Visible to the public Disrupting the attack lifecycle: how do attackers behave?Conflict Detection Enabled

TitleDisrupting the attack lifecycle: how do attackers behave?
Publication TypePresentation
Year of Publication2017
AuthorsKelly Shortridge
KeywordsCognitive Security, Cognitive Security in Cyber
Abstract

In the realm of cybersecurity, the fact that hackers are human is often forgotten. It is important to examine the biases and behavior of attackers. Kelly Shortridge, detection project manager at BAE Systems Applied Intelligence, has highlighted five key points in regard to attacker biases, which include the avoidance of hard targets, the preference for repeatable or repackageable attacks, risk aversion, and more. Shortridge also identifies the ways in which these biases can be leveraged by defenders.

URLhttps://swagitda.com/speaking/Attacker-Behavior-RiskSecNY-2017-Kelly-Shortridge.pdf
Citation Keynode-62643