A Survey on Human and Personality Vulnerability Assessment in Cyber-security: Challenges, Approaches, and Open Issues

06/18/2021
by   Dimitra Papatsaroucha, et al.
0

These days, cyber-criminals target humans rather than machines since they try to accomplish their malicious intentions by exploiting the weaknesses of end users. Thus, human vulnerabilities pose a serious threat to the security and integrity of computer systems and data. The human tendency to trust and help others, as well as personal, social, and cultural characteristics, are indicative of the level of susceptibility that one may exhibit towards certain attack types and deception strategies. This work aims to investigate the factors that affect human susceptibility by studying the existing literature related to this subject. The objective is also to explore and describe state of the art human vulnerability assessment models, current prevention, and mitigation approaches regarding user susceptibility, as well as educational and awareness raising training strategies. Following the review of the literature, several conclusions are reached. Among them, Human Vulnerability Assessment has been included in various frameworks aiming to assess the cyber security capacity of organizations, but it concerns a one time assessment rather than a continuous practice. Moreover, human maliciousness is still neglected from current Human Vulnerability Assessment frameworks; thus, insider threat actors evade identification, which may lead to an increased cyber security risk. Finally, this work proposes a user susceptibility profile according to the factors stemming from our research.

READ FULL TEXT

page 8

page 9

page 14

page 23

page 29

research
12/10/2022

A systematic literature review on cyber threat hunting

Since the term "Cyber threat hunting" was introduced in 2016, there have...
research
04/13/2023

Murder by design: Design thinking approach for pre-emptive cybernetic security design

In an ever more connected world, awareness has grown towards the hazards...
research
02/27/2023

Detection and Amelioration of Social Engineering Vulnerability in Contingency Table Data using an Orthogonalised Log-linear Analysis

Social Engineering has emerged as a significant threat in cyber security...
research
06/29/2022

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Identification of cyber threats is one of the essential tasks for securi...
research
02/05/2021

Designing a Cyber-security Culture Assessment Survey Targeting Critical Infrastructures During Covid-19 Crisis

The paper at hand presents the design of a survey aiming at the cyber-se...
research
06/19/2021

Cyber Security in Cloud: Risk Assessment Models

The present paper shows a proposal of the characteristics Cloud Risk Ass...
research
09/07/2022

State of Security Awareness in the AM Industry: 2020 Survey

Security of Additive Manufacturing (AM) gets increased attention due to ...

Please sign up or login with your details

Forgot password? Click here to reset