Visible to the public A Framework for Human Error, Weaknesses, Threats & Mitigation Measures in an Airgapped Network

TitleA Framework for Human Error, Weaknesses, Threats & Mitigation Measures in an Airgapped Network
Publication TypeConference Paper
Year of Publication2022
AuthorsShaikh, Rizwan Ahmed, Sohaib Khan, Muhammad, Rashid, Imran, Abbas, Haidar, Naeem, Farrukh, Siddiqi, Muhammad Haroon
Conference Name2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)
KeywordsAir gaps, air-gap networks, composability, computer networks, Computer worms, Data collection, Error, Framework, human, Human Behavior, measurement uncertainty, Metrics, Organizations, psycho-social, pubcrawl, Reconnaissance, resilience, Resiliency, scalable verification, social networking (online)
Abstract

Many organizations process and store classified data within their computer networks. Owing to the value of data that they hold; such organizations are more vulnerable to targets from adversaries. Accordingly, the sensitive organizations resort to an 'air-gap' approach on their networks, to ensure better protection. However, despite the physical and logical isolation, the attackers have successfully manifested their capabilities by compromising such networks; examples of Stuxnet and Agent.btz in view. Such attacks were possible due to the successful manipulation of human beings. It has been observed that to build up such attacks, persistent reconnaissance of the employees, and their data collection often forms the first step. With the rapid integration of social media into our daily lives, the prospects for data-seekers through that platform are higher. The inherent risks and vulnerabilities of social networking sites/apps have cultivated a rich environment for foreign adversaries to cherry-pick personal information and carry out successful profiling of employees assigned with sensitive appointments. With further targeted social engineering techniques against the identified employees and their families, attackers extract more and more relevant data to make an intelligent picture. Finally, all the information is fused to design their further sophisticated attacks against the air-gapped facility for data pilferage. In this regard, the success of the adversaries in harvesting the personal information of the victims largely depends upon the common errors committed by legitimate users while on duty, in transit, and after their retreat. Such errors would keep on repeating unless these are aligned with their underlying human behaviors and weaknesses, and the requisite mitigation framework is worked out.

DOI10.1109/ICoDT255437.2022.9787441
Citation Keyshaikh_framework_2022