Mitnick, the most competent and the most famous attacker for people says "Security is not a technology problem. It is a human and management problems" in his book. By using the knowledge of psychology, behavioral science and criminology, the attackers attack people, and achieve the purposes. Targets of the attacks are not only the direct objects that are theft or destruction of information, but also the indirect objects that obtain the information necessary to achieve the goal. Sun Tzu, a Chinese military general, strategist and philosopher said "If you know your enemies and know yourself, you can win a hundred battles without a single loss". Attackers and victims are classified into people, appliance (hardware and software) and hybrid (people and appliance). The methods of attackers for each attack and cases of attacks are classified in this paper. Some organizations are beginning to use the elements of games and competitions to motivate employees, and customers. This is known as gamification which is the application of game elements and digital game design techniques to non-game problems, such as business and social impact challenges. Gamification is very useful for awareness training of information security, I believe. This paper attempts to classify and systematize attackers, victims and the methods of attacks, as by psychology, behavioral science, criminal psychology, and cognitive psychology I have proposed some ideas for education, training and awareness for information security using the findings of psychology and behavioral science.
机译:信息系统由四个主要部分组成,人员,信息,设备和设施。这四个部分称为信息资产。信息安全从机密性,完整性和可用性(CIA)的角度保护信息资产并确保其安全。最近,对特定组织中的人的网络攻击称为高级持续威胁(APT)或定向攻击。 APT攻击是利用人的心理和行为科学弱点进行的攻击,不是技术攻击。最有能力,最著名的人攻击者凯文·米特尼克(Kevin Mitnick)在他的书中说:“安全不是技术问题,而是人与管理方面的问题”。攻击者利用心理学,行为科学和犯罪学的知识,攻击人们并达到目的。攻击的目标不仅是窃取或破坏信息的直接对象,而且还包括获得实现目标所需信息的间接对象。中国军事将领,战略家和哲学家孙子说:“如果你认识自己的敌人,也了解自己,那么你就可以赢得一百场战斗,而不会遭受任何损失”。攻击者和受害者分为人员,设备(硬件和软件)和混合设备(人员和设备)。本文对每种攻击的攻击者的方法和攻击案例进行了分类。一些组织开始使用游戏和竞赛的元素来激励员工和客户。这被称为游戏化,这是将游戏元素和数字游戏设计技术应用于非游戏问题(例如业务和社会影响挑战)的过程。我相信游戏化对于信息安全意识培训非常有用。本文试图对攻击者,受害者和攻击方法进行分类和系统化,例如心理学,行为科学,犯罪心理学和认知心理学。我根据心理学和行为学的发现提出了一些教育,培训和对信息安全意识的建议。科学。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号