Lecture10 Cyberpsychology Flashcards

1
Q

The more sensational the content, the greater the spread. Now there has been numerous studies investigating the technical aspects of such concerns e.g. the use of bots to flood inaccurate info. and from the social sciences there are also numerous studies that observe that people have an inclination to share based on emotional responses such as fear or humour so the propagation is not always artificially inflated. We in the cyber security world need to bridge the gap to understand how cyber threats target technology & people together - the cannot be approached in isolation which demands input form both computers and social sciences in order for the cyber security community to respond to non-traditional threats. By doing this, and understanding how we engage online, we can prepare adequate responses.

A

Introduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

the practice of sending emails that appear to be from reputable sources with the goal of influencing or gaining personal information
Characteritics:
- sense of urgency
- similar look and feel to make it seem authentic
- client address is email instead of name
- similar look and feel to buttons
- images stolen from linkedIn profile to make it seem like the sender is legitimate
- many classical elements of social engineering here

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As of April 2020, Google is …

A

blocking 18m coronavirus scam emails every day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If we are aware of these scams, why are they still working?

A
  • timing e.g. no precedence for pandemic payments so we don’t know what to expect. In Ireland, from April 14th, 533,000 have been given covid payments resulting in a broader pool of people to target. Also people might be under financial pressure or anxious and so more susceptible to risk
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of cyber breaches

A

1) Data security threat scars digital healthcare: security researcher proved that they didn’t have surgery by showing they had no scars. (Security breach led impersonator to steal healthcare info)
2) Businesses warned of increased online fraud: spearphishing attack - victim received an email from an attacker impersonating as a solicitor requesting a 5 figure sum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Impersonation

A

The practice of pretexting as another person with the goal of obtaining information or access to a person, company or system.

e. g. attacker impersonating a contact tracer, seeking to info about grandmother
- the nature of online communication facilitates impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attention Economy

A

Games are designed to completely engage you on multiple levels. Your attention is a valuable resource to online providers. Your time online is revenue for that provider. Developers are battling for your time otherwise known as the Attention Economy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Gaming attacks 1

A

Applications are immersive and designed to engage e.g. in-app purchases, alerts, friend notifications, communicating with peers while playing all designed to increase engagement. Attackers are aware of this and add digital marketing techniques and prime the target to click something or do something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Lockboxes

A

an example of monetising play. In order to proceed you may need to purchase a key for example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Gaming attacks 2

A

Attackers produce professional looking social media sites, blogs, commentary, updates that kindly guide you to install what is often malware.

Principles must be created for game design and websites to inhibit this sort of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Information presentation

A

We tend to see brief headlines and snippets of info.

The more we see it the more we accept it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Health debates online

A

A study from 2018 studied how Trolls, twitter bots & cyborgs influenced a measles vaccine debate.
Dr. Google described how parents can trust this online info over health officials: techniques such as posting positive/negative comments to increase the perception of authenticity. The problem is they’re inherently biased. This was observed for the measles outbreak in 2015

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sample tactics

A

1) Hashtag poisoning: wereby the content is altered unexpectedly to the reader
2) Posting arguments from both sides of a debate to make the argument seem more plausible
3) Targeting individuals who are likely to post a view to a target audience
4) Trolling and harassing people that don’t agree with a view
5) Multiple channels: the use of multiple online channels to broaden reach
6) False reports of malicious accounts to have legitimate accounts temporarily blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cybersecurity considerations

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social Engineering techniques

A
  • Open Source Intelligence (OSINT) is the term used to describe gathering information about someone
  • Elicitation/Drawing out info
  • Pretexting/Becoming someone else (impersonating)
  • Psychological Principles/Mind Tricks
  • Influence/Persuasion

Many of these techniques apply to both online and offline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Traditional approaches that influence behaviours can have significant effect especially when online (positive)

A
  • Digital Marketing
  • Support People
  • Doctors, Lawyers, Police
  • Pentesters
  • Gov / Public order
17
Q

Traditional approaches that influence behaviours can have significant effect especially when online (negative)

A
  • Influence campaign
  • manipulate people
  • criminal /scammers
  • hackers
  • Gov / Control
18
Q

Cyberpsychology

A
  • relates to how you engage with tech
    Cyberpsychology applies psychological theory to explain how individuals interact in cyberspace and how these interactions might affect our offline lives

High level description:

1) How we interact with others via technical mediums
2) How tech developments accommodate our desires and needs
3) The impact tech has on our psychological state and behaviour

19
Q

Areas that may be considered in an online environment

A

1) Privacy: perceived privacy online i.e. we have control over the info we disclose. Actually, When we communicate online we have no control over the other party
2) Trust: can we really trust what we see? are images real, message real? Can we be sure that friends received info from info from trustworthy source
3) Identity: does your online self reflect your offline self?
4) Disclosure: More difficult to get that gut feeling we get from face-to-face contact. Online uncertainty is reduced by asking more probing questions resulting in heightened self-disclosure
5) Anonymity: We feel more anonymous online (keyboard warrior). Reality is there is always a digital footprint
6) Disinhibition: Easier to get caught up in the moment
7) Escalation: When we see others behaving in a certain way it becomes more acceptable to behave that way

20
Q

Conclusion

A

The symbiotic relationship between technologies and peoples demands a symbiotic relationship between the cybersecurity community and others to defend against temporary threats
- also see screenshot