arun vishwanath, ph.d., mba associate professor http ......human factors approach: cyber security...

31
Arun Vishwanath, Ph.D., MBA Associate Professor http://arunvishwanath.us

Upload: others

Post on 27-Sep-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

ArunVishwanath,Ph.D.,MBAAssociateProfessor

http://arunvishwanath.us

Page 2: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Istudyhowhackers,cyberterrorists,hactivistsenternetworks…

Page 3: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Istudy…  Istudyhowhackers,cyberterrorists,hactivistsenterandcompromisenetworks

  Theproverbial“peopleproblem”ofcybersecurity

Page 4: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

HABITS

COGN

ITIV

E PR

OCES

SING

PERSONALITY

EMPLOYEE

Brute Force Hacking

Spear phishing

External Email Provider

Organizational Email Provider

DEFENDED VULNERABLE UNSECURED INTERACTION

UnintentionalInsiders

Page 5: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Databreacheskeepgettingbigger…

Source:http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/

Page 6: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Spearphishingistheattackvectorof

choice

Page 7: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Impactedeveryindustry

Page 8: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

PerpetratedbyStateandNon-stateSponsors

YOU ARE THE WEAKEST LINK IN CYBERSPACE

Page 9: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Approachestodealingwiththe“peopleproblem”

  Firewalls,antivirus;Whitelistingapproaches

  EMET;Constrainaccess/adminprivileges

Page 10: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Howrealisticisthis…

Page 11: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Humanfactorsapproach:Cybersecuritytraining

1.  “Phish”peoplesimulations

2.  Showthemwhytheyfellforit

3.  Keeptellingthemtoshape-up

4.  AdmiralMikeRogers:“Weshouldcourt-martialthem!”

Page 12: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

ThePEOPLEPROBLEM  TheProblemisNOTthePeople

  ItisinourUNDERSTANDINGofPEOPLE

  WeHavedevelopedahumanfactorsmodelthatexplainshowpeoplethink,act,behaveonline,andwhy.

Page 13: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Suspicion,Cognition,AutomaticityModel(SCAM)

(Vishwanath,Harrison,&Ng,2016)

Page 14: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

SCAMexplainshowusersthink:

Page 15: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Scrooge:Iama

cognitivemiser

Iusecognitiveshortcutsa.k.a

Heuristics

Page 16: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Heuristics

Page 17: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep
Page 18: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep
Page 19: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

SCAMexplainswhatusersbelieve:

Page 20: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

CyberRiskBeliefsWHATISSAFER:

•  PDFvs.WordDocument

•  OSXvs.Windows•  iOSvs.Android•  Chromevs.Safari•  GoogleFibervs.Freewi-fi•  Browserbasedemailaccessvs.

usinganemailclient

Page 21: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

SCAMexplainstheroleofhabitsanddevices

Page 22: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Habits

  Ritualisticallycheckingemail

  Textingwhiletalking,walking,driving

  Enteringlogin,password,authenticationcredentials

Page 23: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Smartphones,smartwatches…notsosmartpeople

  ThanksAppleandGoogle!

Page 24: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep
Page 25: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

VictimizationSuspicion

HeuristicProcessing

Systematicprocessing

CyberRiskBeliefs

Work/EmailHabits

Personality,WorkRoutines,

Patterns

Suspicion,Cognition,AutomaticityModel(SCAM)(Vishwanath,Harrison,&Ng,2014)

©ArunVishwanath

Page 26: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Leveragingtheunderstandingof

people

Page 27: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

DevelopaCyberRiskIndex(CRI)

  Anempiricaldatadrivenapproach

  Usesashort,40questionself-reportsurvey

  Canbedonewithinexisting“red-team”simulations

  Likecreditrating,itcanweaggregatedacrossdivision,organizations,sectors

©ArunVishwanath

Page 28: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Decidingwhogetstrainedandhow:

Cyberriskbeliefs

Heuristics

Systematicprocessing

Habits

No

BeliefChangeYes

No

Yes

No

Yes

No

Yes

BetterHeuristics

Education

HabitChange

faulty

poor

bad

inadequate

©ArunVishwanath

Page 29: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Decidingwhogetsaccess:

  Currentsystemofprovidingaccessisbasedonorganizationalroleandstatus

  UseCRItoidentifyindividualrisklevelsandchangesinriskbehaviorovertime

  ThisbecomesaquantitativescoreofINDIVIDUALCYBERHYGIENE

©ArunVishwanath

Page 30: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

Referencestopublishedresearchandwritings:

SelectedAcademicResearch  Vishwanath,A.,Harrison,B.,&Ng,

Y.J.(2016).Suspicion,Cognition,AutomaticityModel(SCAM)ofPhishingSusceptibility.CommunicationResearch.

  Vishwanath,A.2016).MobileDeviceAffordance:ExplicatingHowSmartphonesInfluenceTheOutcomeOfPhishingAttacks.ComputersinHumanBehavior.

  Vishwanath,A.(2015).HabitualFacebookUseanditsImpactonGettingDeceivedonSocialMedia.JournalofComputer-MediatedCommunication,20(1),83-98.

SelectedpiecesinCNN  Whythecyberattackskeep

coming:http://www.cnn.com/2015/06/08/opinions/vishwanath-stopping-hacking/

  Whyweneedacyberwall:http://www.cnn.com/2016/05/02/opinions/build-cyber-wall-vishwanath/index.html

  Whenhackersturnyourlightsoff:http://www.cnn.com/2016/02/11/opinions/cyber-infrastructure-attacks-vishwanath/

Page 31: Arun Vishwanath, Ph.D., MBA Associate Professor http ......Human factors approach: Cyber security training 1. “Phish” people simulations 2. Show them why they fell for it 3. Keep

ContactInformation

ArunVishwanath,Ph.D.,MBA

  Email:[email protected]

  Web:http://arunvishwanath.us

  Mobile:716.508.0192