Cognitive Hacking: Technological and Legal Issues

نویسندگان

  • George Cybenko
  • Annarita Giani
  • Carey Heckman
  • Paul Thompson
چکیده

In this paper, we define a category of computer security exploits called "cognitive hacks." Loosely speaking, cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that operate solely within the computer and network infrastructure. In this paper several cognitive hacking techniques are illustrated by example, legal issues related to cognitive hacking are discussed, and technologies for preventing and mitigating the effects of cognitive hacking attacks are proposed. Ultimately each individual is responsible for his or her use of technology and for decisions taken based on information gathered from the web. The primary concern here is with misinformation that cannot be easily detected. Who is responsible for a large loss incurred resulting from misinformation posted on the Web? Is this simply a matter of “buyer beware,” or can users be protected by technology or policy?

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cognitive Hacking

In this chapter, we define and propose countermeasures for a category of computer security exploits which we call "cognitive hacking." Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that ...

متن کامل

From Rule-Breaking to ROM-Hacking: Theorizing the Computer Game-as-Commodity

This paper develops a theory of the game as a commodity form by looking at the unique practices of console hackers and videogame emulation communities. This theory argues for the necessity of understanding a game's system of rules in relation to the material conditions and constraints of the media within which it is constructed and distributed. After deriving the computer game-as-commodity from...

متن کامل

Technological determinism as a collective action framing of hackers and geek publics

The expansion of intellectual property laws and the introduction of technologies to enforce the claims of rights holders have become hotly contested issues. Among other well documented effects, these debates have politicized hackers and other groups of computer users in new ways. One notable example is the mobilisation of free software programmers against the attempt to introduce software paten...

متن کامل

Digital Identity

Recently the National Center for Digital Government held a workshop on “The Virtual Citizen: Identity, Autonomy, and Accountability: A Civic Scenario Exploration of the Role of Identity in On-Line. Discussions at the workshop focused on five scenarios for future authentication policies with respect to digital identity. The underlying technologies considered for authentication were: biometrics: ...

متن کامل

Framework and principles for active cyber defense

This essay offers a broad view of active defense derived from the concept of active air and missile defense. This view admits a range of cyber defenses, many of which are widely deployed and considered essential in today’s threat environment. Instead of equating active defense to hacking back, this wider interpretation lends itself to distinguishing different types of active defense and the leg...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004