Cyber Security

file

Visible to the public Improving Cybersecurity Through Human Systems Integration 29 June 2016

Advanced Persistent Threat (APT) attackers accomplish their attack objectives by co-opting users' credentials. Traditional cyber defenses leave users vulnerable to APT attacks which employ spearphishing. The success of spearphishing attacks is not a data processing failure, but is the result of defenders failing to apply the principles of Human System Integration to the problem of spearphishing. We discuss an alternative defensive strategy which addresses human performance capabilities and limitations to disrupt spearphishing attacks.

file

Visible to the public Spearphishing Defense Through Improved Usability

The information environment consists of three interrelated dimensions which are the physical, the informational and the cognitive. The most important of these is the cognitive dimension which encompasses the minds of people who interact with information and make decisions using information. Employing cyberspace operations, attackers use spearphishing to engage in espionage, sabotage and other intelligence-related activities. We discuss the use of an enhanced user interface as a means of counterintelligence to disrupt spearphishing attacks.

event

Visible to the public  Graduate Summer School: Games and Contracts for Cyber-Physical Security
Jul 07, 2015 9:00 am - Jul 23, 2015 4:30 pm CDT

This summer school will provide a rare opportunity for researchers in mathematics, computer science, engineering, and related sciences to learn about recent research directions and future challenges in this area. Funding is available to support graduate students and postdoctoral researchers in the early stages of their career, as well as more senior researchers interested in undertaking new research in this area. Encouraging the careers of women and minority mathematicians and scientists is an important component of IPAM's mission, and we welcome their applications.