Cognitive hacking and intelligence and security informatics

@inproceedings{Thompson2004CognitiveHA,
  title={Cognitive hacking and intelligence and security informatics},
  author={Paul Thompson},
  booktitle={SPIE Defense + Commercial Sensing},
  year={2004}
}
  • Paul Thompson
  • Published in
    SPIE Defense + Commercial…
    13 August 2004
  • Computer Science
This paper describes research on cognitive and semantic attacks on computer systems and their users. Several countermeasures against such attacks are described, including a description of a prototype News Verifier system. It is argued that because misinformation and deception play a much more significant role in intelligence and security informatics than in other informatics disciplines such as science, medicine, and the law, a new science of intelligence and security informatics must concern… 

The Role of User Behaviour in Improving Cyber Security Management

TLDR
The goal of this paper is to show that, in addition to computer science studies, behavioural sciences focused on user behaviour can provide key techniques to help increase cyber security and mitigate the impact of attackers’ social engineering and cognitive hacking methods.

Scientometrics of Deception, Counter-deception, and Deception Detection in Cyber-space

TLDR
Observations suggest that cyber-deception is an emerging field and that various deceptive tactics are characterized more from the standpoint of technology than from their social, behavioral, or cognitive elements.

Modeling the Relationship between a Human and a Malicious Artificial Intelligence, Natural-Language ’Bot in an Immersive Virtual World: A Scenario

People go to virtual immersive spaces online to socialize through their human-embodied avatars. Through the “passing stranger” phenomenon, many make fast relationships and share intimate information

Debates sobre procedimientos de deteccion de conductas sospechosas en AVSEC

Las tareas cotidianas realizadas por los agentes de seguridad aeroportuaria incluyen procedimientos informales o semi-formales basados en la experiencia adquirida, los cuales complementan a los

References

SHOWING 1-10 OF 49 REFERENCES

Semantic Hacking and Intelligence and Security Informatics (Extended Abstract)

TLDR
The author is currently developing toolkits of semantic hacking countermeasures, which might provide an alert using adaptive fraud detection algorithms, or allow the analyst to quickly assemble and assemble related documents bearing on the potential misinformation.

Cognitive Hacking and the Value of Information

TLDR
This work delineates between two classes of information systems attacks: autonomous attacks and cognitive attacks, which operate totally within the fabric of the computing and networking infrastructures.

Natural language processing for information assurance and security: an overview and implementations

TLDR
The expected and partially accomplished result is in harnessing the weird, illogical ways natural languages encode meaning, the very ways that defy all the usual combinatorial approaches to mathematical--and computational--complexity and make NLP so hard, to enhance information security.

Weak models for insider threat detection

  • Paul Thompson
  • Computer Science
    SPIE Defense + Commercial Sensing
  • 2004
TLDR
A content-based approach to detecting insider misuse by an analyst producing reports in an environment supported by a document control system and makes use of Hidden Markov Models to represent stages in the EBIAPM.

Formal Models for Computer Security

TLDR
The need for formal security models is described, the structure and operation of military security controls are described, how automation has affected security problems is considered, and possible models that have been proposed and applied to date are surveyed.

Cognitive Hacking: A Battle for the Mind

TLDR
The Emulex case illustrates the speed, scale, and subtlety with which networked information can propagate and how quickly severe consequences can occur.

Fraud detection

TLDR
This paper discusses general characteristics of fraud detection problems that make them difficult, as well as system integration issues for automatic fraud detection systems.

Can Pseudonymity Really Guarantee Privacy?

TLDR
It is claimed that a significant amount of identifying information about the source that leaks from the contents of web traffic itself is ignored and techniques from linguistics and stylometry can use this information to compromise pseudonymity in several important settings.

Information Warfare And Security

TLDR
A Theory of Information Warfare and its Applications: Protecting National Infrastructures and Privacy Compromises, 2nd Ed.I.

An exploratory study into deception detection in text-based computer-mediated communication

TLDR
This study focuses on the identification of deceptive cues deceivers use in a textual CMC environment and found several cues were also found to be significantly more present when deceivers write messages.