首页> 外文会议>International Conference on Human-Computer Interaction >A Psychological Approach to Information Security Some Ideas for Establishing Information Security Psychology
【24h】

A Psychological Approach to Information Security Some Ideas for Establishing Information Security Psychology

机译:一种信息安全信息安全的心理方法,一些建立信息安全心理学的想法

获取原文

摘要

Information Systems are composed in four main portions, people, information, appliance and facilities. These four portions are called information assets. Information security protects information assets and keeps safe them from the view point of Confidentiality, Integrity and Availability (CIA). Recently, cyber-attacks to people in specific organizations are called advanced persistent threat (APT) or targeted attacks. APT attacks are attacks using psychological and behavioral science weakness of people, are not technical attacks. Kevin Mitnick, the most competent and the most famous attacker for people says "Security is not a technology problem. It is a human and management problems" in his book. By using the knowledge of psychology, behavioral science and criminology, the attackers attack people, and achieve the purposes. Targets of the attacks are not only the direct objects that are theft or destruction of information, but also the indirect objects that obtain the information necessary to achieve the goal. Sun Tzu, a Chinese military general, strategist and philosopher said "If you know your enemies and know yourself, you can win a hundred battles without a single loss". Attackers and victims are classified into people, appliance (hardware and software) and hybrid (people and appliance). The methods of attackers for each attack and cases of attacks are classified in this paper. Some organizations are beginning to use the elements of games and competitions to motivate employees, and customers. This is known as gamification which is the application of game elements and digital game design techniques to non-game problems, such as business and social impact challenges. Gamification is very useful for awareness training of information security, I believe. This paper attempts to classify and systematize attackers, victims and the methods of attacks, as by psychology, behavioral science, criminal psychology, and cognitive psychology I have proposed some ideas for education, training and awareness for information security using the findings of psychology and behavioral science.
机译:信息系统是由四个主要部分,人员,信息,设备和设施。这四个部分称为信息资产。信息安全保护信息资产,并保持安全他们保密性,完整性和可用性(CIA)的观点。近日,网络攻击的人在特定的组织被称为高级持续性威胁(APT)或有针对性的攻击。 APT攻击是利用人们的心理和行为科学的弱点攻击,都不是技术的攻击。凯文·米特尼克,最有能力和最有名的攻击者对人说:“安全不是一个技术问题,它是人与管理问题”一书中。利用心理学,行为学和犯罪的知识,攻击者攻击人,并达到目的。袭击的目标不仅是直接对象是盗窃或破坏信息,而且还获得实现目标所必需的信息的间接对象。孙子兵法,中国的军事将领,军事家,哲学家说:“如果你知道你的敌人,认识自己,你可以赢得一百仗没有一个单一的损失”。攻击者和受害者分为人,设备(硬件和软件)和混合动力(人,设备)。攻击者每次攻击和攻击案件的方法分为本文。一些组织开始使用的游戏和竞赛来激励员工,以及客户的元素。这就是所谓的游戏化是游戏元素和数字游戏设计技术,非游戏的问题,比如商业和社会影响的挑战的应用。游戏化是信息安全意识培训非常有用的,我相信。本文试图通过对分类和系统化的攻击者,受害者和攻击的方法,如心理学,行为学,犯罪心理学,认知心理学我已经提出了教育,培训和宣传使用心理和行为的调查结果信息安全的一些想法科学。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号