SlideShare a Scribd company logo
1 of 53
Cognitive Security:
All the other things
SJ Terp, 2021
1
INST408C: Cognitive Security
introduction
disinformation reports, ethics
researcher risks
fundamentals (objects)
cogsec risks
human system vulnerabilities and patches
psychology of influence
frameworks
relational frameworks
building landscapes
setting up an investigation
misinformation data analysis
disinformation data analysis
disinformation responses
monitoring and evaluation
games, red teaming and simulations
cogsec as a business
future possibilities
Cognitive Security: both of them
ā€œCognitive Security is the application of artificial
intelligence technologies, modeled on human
thought processes, to detect security threats.ā€ -
XTN
MLSec - machine learning in information security
ā— ML used in attacks on information systems
ā— ML used to defend information systems
ā— Attacking ML systems and algorithms
ā— ā€œAdversarial AIā€
ā€œCognitive Security (COGSEC) refers to
practices, methodologies, and efforts made to
defend against social engineering
attemptsā€’intentional and unintentional
manipulations of and disruptions to cognition
and sensemakingā€ - cogsec.org
CogSec - social engineering at scale
ā— Manipulation of individual beliefs,
belonging, etc
ā— Manipulation of human communities
ā— Adversarial cognition
Social Engineering: both of them
ā€œthe use of centralized planning in an attempt to
manage social change and regulate the future
development and behavior of a society.ā€
ā— Mass manipulation etc
ā€œthe use of deception to manipulate individuals
into divulging confidential or personal
information that may be used for fraudulent
purposes.ā€
ā— Phishing etc
What weā€™re dealing with
Actors
Entities behind disinformation
ā— Nationstates
ā— Individuals
ā— Companies
Entities part of disinformation
ā— DAAS companies
Image: https://gijn.org/2020/07/08/6-tools-and-6-techniques-reporters-
can-use-to-unmask-the-actors-behind-covid-19-disinformation/
Channels
Lots of channels:
Where people seek, share, post
information
Where people are encouraged to go
Image: https://d1gi.medium.com/the-election2016-micro-
propaganda-machine-383449cc1fba
Influencers
Users or accounts with influence over a
network
ā— Not the most followers
ā— The most influence
ā— Might be large influence over smaller
groups.
Groups
Social media groups created to create or
spread disinformation
ā— Often real members, fake creators
ā— Lots of themes
ā— Often closed groups
Messaging
Narratives designed to spread fast and be ā€œstickyā€
ā— Often on a theme
ā— Often repeated
Image: https://www.njhomelandsecurity.gov/analysis/false-
text-messages-part-of-larger-covid-19-disinformation-
campaign
Tools
ā— Bots
ā— IFTTT variants
ā— Personas
ā— Network analysis
ā— Marketing tools
Image: https://twitter.com/conspirator0/status/1249020176382779392
1000s of responders
The need for a
common language
Media view: Mis/Dis/Mal information
ā€œdeliberate promotionā€¦ of false,
misleading or mis-attributed information
focus on online creation, propagation,
consumption of disinformation
We are especially interested in
disinformation designed to change beliefs
or emotions in a large number of peopleā€
1
4
Military View: Information Operations
Information Security view: CogSec Layer
PHYSICAL
SECURITY
CYBER
SECURITY
COGNITIVE
SECURITY
Whatā€™s different between
cogsec and cybersecurity
Information Security vs Cognitive Security: Objects
Computers
Networks
Internet
Data
Actions
People
Communities
Internet
Beliefs
Actions
Narratives replace malware
1
9
Campaigns
Incidents
Narratives and
behaviours
Artifacts
ACTION
MONITORING
RESPONSIBLE FOR
Different System Boundaries
Internet
Domains
Social Media
Platforms
Organizationā€™s
Platforms
Lawmakers
Organizationā€™s
Business Units
COG SOC
Infosec SOC
Organizationā€™s
Communities
Media
What we took from
information security
CIA: Disinformation as an Integrity problem
ā€¢ Confidentiality: only the people/systems that are supposed to
have the information do
ā€¢ Integrity: the information has not been tampered with
ā€¢ Availability: people can use the system as intended
Incident models: STIX / TAXII
COGSEC
adaptations to STIX
CAMPAIGN
INCIDENT
NARRATIVE
ARTIFACT
Mapped onto other
disinformation
models
ACTOR
BEHAVIOUR
CONTENT
NARRATIVE
Behaviour models: Cyber killchain and ATT&CK
RECON WEAPONIZE DELIVER EXPLOIT CONTROL EXECUTE MAINTAIN
Persistence
Privilege
Escalation
Defense
Evasion
Credential
Access
Discovery
Lateral
Movement
Execution Collection Exfiltration
Command
and Control
26
AMITT Red: CogSec version of KillChain and ATT&CK
Adtech: sales funnels
Other work on techniques
e.g. FLICC (John Cook)
Denial tactics:
ā— Fake experts
ā— Logical fallacies
ā— Impossible expectations
ā— Cherry picking
ā— Conspiracy theories
Originally designed for climate change,
HIV/AIDs etc crossover
Planning
Strategic
Planning
Objective
Planning
Preparation
Develop
People
Develop
Networks
Microtargeting
Develop
Content
Channel
Selection
Execution
Pump Priming Exposure
Prebunking
Humorous counter
narratives
Mark content with
ridicule / decelerants
Expire social media
likes/ retweets
Influencer disavows
misinfo
Cut off banking
access
Dampen emotional
reaction
Remove / rate limit
botnets
Social media amber
alert
Etc
Go Physical Persistence
Evaluation
Measure
Effectiveness
Have a
disinformation
response plan
Improve stakeholder
coordination
Make civil society
more vibrant
Red team
disinformation, design
mitigations
Enhanced privacy
regulation for social
media
Platform regulation
Shared fact checking
database
Repair broken social
connections
Pre-emptive action
against disinformation
team infrastructure
Etc
Media literacy
through games
Tabletop simulations
Make information
provenance
available
Block access to
disinformation
resources
Educate influencers
Buy out troll farm
employees / offer
jobs
Legal action against
for-profit
engagement farms
Develop compelling
counter narratives
Run competing
campaigns
Etc
Find and train
influencers
Counter-social
engineering training
Ban incident actors
from funding sites
Address truth in
narratives
Marginalise and
discredit extremist
groups
Ensure platforms are
taking down
accounts
Name and shame
disinformation
influencers
Denigrate funding
recipient / project
Infiltrate in-groups
Etc
Remove old and
unused accounts
Unravel Potemkin
villages
Verify project before
posting fund requests
Encourage people to
leave social media
Deplatform message
groups and boards
Stop offering press
credentials to
disinformation outlets
Free open library
sources
Social media source
removal
Infiltrate
disinformation
platforms
Etc
Fill information
voids
Stem flow of
advertising money
Buy more advertising
than disinformation
creators
Reduce political
targeting
Co-opt disinformation
hashtags
Mentorship: elders,
youth, credit
Hijack content
and link to
information
Honeypot social
community
Corporate research
funding full disclosure
Real-time updates to
factcheck database
Remove non-relevant
content from special
interest groups
Content moderation
Prohibit images in
political Chanels
Add metadata to
original content
Add warning labels
on sharing
Etc
Rate-limit
engagement
Redirect searches
away from disinfo
Honeypot: fake
engagement system
Bot to engage and
distract trolls
Strengthen
verification methods
Verified ids to
comment or
contribute to poll
Revoke whitelist /
verified status
Microtarget likely
targets with
counter
messages
Train journalists to
counter influence
moves
Tool transparency
and literacy in
followed channels
Ask media not to
report false info
Repurpose images
with counter
messages
Engage payload and
debunk
Debunk/ defuse fake
expert credentials
Donā€™t engage with
payloads
Hashtag jacking
Etc
DMCA takedown
requests
Spam domestic
actors with lawsuits
Seize and analyse
botnet servers
Poison monitoring
and evaluation
data
Bomb link shorteners
with calls
Add random links to
network graphs
AMITT Blue: Countermeasures Framework
Intelligence community: Countermeasure categories
DECEIVE
DENY
DESTROY DETER
DEGRADE
DISRUPT
DETECT
Red/Blue
teaming:
using blue
to red links
CogSec version of Tiered Security Operations Centers
Seen in other tactical groups, e.g. Election Integrity Project
https://www.atlanticcouncil.org/in-depth-research-reports/the-long-fuse-eip-report-read/
Risk
Management
Disinformation as a risk management problem
Manage the risks, not the artifacts
ā€¢ Attack surfaces, vulnerabilities,
potential losses / outcomes
ā€¢ Risk assessment, reduction,
remediation
ā€¢ Risks: How bad? How big? How
likely? Who to?
Mis/disinformation is everywhere:
ā€¢ Where do you put your resources?
ā€¢ Detection, mitigation, response
ā€¢ People, technologies, time,
attention
ā€¢ Connections
Digital harms frameworks
(List from https://dai-global-digital.com/cyber-harm.html)
Physical harm e.g. bodily injury, damage to physical assets (hardware,
infrastructure, etc).
Psychological harm e.g. depression, anxiety from cyber bullying, cyber stalking etc
Economic harm financial loss, e.g. from data breach, cybercrime etc
Reputational harm e.g. Organization: loss of consumers; Individual: disruption of
personal life; Country: damaged trade negotiations.
Cultural harm increase in social disruption, e.g. misinformation creating real-
world violence.
Political harm e.g. disruption in political process, government services from
e.g. internet shutdown, botnets influencing votes
Responder Harms Management
Psychological damage
ā— Disinformation can be distressing material. It's not just the hate speech and _really_ bad images that you know
are difficult to look at - it's also difficult to spend day after day reading material designed to change beliefs and
wear people down. Be aware of your mental health, and take steps to stay healthy
ā— (this btw is why we think automating as many processes as make sense is good - it stops people from having
to interact so much with all the raw material).
Security risks
ā— Disinformation actors aren't always nice people. Operational security (opsec: protecting things like your
identity) is important
ā— You might also want to keep your disinformation work separated from your dayjob. Opsec can help here too.
Disinformation Risk Assessment
Information
Landscape
ā€¢ Information seeking
ā€¢ Information sharing
ā€¢ Information sources
ā€¢ Information voids
Threat
Landscape
ā€¢ Motivations
ā€¢ Sources/ Starting points
ā€¢ Effects
ā€¢ Misinformation Narratives
ā€¢ Hateful speech narratives
ā€¢ Crossovers
ā€¢ Tactics and Techniques
ā€¢ Artifacts
Response
Landscape
ā€¢ Monitoring organisations
ā€¢ Countering organisations
ā€¢ Coordination
ā€¢ Existing policies
ā€¢ Technologies
ā€¢ etc
Lifecycle models
CS-ISAO SERVICE OFFERING
Identification Understanding Cognitive Security to identify and manage risks (people, assets,
data, technology, capabilities, policies/ laws/regulations, vulnerabilities, supply
chain) and identification of the adversarial domain
Protection Implementing safeguards to ensure integrity and availability of information
systems and assets ā€“ Ability to limit or contain impacts ā€“ Provide awareness
and education
Detection Monitoring, detecting and sharing Cognitive Security intelligence, trends,
threats, attacks and their impacts
Response Communication of countermeasures (executing response processes, analysis,
mitigation, benefitting from lessons learned
Recovery Maintaining resilience plans, restoring impacted information, systems and
assets, benefitting from lessons learned
Emergency Lifecycle Models
From crisis management: Lifecycle management
Other parts of Social Engineering
ā— Persuade people to do things that arenā€™t in their own
interests.
ā— Like giving away passwords and other security
information
Types:
ā— Phishing: spoof links / sites
ā— Spear phishing: highly targeted
ā— Vishing: by voice, e.g. fake toll-free number
ā— Pretexting: impersonation
ā— Baiting: dropping infected USB drives etc
ā— Tailgating: following someone in
ā— Quid pro quo - helping in return for info
Watering hole attacks - infect websites that targets use
Denial of Service
Make a system inaccessible
Distributed denial of service (DDOS): use a lot of
machines to do this, so the attack appears to
come from many places
Whatā€™s still to take
from infosec
Information Sharing and Analysis Centres
ā€¢ Sustained by CS-ISAO Members & Sponsors
ā€¢ Supported by The International Association of Certified
ISAOs (IACI)
ā€¢ Connects Cognitive Security Domain Public- and Private-
Sector Stakeholders
ā€¢ Private-Sector Organizations
ā€¢ Government (US - Federal, State/Local/Tribal/ Territorial
(SLTT), International)
ā€¢ Critical Infrastructure Owners/Operators
ā€¢ Other Communities-of-Interest, Public, Disinformation
Initiatives/Programs/ Organizations, Social Medial
Organizations, Traditional Media, Relevant Technology
and Security Companies, Civil Society Groups,
Researchers/SMEs
ā€¢ Led by the Private Sector, in Cooperation, Coordination
and Collaboration with Government
Shift to trust management
Repeatable
Monitoring and
Evaluation
Resource Allocation and Automation
ā€¢ Tagging needs and groups with AMITT labels
ā€¢ Building collaboration mechanisms to reduce lost tips and repeated collection
ā€¢ Designing for future potential surges
ā€¢ Automating repetitive jobs to reduce load on humans
Other attack types from infosec
Ransomware
ā–  Malware gets onto your system
ā€“ (almost always, someone clicks on a link
they shouldnā€™t)
ā€“ Malware encrypts the files in your system
ā–  Actors demand ransom in exchange for
decryption / keys
ā–  Victim pays
ā€“ (victim almost always pays)
ā–  Victim decrypts files or
ā€“ Something goes wrong and files are lost
ā€“ (Victim often discovers they forget to take
backups)
Other attack types from psychology
Cognitive bias codex:
Chart of about 200 biases
Each of these is a vulnerability
THANK YOU
SJ Terp @bodaceacat
Dr. Pablo Breuer @Ngree_H0bit
53

More Related Content

What's hot

CanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfCanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfSaraJayneTerp
Ā 
Basic weaponization of social media
Basic weaponization of social mediaBasic weaponization of social media
Basic weaponization of social mediaLydia Snider
Ā 
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...MITRE - ATT&CKcon
Ā 
CSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdfCSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdfSaraJayneTerp
Ā 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...Falgun Rathod
Ā 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
Ā 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesPetter Bae BrandtzƦg
Ā 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringJeremiah Tillman
Ā 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_secSara-Jayne Terp
Ā 
CSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdfCSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdfSaraJayneTerp
Ā 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defensefantaghost
Ā 
Deception technology for advanced detection
Deception technology for advanced detectionDeception technology for advanced detection
Deception technology for advanced detectionJisc
Ā 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligencebalakumaran779
Ā 
Mapping Experiences with Actor Network Theory
Mapping Experiences with Actor Network TheoryMapping Experiences with Actor Network Theory
Mapping Experiences with Actor Network TheoryLiza Potts
Ā 
The Message is the Medium
The Message is the MediumThe Message is the Medium
The Message is the MediumVenkatesh Rao
Ā 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
Ā 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
Ā 
Psywar, Gaslighting and Stockholm Syndrome
Psywar, Gaslighting and Stockholm SyndromePsywar, Gaslighting and Stockholm Syndrome
Psywar, Gaslighting and Stockholm SyndromePeter Hammond
Ā 

What's hot (20)

CanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfCanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdf
Ā 
Basic weaponization of social media
Basic weaponization of social mediaBasic weaponization of social media
Basic weaponization of social media
Ā 
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
MITRE ATT&CKcon 2.0: AMITT - ATT&CK-based Standards for Misinformation Threat...
Ā 
CSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdfCSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdf
Ā 
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
OSINT - Open Source Intelligence "Leading Intelligence and Investigation Tech...
Ā 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
Ā 
Fake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sitesFake news and trust and distrust in fact checking sites
Fake news and trust and distrust in fact checking sites
Ā 
Bsides Chicago2017
Bsides Chicago2017Bsides Chicago2017
Bsides Chicago2017
Ā 
OSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gatheringOSINT: Open Source Intelligence gathering
OSINT: Open Source Intelligence gathering
Ā 
Offensive OSINT
Offensive OSINTOffensive OSINT
Offensive OSINT
Ā 
2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec2020 12 nyu-workshop_cog_sec
2020 12 nyu-workshop_cog_sec
Ā 
CSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdfCSW2022_05_data collection.pptx.pdf
CSW2022_05_data collection.pptx.pdf
Ā 
Cyber threats landscape and defense
Cyber threats landscape and defenseCyber threats landscape and defense
Cyber threats landscape and defense
Ā 
Deception technology for advanced detection
Deception technology for advanced detectionDeception technology for advanced detection
Deception technology for advanced detection
Ā 
Open source intelligence
Open source intelligenceOpen source intelligence
Open source intelligence
Ā 
Mapping Experiences with Actor Network Theory
Mapping Experiences with Actor Network TheoryMapping Experiences with Actor Network Theory
Mapping Experiences with Actor Network Theory
Ā 
The Message is the Medium
The Message is the MediumThe Message is the Medium
The Message is the Medium
Ā 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
Ā 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
Ā 
Psywar, Gaslighting and Stockholm Syndrome
Psywar, Gaslighting and Stockholm SyndromePsywar, Gaslighting and Stockholm Syndrome
Psywar, Gaslighting and Stockholm Syndrome
Ā 

Similar to Cognitive security: all the other things

2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...Sara-Jayne Terp
Ā 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageSara-Jayne Terp
Ā 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
Ā 
2020 09-01 disclosure
2020 09-01 disclosure2020 09-01 disclosure
2020 09-01 disclosureSara-Jayne Terp
Ā 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishingecarrow
Ā 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a baneAbhishek Sharma
Ā 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
Ā 
Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Stanford University
Ā 
The Business(es) of Disinformation
The Business(es) of DisinformationThe Business(es) of Disinformation
The Business(es) of DisinformationSara-Jayne Terp
Ā 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
Ā 
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionWhite Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionEMC
Ā 
Threat Sharing for Human Rights
Threat Sharing for Human RightsThreat Sharing for Human Rights
Threat Sharing for Human RightsMegan DeBlois
Ā 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_masterbodaceacat
Ā 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden PotentialEricaCiko
Ā 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxOxfordRiNorth
Ā 
Hieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurityHieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecuritySecurity Bootcamp
Ā 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsJack Whitsitt
Ā 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA Surender Singh
Ā 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformationSaraJayneTerp
Ā 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social MediaStefanie Panke
Ā 

Similar to Cognitive security: all the other things (20)

2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
Ā 
Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
Ā 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
Ā 
2020 09-01 disclosure
2020 09-01 disclosure2020 09-01 disclosure
2020 09-01 disclosure
Ā 
Social Networks And Phishing
Social Networks And PhishingSocial Networks And Phishing
Social Networks And Phishing
Ā 
Social networking boon or a bane
Social networking boon or a baneSocial networking boon or a bane
Social networking boon or a bane
Ā 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
Ā 
Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8Hacking CT Hacking for Diplomacy week 8
Hacking CT Hacking for Diplomacy week 8
Ā 
The Business(es) of Disinformation
The Business(es) of DisinformationThe Business(es) of Disinformation
The Business(es) of Disinformation
Ā 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Ā 
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionWhite Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
White Paper: Social Engineering and Cyber Attacks: The Psychology of Deception
Ā 
Threat Sharing for Human Rights
Threat Sharing for Human RightsThreat Sharing for Human Rights
Threat Sharing for Human Rights
Ā 
2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master2019 11 terp_breuer_disclosure_master
2019 11 terp_breuer_disclosure_master
Ā 
Unlocking the Hidden Potential
Unlocking the Hidden PotentialUnlocking the Hidden Potential
Unlocking the Hidden Potential
Ā 
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptxTopic-2.2_InfoPrivacy-IT-Ethics.pptx
Topic-2.2_InfoPrivacy-IT-Ethics.pptx
Ā 
Hieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurityHieupc-The role of psychology in enhancing cybersecurity
Hieupc-The role of psychology in enhancing cybersecurity
Ā 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication Skills
Ā 
SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA   SURENDER SINGH Senior Prosecutor NIA
SURENDER SINGH Senior Prosecutor NIA
Ā 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation
Ā 
Web Science Session 2: Social Media
Web Science Session 2: Social MediaWeb Science Session 2: Social Media
Web Science Session 2: Social Media
Ā 

More from Sara-Jayne Terp

2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeleySara-Jayne Terp
Ā 
BSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideBSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideSara-Jayne Terp
Ā 
Social engineering at scale
Social engineering at scaleSocial engineering at scale
Social engineering at scaleSara-Jayne Terp
Ā 
engineering misinformation
engineering misinformationengineering misinformation
engineering misinformationSara-Jayne Terp
Ā 
Online misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowOnline misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowSara-Jayne Terp
Ā 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSara-Jayne Terp
Ā 
Belief: learning about new problems from old things
Belief: learning about new problems from old thingsBelief: learning about new problems from old things
Belief: learning about new problems from old thingsSara-Jayne Terp
Ā 
risks and mitigations of releasing data
risks and mitigations of releasing datarisks and mitigations of releasing data
risks and mitigations of releasing dataSara-Jayne Terp
Ā 
Session 10 handling bigger data
Session 10 handling bigger dataSession 10 handling bigger data
Session 10 handling bigger dataSara-Jayne Terp
Ā 
Session 09 learning relationships.pptx
Session 09 learning relationships.pptxSession 09 learning relationships.pptx
Session 09 learning relationships.pptxSara-Jayne Terp
Ā 
Session 08 geospatial data
Session 08 geospatial dataSession 08 geospatial data
Session 08 geospatial dataSara-Jayne Terp
Ā 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptxSara-Jayne Terp
Ā 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptxSara-Jayne Terp
Ā 
Session 06 machine learning.pptx
Session 06 machine learning.pptxSession 06 machine learning.pptx
Session 06 machine learning.pptxSara-Jayne Terp
Ā 
Session 05 cleaning and exploring
Session 05 cleaning and exploringSession 05 cleaning and exploring
Session 05 cleaning and exploringSara-Jayne Terp
Ā 
Session 04 communicating results
Session 04 communicating resultsSession 04 communicating results
Session 04 communicating resultsSara-Jayne Terp
Ā 
Session 03 acquiring data
Session 03 acquiring dataSession 03 acquiring data
Session 03 acquiring dataSara-Jayne Terp
Ā 
Session 02 python basics
Session 02 python basicsSession 02 python basics
Session 02 python basicsSara-Jayne Terp
Ā 
Session 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSession 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSara-Jayne Terp
Ā 
Evolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemEvolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemSara-Jayne Terp
Ā 

More from Sara-Jayne Terp (20)

2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley2021-02-10_CogSecCollab_UBerkeley
2021-02-10_CogSecCollab_UBerkeley
Ā 
BSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guideBSidesLV 2018 talk: social engineering at scale, a community guide
BSidesLV 2018 talk: social engineering at scale, a community guide
Ā 
Social engineering at scale
Social engineering at scaleSocial engineering at scale
Social engineering at scale
Ā 
engineering misinformation
engineering misinformationengineering misinformation
engineering misinformation
Ā 
Online misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz nowOnline misinformation: they're coming for our brainz now
Online misinformation: they're coming for our brainz now
Ā 
Sj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_beliefSj terp ciwg_nyc2017_credibility_belief
Sj terp ciwg_nyc2017_credibility_belief
Ā 
Belief: learning about new problems from old things
Belief: learning about new problems from old thingsBelief: learning about new problems from old things
Belief: learning about new problems from old things
Ā 
risks and mitigations of releasing data
risks and mitigations of releasing datarisks and mitigations of releasing data
risks and mitigations of releasing data
Ā 
Session 10 handling bigger data
Session 10 handling bigger dataSession 10 handling bigger data
Session 10 handling bigger data
Ā 
Session 09 learning relationships.pptx
Session 09 learning relationships.pptxSession 09 learning relationships.pptx
Session 09 learning relationships.pptx
Ā 
Session 08 geospatial data
Session 08 geospatial dataSession 08 geospatial data
Session 08 geospatial data
Ā 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptx
Ā 
Session 07 text data.pptx
Session 07 text data.pptxSession 07 text data.pptx
Session 07 text data.pptx
Ā 
Session 06 machine learning.pptx
Session 06 machine learning.pptxSession 06 machine learning.pptx
Session 06 machine learning.pptx
Ā 
Session 05 cleaning and exploring
Session 05 cleaning and exploringSession 05 cleaning and exploring
Session 05 cleaning and exploring
Ā 
Session 04 communicating results
Session 04 communicating resultsSession 04 communicating results
Session 04 communicating results
Ā 
Session 03 acquiring data
Session 03 acquiring dataSession 03 acquiring data
Session 03 acquiring data
Ā 
Session 02 python basics
Session 02 python basicsSession 02 python basics
Session 02 python basics
Ā 
Session 01 designing and scoping a data science project
Session 01 designing and scoping a data science projectSession 01 designing and scoping a data science project
Session 01 designing and scoping a data science project
Ā 
Evolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemEvolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data Ecosystem
Ā 

Recently uploaded

Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
Ā 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
Ā 
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Sheetaleventcompany
Ā 
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...SofiyaSharma5
Ā 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
Ā 
Top Rated Pune Call Girls Daund āŸŸ 6297143586 āŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund āŸŸ 6297143586 āŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund āŸŸ 6297143586 āŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund āŸŸ 6297143586 āŸŸ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
Ā 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
Ā 
Hot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night Standkumarajju5765
Ā 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
Ā 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
Ā 
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
Ā 
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
Call Girls in Mayur Vihar āœ”ļø 9711199171 āœ”ļø Delhi āœ”ļø Enjoy Call Girls With Our...
Call Girls in Mayur Vihar āœ”ļø 9711199171 āœ”ļø Delhi āœ”ļø Enjoy Call Girls With Our...Call Girls in Mayur Vihar āœ”ļø 9711199171 āœ”ļø Delhi āœ”ļø Enjoy Call Girls With Our...
Call Girls in Mayur Vihar āœ”ļø 9711199171 āœ”ļø Delhi āœ”ļø Enjoy Call Girls With Our...sonatiwari757
Ā 
š“€¤Call On 7877925207 š“€¤ Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
š“€¤Call On 7877925207 š“€¤ Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...š“€¤Call On 7877925207 š“€¤ Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
š“€¤Call On 7877925207 š“€¤ Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
Ā 

Recently uploaded (20)

Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Saket Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Model Towh Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
Ā 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Ā 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
Ā 
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ā¤ļø 7710465962 Independent Call Girls In C...
Ā 
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida āœ”ļøā˜†9289244007āœ”ļøā˜† Female E...
Ā 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Ā 
Top Rated Pune Call Girls Daund āŸŸ 6297143586 āŸŸ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund āŸŸ 6297143586 āŸŸ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund āŸŸ 6297143586 āŸŸ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund āŸŸ 6297143586 āŸŸ Call Me For Genuine Sex Servi...
Ā 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
Ā 
Call Girls In South Ex šŸ“± 9999965857 šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SERVICE
Call Girls In South Ex šŸ“±  9999965857  šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SERVICECall Girls In South Ex šŸ“±  9999965857  šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SERVICE
Call Girls In South Ex šŸ“± 9999965857 šŸ¤© Delhi šŸ«¦ HOT AND SEXY VVIP šŸŽ SERVICE
Ā 
Hot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ā˜Ž 9711199171 Book Your One night Stand
Ā 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Ā 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Ā 
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
Ā 
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Pratap Nagar Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls In Ashram Chowk Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
Call Girls in Mayur Vihar āœ”ļø 9711199171 āœ”ļø Delhi āœ”ļø Enjoy Call Girls With Our...
Call Girls in Mayur Vihar āœ”ļø 9711199171 āœ”ļø Delhi āœ”ļø Enjoy Call Girls With Our...Call Girls in Mayur Vihar āœ”ļø 9711199171 āœ”ļø Delhi āœ”ļø Enjoy Call Girls With Our...
Call Girls in Mayur Vihar āœ”ļø 9711199171 āœ”ļø Delhi āœ”ļø Enjoy Call Girls With Our...
Ā 
š“€¤Call On 7877925207 š“€¤ Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
š“€¤Call On 7877925207 š“€¤ Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...š“€¤Call On 7877925207 š“€¤ Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
š“€¤Call On 7877925207 š“€¤ Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
Ā 

Cognitive security: all the other things

  • 1. Cognitive Security: All the other things SJ Terp, 2021 1
  • 2. INST408C: Cognitive Security introduction disinformation reports, ethics researcher risks fundamentals (objects) cogsec risks human system vulnerabilities and patches psychology of influence frameworks relational frameworks building landscapes setting up an investigation misinformation data analysis disinformation data analysis disinformation responses monitoring and evaluation games, red teaming and simulations cogsec as a business future possibilities
  • 3. Cognitive Security: both of them ā€œCognitive Security is the application of artificial intelligence technologies, modeled on human thought processes, to detect security threats.ā€ - XTN MLSec - machine learning in information security ā— ML used in attacks on information systems ā— ML used to defend information systems ā— Attacking ML systems and algorithms ā— ā€œAdversarial AIā€ ā€œCognitive Security (COGSEC) refers to practices, methodologies, and efforts made to defend against social engineering attemptsā€’intentional and unintentional manipulations of and disruptions to cognition and sensemakingā€ - cogsec.org CogSec - social engineering at scale ā— Manipulation of individual beliefs, belonging, etc ā— Manipulation of human communities ā— Adversarial cognition
  • 4. Social Engineering: both of them ā€œthe use of centralized planning in an attempt to manage social change and regulate the future development and behavior of a society.ā€ ā— Mass manipulation etc ā€œthe use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.ā€ ā— Phishing etc
  • 6. Actors Entities behind disinformation ā— Nationstates ā— Individuals ā— Companies Entities part of disinformation ā— DAAS companies Image: https://gijn.org/2020/07/08/6-tools-and-6-techniques-reporters- can-use-to-unmask-the-actors-behind-covid-19-disinformation/
  • 7. Channels Lots of channels: Where people seek, share, post information Where people are encouraged to go Image: https://d1gi.medium.com/the-election2016-micro- propaganda-machine-383449cc1fba
  • 8. Influencers Users or accounts with influence over a network ā— Not the most followers ā— The most influence ā— Might be large influence over smaller groups.
  • 9. Groups Social media groups created to create or spread disinformation ā— Often real members, fake creators ā— Lots of themes ā— Often closed groups
  • 10. Messaging Narratives designed to spread fast and be ā€œstickyā€ ā— Often on a theme ā— Often repeated Image: https://www.njhomelandsecurity.gov/analysis/false- text-messages-part-of-larger-covid-19-disinformation- campaign
  • 11. Tools ā— Bots ā— IFTTT variants ā— Personas ā— Network analysis ā— Marketing tools Image: https://twitter.com/conspirator0/status/1249020176382779392
  • 13. The need for a common language
  • 14. Media view: Mis/Dis/Mal information ā€œdeliberate promotionā€¦ of false, misleading or mis-attributed information focus on online creation, propagation, consumption of disinformation We are especially interested in disinformation designed to change beliefs or emotions in a large number of peopleā€ 1 4
  • 16. Information Security view: CogSec Layer PHYSICAL SECURITY CYBER SECURITY COGNITIVE SECURITY
  • 18. Information Security vs Cognitive Security: Objects Computers Networks Internet Data Actions People Communities Internet Beliefs Actions
  • 20. ACTION MONITORING RESPONSIBLE FOR Different System Boundaries Internet Domains Social Media Platforms Organizationā€™s Platforms Lawmakers Organizationā€™s Business Units COG SOC Infosec SOC Organizationā€™s Communities Media
  • 21. What we took from information security
  • 22. CIA: Disinformation as an Integrity problem ā€¢ Confidentiality: only the people/systems that are supposed to have the information do ā€¢ Integrity: the information has not been tampered with ā€¢ Availability: people can use the system as intended
  • 26. Behaviour models: Cyber killchain and ATT&CK RECON WEAPONIZE DELIVER EXPLOIT CONTROL EXECUTE MAINTAIN Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Execution Collection Exfiltration Command and Control 26
  • 27. AMITT Red: CogSec version of KillChain and ATT&CK
  • 29. Other work on techniques e.g. FLICC (John Cook) Denial tactics: ā— Fake experts ā— Logical fallacies ā— Impossible expectations ā— Cherry picking ā— Conspiracy theories Originally designed for climate change, HIV/AIDs etc crossover
  • 30. Planning Strategic Planning Objective Planning Preparation Develop People Develop Networks Microtargeting Develop Content Channel Selection Execution Pump Priming Exposure Prebunking Humorous counter narratives Mark content with ridicule / decelerants Expire social media likes/ retweets Influencer disavows misinfo Cut off banking access Dampen emotional reaction Remove / rate limit botnets Social media amber alert Etc Go Physical Persistence Evaluation Measure Effectiveness Have a disinformation response plan Improve stakeholder coordination Make civil society more vibrant Red team disinformation, design mitigations Enhanced privacy regulation for social media Platform regulation Shared fact checking database Repair broken social connections Pre-emptive action against disinformation team infrastructure Etc Media literacy through games Tabletop simulations Make information provenance available Block access to disinformation resources Educate influencers Buy out troll farm employees / offer jobs Legal action against for-profit engagement farms Develop compelling counter narratives Run competing campaigns Etc Find and train influencers Counter-social engineering training Ban incident actors from funding sites Address truth in narratives Marginalise and discredit extremist groups Ensure platforms are taking down accounts Name and shame disinformation influencers Denigrate funding recipient / project Infiltrate in-groups Etc Remove old and unused accounts Unravel Potemkin villages Verify project before posting fund requests Encourage people to leave social media Deplatform message groups and boards Stop offering press credentials to disinformation outlets Free open library sources Social media source removal Infiltrate disinformation platforms Etc Fill information voids Stem flow of advertising money Buy more advertising than disinformation creators Reduce political targeting Co-opt disinformation hashtags Mentorship: elders, youth, credit Hijack content and link to information Honeypot social community Corporate research funding full disclosure Real-time updates to factcheck database Remove non-relevant content from special interest groups Content moderation Prohibit images in political Chanels Add metadata to original content Add warning labels on sharing Etc Rate-limit engagement Redirect searches away from disinfo Honeypot: fake engagement system Bot to engage and distract trolls Strengthen verification methods Verified ids to comment or contribute to poll Revoke whitelist / verified status Microtarget likely targets with counter messages Train journalists to counter influence moves Tool transparency and literacy in followed channels Ask media not to report false info Repurpose images with counter messages Engage payload and debunk Debunk/ defuse fake expert credentials Donā€™t engage with payloads Hashtag jacking Etc DMCA takedown requests Spam domestic actors with lawsuits Seize and analyse botnet servers Poison monitoring and evaluation data Bomb link shorteners with calls Add random links to network graphs AMITT Blue: Countermeasures Framework
  • 31. Intelligence community: Countermeasure categories DECEIVE DENY DESTROY DETER DEGRADE DISRUPT DETECT
  • 33. CogSec version of Tiered Security Operations Centers
  • 34. Seen in other tactical groups, e.g. Election Integrity Project https://www.atlanticcouncil.org/in-depth-research-reports/the-long-fuse-eip-report-read/
  • 36. Disinformation as a risk management problem Manage the risks, not the artifacts ā€¢ Attack surfaces, vulnerabilities, potential losses / outcomes ā€¢ Risk assessment, reduction, remediation ā€¢ Risks: How bad? How big? How likely? Who to? Mis/disinformation is everywhere: ā€¢ Where do you put your resources? ā€¢ Detection, mitigation, response ā€¢ People, technologies, time, attention ā€¢ Connections
  • 37. Digital harms frameworks (List from https://dai-global-digital.com/cyber-harm.html) Physical harm e.g. bodily injury, damage to physical assets (hardware, infrastructure, etc). Psychological harm e.g. depression, anxiety from cyber bullying, cyber stalking etc Economic harm financial loss, e.g. from data breach, cybercrime etc Reputational harm e.g. Organization: loss of consumers; Individual: disruption of personal life; Country: damaged trade negotiations. Cultural harm increase in social disruption, e.g. misinformation creating real- world violence. Political harm e.g. disruption in political process, government services from e.g. internet shutdown, botnets influencing votes
  • 38. Responder Harms Management Psychological damage ā— Disinformation can be distressing material. It's not just the hate speech and _really_ bad images that you know are difficult to look at - it's also difficult to spend day after day reading material designed to change beliefs and wear people down. Be aware of your mental health, and take steps to stay healthy ā— (this btw is why we think automating as many processes as make sense is good - it stops people from having to interact so much with all the raw material). Security risks ā— Disinformation actors aren't always nice people. Operational security (opsec: protecting things like your identity) is important ā— You might also want to keep your disinformation work separated from your dayjob. Opsec can help here too.
  • 39. Disinformation Risk Assessment Information Landscape ā€¢ Information seeking ā€¢ Information sharing ā€¢ Information sources ā€¢ Information voids Threat Landscape ā€¢ Motivations ā€¢ Sources/ Starting points ā€¢ Effects ā€¢ Misinformation Narratives ā€¢ Hateful speech narratives ā€¢ Crossovers ā€¢ Tactics and Techniques ā€¢ Artifacts Response Landscape ā€¢ Monitoring organisations ā€¢ Countering organisations ā€¢ Coordination ā€¢ Existing policies ā€¢ Technologies ā€¢ etc
  • 41. CS-ISAO SERVICE OFFERING Identification Understanding Cognitive Security to identify and manage risks (people, assets, data, technology, capabilities, policies/ laws/regulations, vulnerabilities, supply chain) and identification of the adversarial domain Protection Implementing safeguards to ensure integrity and availability of information systems and assets ā€“ Ability to limit or contain impacts ā€“ Provide awareness and education Detection Monitoring, detecting and sharing Cognitive Security intelligence, trends, threats, attacks and their impacts Response Communication of countermeasures (executing response processes, analysis, mitigation, benefitting from lessons learned Recovery Maintaining resilience plans, restoring impacted information, systems and assets, benefitting from lessons learned
  • 43. From crisis management: Lifecycle management
  • 44. Other parts of Social Engineering ā— Persuade people to do things that arenā€™t in their own interests. ā— Like giving away passwords and other security information Types: ā— Phishing: spoof links / sites ā— Spear phishing: highly targeted ā— Vishing: by voice, e.g. fake toll-free number ā— Pretexting: impersonation ā— Baiting: dropping infected USB drives etc ā— Tailgating: following someone in ā— Quid pro quo - helping in return for info Watering hole attacks - infect websites that targets use
  • 45. Denial of Service Make a system inaccessible Distributed denial of service (DDOS): use a lot of machines to do this, so the attack appears to come from many places
  • 46. Whatā€™s still to take from infosec
  • 47. Information Sharing and Analysis Centres ā€¢ Sustained by CS-ISAO Members & Sponsors ā€¢ Supported by The International Association of Certified ISAOs (IACI) ā€¢ Connects Cognitive Security Domain Public- and Private- Sector Stakeholders ā€¢ Private-Sector Organizations ā€¢ Government (US - Federal, State/Local/Tribal/ Territorial (SLTT), International) ā€¢ Critical Infrastructure Owners/Operators ā€¢ Other Communities-of-Interest, Public, Disinformation Initiatives/Programs/ Organizations, Social Medial Organizations, Traditional Media, Relevant Technology and Security Companies, Civil Society Groups, Researchers/SMEs ā€¢ Led by the Private Sector, in Cooperation, Coordination and Collaboration with Government
  • 48. Shift to trust management
  • 50. Resource Allocation and Automation ā€¢ Tagging needs and groups with AMITT labels ā€¢ Building collaboration mechanisms to reduce lost tips and repeated collection ā€¢ Designing for future potential surges ā€¢ Automating repetitive jobs to reduce load on humans
  • 51. Other attack types from infosec Ransomware ā–  Malware gets onto your system ā€“ (almost always, someone clicks on a link they shouldnā€™t) ā€“ Malware encrypts the files in your system ā–  Actors demand ransom in exchange for decryption / keys ā–  Victim pays ā€“ (victim almost always pays) ā–  Victim decrypts files or ā€“ Something goes wrong and files are lost ā€“ (Victim often discovers they forget to take backups)
  • 52. Other attack types from psychology Cognitive bias codex: Chart of about 200 biases Each of these is a vulnerability
  • 53. THANK YOU SJ Terp @bodaceacat Dr. Pablo Breuer @Ngree_H0bit 53