Preview

Cognitive Hacking

Powerful Essays
Open Document
Open Document
2741 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cognitive Hacking
In this paper, we define a category of computer security exploits called "cognitive hacking." Loosely speaking, cognitive hacking refers to a computer or information system attack that relies on changing human users ' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that operate solely within the computer and network infrastructure. Several cognitive hacking techniques are illustrated by example and a taxonomy for these types of attacks is developed. Technologies for preventing and mitigating the effects of cognitive hacking attacks are proposed as well.

Table of Contents Page I. Introduction and Background 1 II. Legal Issues in Cognitive Hacking 5 III. Examples of Cognitive Hacking 7 IV. Possible Countermeasures 14 V. Bibliography 20
I. Introduction and Background

Computer and network security present great challenges to our evolving information society and economy. The variety and complexity of cybersecurity attacks that have been developed parallel the variety and complexity of the information technologies that have been deployed, with no end in sight for either. In this paper, we delineate between two classes of information systems attacks: autonomous attacks and cognitive attacks.

Autonomous attacks operate totally within the fabric of the computing and networking infrastructures. For example, the well-know unicode attack against older, unpatched versions of Microsoft 's Internet Information Server (IIS) can lead to root/administrator access. Once such access is obtained, any number of undesired activities by the attacker is possible. For example, files containing private information such as credit card numbers can be downloaded and used by an attacker. Such an attack does not require any intervention by users of the attacked system, hence we call it an "autonomous" attack.

By contrast, a cognitive

You May Also Find These Documents Helpful

  • Better Essays

    An essential part of network security is knowing what the characteristics of an attack are, so they can be countered or prevented. When the university suffered an overwhelming internal DDoS attack, it required administrators to reevaluate its security guidelines based on what was known about the attack.…

    • 1279 Words
    • 6 Pages
    Better Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    The last few years have been marked by numerous malicious applications that have increasingly targeted online activities. As the number of online activities continues to grow strong, ease of Internet use and increasing use base has perfected the criminal targets. Therefore, attacks on numerous users can be achieved at a single click. The methods utilized in breaching Internet security vary. However, these methods have increasingly become complicated and sophisticated over time. With the increase in threat levels, stronger legislations are being increasingly issued to prevent further attacks.…

    • 1097 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Although, many companies have taken steps and precautions towards thwarting cyber-attack violators of computer and security still manage to infiltrate systems. That is due to companies failing to change current methodologies to compensate for the advancement of technology and more…

    • 750 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Securing and protecting information has become increasingly far more difficult and complex then what is has been in the past. As the amount of internet users and new devices that use the internet continue to become more common, new methods and users trying to steal information will continue to advance as well. Just this year we have seen large companies, corporations, and banking institutions which some were thought to be very secure have been broken into. Hackers continue to develop new ways to steal private information and develop these tools with increased simplicity. Hackers use different methods in breaching the security of the companies they target. These methods have increasingly become increasingly more complex and difficult to detect with tools and programs that are developed to detect attacks and intrusions. With the increasing amount of security threats, new ideas and methods continue to be developed to prevent further attacks. Among these methods is security authentication, protection and prevention.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Dougherty, C., Householder, A., & Houle, K. (2002). Computer attack trends challenge Internet security. Computer, 35(4), 0005-7.…

    • 1278 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Manufacturing Audit Risk

    • 1585 Words
    • 7 Pages

    As Information Systems become more complex and business organizations become better prepared at protecting these systems so has the means in which attacks on these systems evolved. Many new issues have emerged and are changing the way in which or world views hackers and the chaos that these individuals can cause. The purpose of this section is to discuss some of the most visual and controversial of these issues. Finding solutions to avoid these attacks are what drives the need for security and security systems to constantly evolve and adapt to new threats and avoid being overrun and or shut down due to malicious actions of hackers who only wish…

    • 1585 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Accounting information systems is a computer based database that stores, collects, and processes the financial data of the organization. The AIS system is then backed up by the organizations centralized database. When the AIS system is attacked by outside sources the responsibility falls to the organization if the proper controls are not in place but if the proper controls are in place the fault should fall on the shoulders of the criminal committing the attack or failures of the organization to put in place an effective accounting information system that is not prone to failure.…

    • 851 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cognitive Design

    • 343 Words
    • 2 Pages

    A Thousand Splendid Suns by Khalid Hosseini is seen through the eyes of two young female protagonists, who have a strong and well-developed character. In the novel, the author shows their hardship, their lives in a hopeless society, Afghanistan, and how throughout their life they face cruelty and vulnerability.…

    • 343 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    References: Defense in Depth: It is more than just the technology; retrieved on February 20, 2012 from www.isa.org/intech…

    • 1927 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    In today society almost everyone has some form of computer or phone with internet capacity that are exposed to hackers and those that wish to interrupt the cyber world. It is imperative that we all become better educated to the risks and pitfalls that go along with accessing cyber space from any kind of device with access to the world-wide web. Be it by cell device, laptop, notebook, or home computer. I would like to take this time to inform others of the current trends being used to secure not only our devices but our privacy and what the future holds for the growing security and privacy problems in the cyber world.…

    • 1684 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    What Is Brain Hacking?

    • 327 Words
    • 2 Pages

    Depression is among most common illnesses worldwide today. As the growing population of an estimated 350 million people suffer from it, many of them are struggling to find a simple yet effective solution to their problem. Recently, an idea of using electrical current to stimulate the brain has emerged on a popular social news and discussion website.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    UNMC has adopted information security industry best practices to implement its information security system (UNMC, 2014). They have become so effective that during 2011, a Hitrust Gap assessment was performed, and no significant gaps were found within its security program. The worksheet below outlines how these programs have been rolled out by different offices in the university.…

    • 1202 Words
    • 5 Pages
    Powerful Essays