Victim Presented by: Dr. Erik J. Huffman Cybersecurity is closer - - PowerPoint PPT Presentation

victim
SMART_READER_LITE
LIVE PREVIEW

Victim Presented by: Dr. Erik J. Huffman Cybersecurity is closer - - PowerPoint PPT Presentation

Making A Cyber Victim Presented by: Dr. Erik J. Huffman Cybersecurity is closer related to psychology than computer science. We have created an entirely new virtual world in which to interact . And none of us are not built for this. We


slide-1
SLIDE 1

Making A Cyber Victim

Presented by:

  • Dr. Erik J. Huffman
slide-2
SLIDE 2
slide-3
SLIDE 3

Cybersecurity is closer related to psychology than computer science.

slide-4
SLIDE 4

We have created an entirely new virtual world in which to interact.

slide-5
SLIDE 5

And none of us are not built for this.

slide-6
SLIDE 6

We all can be hacked.

slide-7
SLIDE 7
slide-8
SLIDE 8

A basic profile of criminals are individuals with low self control, more risk-taking, impulsive, shortsighted insensitive to

  • thers, and seek immediate and

easy gratification.

slide-9
SLIDE 9

Emotional Persuasion

People, unlike machines, do not often change behavior in line with logical information: they need PR and propaganda.

slide-10
SLIDE 10

Reciprocity Commitment and Consistency Social Proof Liking Authority Scarcity

Principles of Influence

slide-11
SLIDE 11

You are being presented with insufficient information to make critical decisions.

slide-12
SLIDE 12

Current landscape. Hackers vs. IT Managers

slide-13
SLIDE 13

263 IT Security Professionals 250 Self-Identified Hackers

slide-14
SLIDE 14

91% of cyber attacks start with people instead of technology.

slide-15
SLIDE 15

Nearly one third (32%) of respondents said accessing privileged accounts was the number one choice for the easiest and fastest way to get at sensitive data, followed closely by 27% indicating access to user email accounts was the easiest path to capturing critical data.

slide-16
SLIDE 16
slide-17
SLIDE 17
slide-18
SLIDE 18

Technology provides advantages for social engineering and persuasion More persistent than humans Offers anonymity Manages large amounts of data Targets millions in seconds Can use many modalities to influence Can go where humans cannot

slide-19
SLIDE 19
slide-20
SLIDE 20

Amygdala Hijacking

When a person’s emotional response is immediate,

  • verwhelming, and

immeasurable.

slide-21
SLIDE 21
slide-22
SLIDE 22

“... I adjusted the virus on an adult web-site which you have visited. When the object clicks on a play button, the device begins recording the screen and all cameras on ur device start working. Moreover, my program makes a remote desktop supplied with keylogger function from your device, so I was able to get all contacts from ur e-mail, messengers and other social networks....”

Threat Language

slide-23
SLIDE 23

“...You have one day after

  • pening my message, I put

the special tracking pixel in it, so when you will open it I will know. If ya want me to share proofs with ya, reply on this letter and I will send my creation to five contacts that I\'ve got from ur device...”

Threat Language

slide-24
SLIDE 24

Active Reconnaissance Passive Reconnaissance

Getting to Know You

“Your Digital Footprint”

slide-25
SLIDE 25

William Klemm, a neuroscience professor at Texas A&M University "Creativity comes from a mind that knows, and remembers, a lot."

slide-26
SLIDE 26
slide-27
SLIDE 27

Follow-up Study

Conducted survey (1123 respondents) Conducted 27 semi-structured interviews

slide-28
SLIDE 28

New Research Findings

Younger people were more likely to share passwords compared with older people. Only one of the subscales was significant: perseverance. Perseverance measures the ability to remain with a task until completion and avoid becoming bored.

slide-29
SLIDE 29

New Research Findings cont’d

It was found those who score high on self- monitoring were significantly more likely to share passwords compared with those who score low on this measure.

slide-30
SLIDE 30

And surprisingly…

Cybersecurity knowledge does not

  • matter. Cyber professionals revealed

information just as often as everyone else!

slide-31
SLIDE 31

29% of all employees revealed PII. Age, race, and gender played no factor on response rate.

slide-32
SLIDE 32

Big 5 Model for Cyber Victims

Extraversion Agreeableness Conscientiousness Emotional stability Open to new experiences

slide-33
SLIDE 33

Riskiest Personality Trait…

slide-34
SLIDE 34

Impulsiveness

slide-35
SLIDE 35

I think reporting cybercrime is a waste of time. I don’t know who is ultimately responsible. Only large companies are targeted by hackers. If I report a cyber attack it would damage the company’s reputation. Information provided by the government and police are not relevant.

slide-36
SLIDE 36

Disabled anti-virus so they could download (31%) Sent PII over the internet (29%) Shared location over social media (67%) Stores company PII on personal computer (53%) Use personal USB to transfer company data (47%)

slide-37
SLIDE 37

In a side study correlation study, participants were asked to type in a series of usernames and

  • passwords. Depending on their

group the participants were told their information would either be erased or saved. The group that was told their data would be saved were less likely to remember. This study indicates people have lower rates of recall when they can expect to be able to access information in the future.

slide-38
SLIDE 38

Training…We are doing it wrong.

slide-39
SLIDE 39

The perfect economic environment exists for cybercriminals.

slide-40
SLIDE 40

Dubsmash - $ 4,995 – 15.5 million records MyHeritage – $3,552 – 65.7 million records My Fitness Pal - $4,218 – 50 million records

slide-41
SLIDE 41

The future of hacking

slide-42
SLIDE 42

As we innovate, they innovate.

slide-43
SLIDE 43
slide-44
SLIDE 44
slide-45
SLIDE 45

A Year of Dark Business

  • 2017 – MACSPY – Remote Access Trojan as a service on Dark web
  • 2017 – MacRansom is the first Mac ransomware offered as a RaaS

Service.

  • 2018 – Karmen Ransomware RaaS
  • 2018 –Ransomware-as-a-Service dubbed Shifr RaaS that allows

creating ransomware compiling 3 form fields.

slide-46
SLIDE 46
slide-47
SLIDE 47
slide-48
SLIDE 48
slide-49
SLIDE 49
slide-50
SLIDE 50
slide-51
SLIDE 51
slide-52
SLIDE 52
slide-53
SLIDE 53
slide-54
SLIDE 54
slide-55
SLIDE 55

Reframing the Enemy.

slide-56
SLIDE 56
slide-57
SLIDE 57

Trust is the foundation of security.

slide-58
SLIDE 58

Thank you.

Erik.Huffman@HandshakeLeadership.com