Running Head: HUMAN ATTACKER ATTRIBUTES 1
HUMAN ATTACKER ATTRIBUTES 2
Human attacker attributes
This entails evaluation and understanding of the human attributes that contribute to triggering attacker and their skill during data attacks. Security practitioners establish that even the best preventive measures applicable cant be used in the prevention of every strike. Attackers are tenacious, and eventually, some will end up penetrating organizations. A progressing attack can be stopped through proactive monitoring of the attack, incident response, the attacks forensic analysis and finally remediation which can be able to stop the attackers before causing more severe harm (Miller, 2018).
Security problems across the globe consist of the offensive and defensive actions whereby the aim of the attackers is stealing and gaining accessibility to asserts, goods, or information while on the other hand, the defenders allocate their limited security resources in the prevention of actions of the attackers. For instance, unauthorized intelligent intrusions defense can be challenging in the cyber world considering the environment hyper-dimensionality, digital weapon types used, operations speed, and the nodes large numbers for protection against a high relative amount of potential attackers (Khosrow-Pour, 2017).
The attributes of human attackers can be classified into three key attributes, namely, adaptivity, intelligence, and creativity. This can be elaborated differently, for instance, creativity, which is majorly similar to risk compliance managers, corporate auditors, and security teams who are portrayed as potential business growth hindrances. They’re demonstrated as business innovation killjoys through access restriction, imposing rules and controls. The aspect of cyber-attacks and cybercrimes has continually increased in severity around the globe affecting networks, systems, and users. System vulnerabilities have been a critical focus by researchers who focus on cybersecurity through the development of new and better holistic approaches for cybersecurity system risk characterizing. This process has majored in human attributes describing which have continually contributed to cybersecurity risk and vulnerabilities (Nicholson, 2017).
Intelligence, adaptivity, and creativity are the three critical human attacker attribute that translates to the fact that whatever system of security is installed will undergo probing, testing, and the aspect of reverse engineering. Hence individuals in the security system sector should assume that attackers are equally skilled, if not more. The computer security truism establishes that the defender has an obligation of closing every hole since the attacker’s success is dependent on the availability of just one hole. Hence the task of understanding the adversaries is on the defender through a holistic and thorough analysis (Kuusisto & Kurkinen, 2013).
Cybercriminals have generally been established to be super clever, and they base their success with the availability of just a single opportunity. Once there’s the availability of a unique link of weakness. The defense chain can easily be broken, which means that unprotected vulnerabilities that are exposed are critical in attack successes. The concept of social engineering is crucial in understanding the contribution of human attributes regarding database and data attacks, which dramatically involves the understanding and evaluation of human characteristics, which contributes to triggering hackers and the skills they possess during data attacks (Chen & Fadlalla, 2008).
Cybercriminals have been primarily established to be intelligent and knowledgeable in the field of computer science, programming, and generally the concept of information technology. Cybercriminals can conduct system vulnerability evaluation and consequently attack and hence data compromising, which is attributed to their advanced knowledge in architecture and network design. The intelligence of cyber attackers is mainly evident in today’s technology world, for example, industrial espionage where the aim is information and disruption which a low tolerance to risk with quite high efforts and challenging targets don’t seem to act as barriers due to sophisticated methods (Kuusisto & Kurkinen, 2013).
Cybercriminals in today’s technological world, quickly adapt to technological advancements such as cloud computing, which has recently become a trend in the IT fields and computer science in general. Hence cybercriminals have recently been established to train and adapt, thus creating weaknesses and taking advantage of systems. For instance, cyber-crimes have the main aim of gaining financial advantage with low tolerance on risk, low-medium efforts; hence cybercriminals go after small hanging fruits with proven methods (Nicholson, 2017).
Cybercriminals significantly employ creativity in systems and data attacks. For instance, data integrity is compromised by attackers through the creation of Trojan horses, viruses, among others. Creativity is evident through, for example, computer hacktivists where the main aim has been established to be information, disruption and the attention of the media with medium-high risk tolerance with computer survey that doesn’t necessitate sophisticated methods (Khosrow-Pour, 2017).
Organizations around the globe will have to make decisions on different human attacker’s forms and threat agents that pose potential scenarios of attacks and which can consequently be ignored if available. Human attacker attributes are likely to be different significantly. They pose danger than others to the organizations’ mission depending on the system use, exposure, and the amount of data it handles. Organizations that encounter less controversy need not worry with regards to computer activism, while organizations that have minimal financial rewards need not be concerned about cyber-crimes; consequently, organizations that handle lots of liquid funds focus on cyber-crimes primarily (Miller, 2018).
Chen, K., & Fadlalla, A. (2008). Online consumer protection: Theories of human relativism: Theories of social relativism. IGI Global.
Khosrow-Pour, D. (2017). Encyclopedia of information science and technology (4th ed.). IGI Global.
Kuusisto, R., & Kurkinen, E. (2013). Proceedings of the 12th European conference on information warfare and security: ECIW 2013. Academic Conferences.
Miller, T., Oren, N., Sakurai, Y., Noda, I., Savarimuthu, B. T., & Son, T. C. (2018). PRIMA 2018: Principles and practice of multi-agent systems: 21st International Conference, Tokyo, Japan, October 29-November 2, 2018, proceedings. Springer.
Nicholson, D. (2017). Advances in human factors in cybersecurity: Proceedings of the AHFE 2017 International Conference on social factors in cybersecurity, July 17−21, 2017, the Westin Bonaventure Hotel, Los Angeles, California, USA. Springer.