DeepAI AI Chat
Log In Sign Up

An Introduction of System-Scientific Approaches to Cognitive Security

by   Linan Huang, et al.

Human cognitive capacities and the needs of human-centric solutions for "Industry 5.0" make humans an indispensable component in Cyber-Physical Systems (CPSs), referred to as Human-Cyber-Physical Systems (HCPSs), where AI-powered technologies are incorporated to assist and augment humans. The close integration between humans and technologies in Section 1.1 and cognitive attacks in Section 1.2.4 poses emerging security challenges, where attacks can exploit vulnerabilities of human cognitive processes, affect their behaviors, and ultimately damage the HCPS. Defending HCPSs against cognitive attacks requires a new security paradigm, which we refer to as "cognitive security" in Section 1.2.5. The vulnerabilities of human cognitive systems and the associated methods of exploitation distinguish cognitive security from "cognitive reliability" and give rise to a distinctive CIA triad, as shown in Sections and, respectively. Section introduces cognitive and technical defense methods that deter the kill chain of cognitive attacks and achieve cognitive security. System scientific perspectives in Section 1.3 offer a promising direction to address the new challenges of cognitive security by developing quantitative, modular, multi-scale, and transferable solutions.


Challenges and Opportunities in CPS Security: A Physics-based Perspective

The integration of cyber technologies (computing and communication) with...

Deriving Cyber-security Requirements for Cyber Physical Systems

Today's cyber physical systems (CPS) are not well protected against cybe...

Electric Vehicles Security and Privacy: Challenges, Solutions, and Future Needs

Electric Vehicles (EVs) share common technologies with classical fossil-...

Implications of ageing for the design of cognitive interaction systems

We are living longer in times of the biggest technological revolution hu...

Cybonto: Towards Human Cognitive Digital Twins for Cybersecurity

Cyber defense is reactive and slow. On average, the time-to-remedy is hu...

Cognitive Triaging of Phishing Attacks

In this paper we employ quantitative measurements of cognitive vulnerabi...