Advertisement

Cyber Warfare pp 173-206 | Cite as

The Human Factor in Cybersecurity: Robust & Intelligent Defense

  • Julie L. Marble
  • W. F. LawlessEmail author
  • Ranjeev Mittu
  • Joseph Coyne
  • Myriam Abramson
  • Ciara Sibley
Chapter
Part of the Advances in Information Security book series (ADIS, volume 56)

Abstract

In this chapter, we review the pervasiveness of cyber threats and the roles of both attackers and cyber users (i.e. the targets of the attackers); the lack of awareness of cyber-threats by users; the complexity of the new cyber environment, including cyber risks; engineering approaches and tools to mitigate cyber threats; and current research to identify proactive steps that users and groups can take to reduce cyber-threats. In addition, we review the research needed on the psychology of users that poses risks to users from cyber-attacks. For the latter, we review the available theory at the individual and group levels that may help individual users, groups and organizations take actions against cyber threats. We end with future research needs and conclusions. In our discussion, we first agreed that cyber threats are making cyber environments more complex and uncomfortable for average users; second, we concluded that various factors are important (e.g., timely actions are often necessary in cyber space to counter the threats of the attacks that commonly occur at internet speeds, but also the ‘slow and low’ attacks that are difficult to detect, threats that occur only after pre-specified conditions have been satisfied that trigger an unsuspecting attack). Third, we concluded that advanced persistent threats (APTs) pose a risk to users but also to national security (viz., the persistent threats posed by other Nations). Fourth, we contend that using “red” teams to search cyber defenses for vulnerabilities encourages users and organizations to better defend themselves. Fifth, the current state of theory leaves many questions unanswered that researchers must pursue to mitigate or neutralize present and future threats. Lastly, we agree with the literature that cyber space has had a dramatic impact on American life and that the cyber domain is a breeding ground for disorder. However, we also believe that actions by users and researchers can be taken to stay safe and ahead of existing and future threats.

Keywords

Identity Theft Malicious Actor Methodological Individualism Federal Aviation Administration Quick Response Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. Abramson, M, (2014), Learning Temporal User Profiles of Web Browsing Behavior, Proceedings of the 6th ASE Conference on Social Computing.Google Scholar
  2. Abramson, M. & Aha D. W. (2013), Authentication from Web Browsing Behavior, FLAIRS Conference.Google Scholar
  3. Adelson, E. H. (2000). Lightness perceptions and lightness illusions. The new cognitive sciences, 2nd Ed. M. Gazzaniga. MIT Press.Google Scholar
  4. Ahdieh, R.G. (2009), Beyond individualism and economics, retrieved 12/5/09 from ssrn.com/abstract=1518836.Google Scholar
  5. Ambrose, S.H. (2001), Paleolithic technology and human evolution, Science, 291, 1748–53.CrossRefGoogle Scholar
  6. Axelrod, R. (1984). The evolution of cooperation. New York, Basic.Google Scholar
  7. Axelrod, R. & Iliev, R. (2014), Timing of cyber conflict, PNAS, 111(4): 1–6.CrossRefGoogle Scholar
  8. Bell, B. S., Kozlowski, S.W.J. & Blawath, S. (2012). Team Learning: A Theoretical Integration and Review. The Oxford Handbook of Organizational Psychology. Steve W. J. Kozlowski (Ed.). New York, Oxford Library of Psychology. Volume 1.Google Scholar
  9. Bernard, M. & Backus, G. (2009), Modeling the Interaction Between Leaders and Society During Conflict Situations, Sandia National Laboratories; Presented to the System Dynamics Society, Boston; see at:http://www.systemdynamics.org/conferences/2009/proceed/papers/P1382.pdf
  10. Boebert, E. (2010), A survey of challenges in attribution, Proceedings of a workshop on deterring cyberattacks.Google Scholar
  11. Capelle, Q. (2014, 1/24), “Multiple device users insufficiently aware of risks”, fromhttp://www.atelier.net/en/trends/articles/multiple-device-users-insufficiently-aware-risks_427025
  12. Carley Kathleen M., et al. (2013), Liu, H., Pfeffer, J., Morstatter, F. & Goolsby, R. “Near real time assessment of social media using geo-temporal network analytics.” Advances in Social Networks Analysis and Mining (ASONAM), IEEE/ACM International Conference on. Niagara, ON, Canada, August 25–29, 2013.Google Scholar
  13. Chakrabarti, C.G. & Ghosh, K. (2013), Dynamical entropy via entropy of non-random matrices: Application to stability and complexity in modeling ecosystems,Mathematical Biosciences, 245: 278–281.CrossRefzbMATHMathSciNetGoogle Scholar
  14. Darwin, C. (1973) The descent of man. New York, Appleton.Google Scholar
  15. Feldman, J.M. & Lynch, Jr., J.G. (1988), Self-Generated Validity and Other Effects of Measurement on Belief, Attitude, Intention, and Behavior, Journal of Applied Psychology, Journal of Applied Psychology, 73(3): 421–435.CrossRefGoogle Scholar
  16. Finch, B.E. (2014, 9/11), CIOs Spur Revenue Generation Through Smart Cybersecurity, theWall Street Journal,http://blogs.wsj.com/cio/2014/09/11/cios-spur-revenue-generation-through-smart-cybersecurity/?KEYWORDS=cyber+threats
  17. Forsythe, C., Silva, A., Stevens-Adams, S.M. & Bradshaw, J. (2012), Human Dimensions in Cyber Operations Research and Development Priorities, SANDIA REPORT, SAND 2012–9188,http://www.jeffreymbradshaw.net/publications/Hum%20Dim%20Cyber%20Workshop%20Final%20Report.pdf
  18. Fox News (2010, 3/8), “FBI Warns Brewing Cyberwar May Have Same Impact as 'Well-Placed Bomb'”, fromhttp://www.foxnews.com/tech/2010/03/08/cyberwar-brewing-china-hunts-wests-intel-secrets/
  19. Freer, R. D. & Perdue, W.C. (1996), Civil procedure, Cincinatti: Anderson.Google Scholar
  20. Giles, L. (2007), The art of war by Sun Tzu, Special Edition BooksGoogle Scholar
  21. Hackman, J. R. (2011). “Six common misperceptions about teamwork.” Harvard Business Review blogs.hbr.org/cs/Google Scholar
  22. Hartmann, K. & Steup, C. (2013), “The Vulnerability of UAVs to Cyber Attacks—An Approach to the Risk Assessment”, in K. Podins, J. Stinessen & M. Maybaum (Eds.), 5th International Conference on Cyber Conflict, NATO CCD COE PublicationsGoogle Scholar
  23. Kahneman, D. (2011), “Thinking fast and slow”, MacMillan.Google Scholar
  24. Kaplan, S. & Garrick, B.J. (1981), On The Quantitative Definition of Risk, Risk Analysis, 1(1): 11–27.CrossRefGoogle Scholar
  25. Kean, T. & Hamilton, L. (2014, 9/10), “A New Threat Grows Amid Shades of 9/11. The nation remains largely unaware of the potential for disaster from cyberattacks”, Wall Street Journal, fromhttp://online.wsj.com/articles/tom-kean-and-lee-hamilton-a-new-threat-grows-amid-shades-of-9-11-1410390195
  26. Kelley, H.H. (1992), “Lewin, situations, and interdependence.” Journal of Social Issues 47: 211–233.CrossRefGoogle Scholar
  27. Kello, L. (2013), “The Meaning of the Cyber Revolution. Perils to Theory and Statecraft”, International Security, 38(2): 7–40.CrossRefGoogle Scholar
  28. Kenny, D. A., Kashy, D.A., & Bolger, N. (1998). Data analyses in social psychology. Handbook of Social Psychology. D. T. Gilbert, Fiske, S.T. & Lindzey, G. Boston, MA, McGraw-Hill. 4th Ed., Vol. 1: pp. 233–65.Google Scholar
  29. Lawless, W. F., Llinas, James, Mittu, Ranjeev, Sofge, Don, Sibley, Ciara, Coyne, Joseph, & Russell, Stephen (2013). “Robust Intelligence (RI) under uncertainty: Mathematical and conceptual foundations of autonomous hybrid (human-machine-robot) teams, organizations and systems.” Structure & Dynamics 6(2).Google Scholar
  30. Lawless, W.F., Mittu, R., Jones, R., Sibley, C. & Coyne, J. (2014, 5/20), “Assessing human teams operating virtual teams: FIST2FAC”, paper presented at HFE TAG 68, Aberdeen Proving Ground, May 20–22, 2014.Google Scholar
  31. Lewis, M. (2014), Flash boys: a wall-street revolt. New York: Penguin.Google Scholar
  32. Lewis, J.A. & Baker, S. (2014, June), “Net Losses: Estimating the Global Cost of Cybercrime. Economic impact of cybercrime II,” Center for Strategic and International Studies.http://csis.org/files/attachments/rp-economic-impact-cybercrime2.pdf
  33. Los Angeles Times (2014, 6/10), “FAA for the first time OKs commercial drone flights over land”.http://www.latimes.com/business/aerospace/la-fi-faa-bp-drone-20140609-story.html
  34. Loukas, G., Gan, D. & Vuong, T. (2013, 3/22), A taxonomy of cyber attack and defence mechanisms for emergency management, 2013, Third International Workshop on Pervasive Networks for Emergency Management, IEEE, San Diego.Google Scholar
  35. Lowrance, W.W. (1976), Of acceptable risk: science and the determination of safety, Kaufmann Publisher.Google Scholar
  36. Mallery, John C. (2011), “Models of Escalation in Cyber Conflict,” presentation at the Workshop on Cyber Security and Global Affairs, Budapest, May 31–June 2, 2011, retrieved fromhttp://es.slideshare.net/zsmav/models-of-escalation-and-deescalation-in-cyber-conflict.
  37. Marble, J. (2014, 5/1), “Cognitive science for cybersecurity”. Unpublished slides.Google Scholar
  38. Martinez, D., Lincoln Laboratory, Massachusetts Institute of Technology (2014, invited presentation), Architecture for Machine Learning Techniques to Enable Augmented Cognition in the Context of Decision Support Systems. Invited paper for presentation at HCI.Google Scholar
  39. McMorrow, D. (2010), “The Science of Cyber-Security,”, Mitre Corp. report JSR-10–102, requested by JASON, retrieved fromhttp://www.fas.org/irp/agency/dod/jason/cyber.pdf
  40. National Research Council of the National Academies (2012), “Terrorism and the Electric Power Delivery System” Washington, D.C.: National Academies Press, p. 16.Google Scholar
  41. New York Times (2014, 6/20), “Hackers Take Down World Cup Site in Brazil”; fromhttp://bits.blogs.nytimes.com/2014/06/20/hackers-take-down-world-cup-site-in-brazil/?_php=true&_type=blogs&_r=0
  42. New York Times (2014, 6/21), “Hacker Tactic: Holding Data Hostage. Hackers Find New Ways to Breach Computer Security”.Google Scholar
  43. NIST’s Special Publication 800–122 (2010, April), “Guide to Protecting the Confidentiality of Personally Identifiable Information (PII);” fromhttp://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf
  44. NIST (2014, 2/12), “NIST Releases Cybersecurity Framework Version 1.0”,http://www.nist.gov/itl/csd/launch-cybersecurity-framework-021214.cfm
  45. Okhravi, H., Haines, J.W. & Ingols, K. (2011), “Achieving cyber survivability in a contested environment using a cyber moving target”,High Frontier Journal, 7(3): 9–13.Google Scholar
  46. Pfeffer, J., & Fong, C.T. (2005). “Building organization theory from first principles: The self-enhancement motive and understanding power and influence.” Org. Science16: 372–388.CrossRefGoogle Scholar
  47. Pomerantsev, P. (2014, 5/5), “How Putin Is Reinventing Warfare”, Foreign Policy,http://www.foreignpolicy.com/articles/2014/05/05/how_putin_is_reinventing_warfare.
  48. Pressé, S., Ghosh, K., Lee, J. & Dill, K.A. (2013), Principles of maximum entropy and maximum caliber in statistical physics, Reviews of Modern Physics, 85: 1115: 1141.Google Scholar
  49. Glowniak J (1998), “History, structure, and function of the Internet; Semin Nucl Med., 28(2):135–44; fromhttp://www.ncbi.nlm.nih.gov/pubmed/9579415
  50. Rajivan, P., Champion, M., Cooke, N.J., Jariwala, S., Dube, G & Buchanan, V. (2013), Effects of teamwork versus group work on signal detection in cyber defense teams. Lecture Notes in Computer Science, 8027: 172–180. PGoogle Scholar
  51. Rand, D.G. & Nowak, M.A. (2013), Human cooperation,Cognitive Sciences,17(8): 413–425.CrossRefGoogle Scholar
  52. Reason, J. (2008), The Human Contribution, Unsafe Acts, Accidents and Heroic Recoveries, University of Manchester, UK: Ashgate.Google Scholar
  53. Salim, H. (2014), “Cyber safety: A systems thinking and systems theory approach to managing cyber security risks”. Working Paper CISL#2014–07, Sloan School of Management, MIT.Google Scholar
  54. Schwartz, C. (2014, 6/10), “Program overview/challenges”; presentation to the 2014 Computational methods for decision making gathering, Arlington, VA, 10–12 June 2014.Google Scholar
  55. Schweitzer, F., Fagiolo, G., Sornette, D., Vega-Redondo, F., Vespignani, A., & White, D.R. (2009). “Economic networks: The new challenges.” Science325: 422–425.zbMATHMathSciNetGoogle Scholar
  56. Smallman, H. S. (2012). TAG (Team Assessment Grid): A Coordinating Representation for submarine contact management. SBIR Phase II Contract #: N00014–12-C-0389, ONR Command Decision Making 6.1–6.2 Program Review.Google Scholar
  57. Smith, W. K., & Tushman, M.L. (2005) “Managing strategic contradictions: A top management model for managing innovation streams.” Organizational Science16(5): 522–536.CrossRefGoogle Scholar
  58. The New Yorker (2014, 6/17), “ISIS’s savage strategy in Iraq;www.newyorker.com/online/blogs/comment/2014/06/isis-savage-strategy-in-iraq.html
  59. Thibaut, J.W., & Kelley, H.H., (1959). The social psychology of groups. New York: Wiley.Google Scholar
  60. USA Today (2014, 6/4), “Russian hacker engineered dazzling worldwide crime spree”.Google Scholar
  61. Valukas, A.R. (2014, 5/29), “Report to Board of Directors of General Motors Company Regarding Ignition Switch Recalls”; Published byThe Washington Post.http://www.scribd.com/doc/228338387/Valukas-Report-on-GM-Redacted
  62. Wall Street Journal (2009, 4/8), “Electricity Grid in U.S. Penetrated By Spies”,http://www.wsj.com/articles/SB123914805204099085
  63. Wall Street Journal (2014, 4/28), “Europe Begins Its Largest-Ever Cyberwar Stress Test”;http://blogs.wsj.com/digits/2014/04/28/europe-begins-its-largest-ever-cyberwar-stress-test/?KEYWORDS=cyber+threat
  64. Wall Street Journal (2014, 6/30), “Cyber Specter Mandates New CFO-IT Dynamic;” fromhttp://deloitte.wsj.com/riskandcompliance/2014/06/30/cyber-specter-mandates-new-cfo-it-dynamic/?KEYWORDS=cyber+threat
  65. Walters, J.P. (2014, 6/12), “Heterogeneous cloud services”; presentation to the 2014 Computational methods for decision making gathering, Arlington, VA, 10–12 June 2014.Google Scholar
  66. Washington Post (2011, 8/3), “Report on ‘Operation Shady RAT’ identifies widespread cyberspying“, fromhttp://www.washingtonpost.com/national/national-security/report-identifies-widespread-cyber-spying/2011/07/29/gIQAoTUmqI_story.html
  67. Washington Post (2014, 5/30), “China’s cyber-generals are reinventing the art of war”,http://www.washingtonpost.com/blogs/innovations/wp/2014/05/30/chinas-cyber-generals-are-reinventing-the-art-of-war/
  68. Washington Post (2014, 6/6), “Vodafone reveals that governments are collecting personal data without limits. Britain’s Vodaphone cites several nations [29 nations are cited in its 88 page annex]. Warns that governments have unfettered access”,http://www.washingtonpost.com/business/technology/governments-collecting-personal-data-without-limit-says-vodafone/2014/06/06/ff0cfc1a-edb4-11e3-9b2d-114aded544be_story.html.
  69. Washington Post 2014, 6/12), “FCC unveils ‘new regulatory paradigm’ for defeating hackers”,http://www.washingtonpost.com/blogs/the-switch/wp/2014/06/12/fcc-chair-telecom-companies-must-do-more-to-defend-against-hackers/
  70. Wickens, C. D. (1992). Engineering psychology and human performance (second edition). Columbus, OH, Merrill.Google Scholar
  71. Wired (2012, 11/09), “Teenage Hacker ‘Cosmo the God’ Sentenced by California Court”, retrieved fromhttp://www.wired.com/2012/11/hacker-cosmo-the-god-sentenced-by-california-court/
  72. Zipf, G.K. (1949),Human behavior and the principle of least effort, New York: Addison-Wesley.Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Julie L. Marble
    • 1
  • W. F. Lawless
    • 2
    Email author
  • Ranjeev Mittu
    • 3
  • Joseph Coyne
    • 3
  • Myriam Abramson
    • 3
  • Ciara Sibley
    • 3
  1. 1.Advanced Physics Laboratory Senior Human Factors Scientist Asymetric Operations SectorJohns Hopkins UniversityLaurelUSA
  2. 2.Paine CollegeAugustaUSA
  3. 3.Information Technology DivisionNaval Research LaboratoryWashingtonUSA

Personalised recommendations