Cognitive hacking and intelligence and security informatics

نویسنده

  • Paul Thompson
چکیده

This paper describes research on cognitive and semantic attacks on computer systems and their users. Several countermeasures against such attacks are described, including a description of a prototype News Verifier system. It is argued that because misinformation and deception play a much more significant role in intelligence and security informatics than in other informatics disciplines such as science, medicine, and the law, a new science of intelligence and security informatics must concern itself with semantic attacks and countermeasures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Utility-Theoretic Information Retrieval, Cognitive Hacking, and Intelligence and Security Informatics

Libicki first characterized attacks on computer systems in the context of information warfare as being physical, syntactic, and semantic, where software agents were mislead by misinformation deliberately fed by an adversary [1]. Recently Cybenko et al. [2] defined cognitive hacking as an attack on a computer system directed at the mind of the user of the system, which, in order to succeed, had ...

متن کامل

Cognitive Hacking

In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that ...

متن کامل

Cognitive Hacking: Technological and Legal Issues

In this paper, we define a category of computer security exploits called "cognitive hacks." Loosely speaking, cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that operate solely within the...

متن کامل

Applications of Artificial Intelligence to Network Security

Attacks to networks are becoming more complex and sophisticated every day. Beyond the so-called script-kiddies and hacking newbies, there is a myriad of professional attackers seeking to make serious profits infiltrating in corporate networks. Either hostile governments, big corporations or mafias are constantly increasing their resources and skills in cybercrime in order to spy, steal or cause...

متن کامل

The Hacking Team Case: Quis Custodiet Ipsos Custodes? Issues and Challenges for a More Efficient Partnership Between Private Industry and Intelligence Agencies (in Italian)

L’attacco subito dalla società Hacking Team -fornitrice di servizi di intrusione offensiva e di sorveglianza per molti Governi ed agenzie di intelligence ad opera di un gruppo di hacker evidenzia le vulnerabilità della collaborazione tra agenzie di intelligence nazionali ed operatori privati nel campo della sicurezza cibernetica. Il presente lavoro ne analizza le implicazioni politiche e giurid...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004