Article

file

Visible to the public OODA Loops in Cyberspace: How Cyber Awareness Training Helps Threat Actors

Cybersecurity's human adversarial engagement is often lost in discussions of cybersecurity. We discuss how defenders' focus on technology unintentionally creates vulnerabilities which can be exploited by threat actors. In particular, we discuss how the convergence of cyber awareness training and defensive technologies is exploited by threat actors with devastating consequences.

forum

Visible to the public CFP - (ARM): 17th Workshop on Adaptive and Reflexive Middleware, Rennes, France, December 10-14, 2018.

17th Workshop on Adaptive and Reflexive Middleware (ARM 2018)

http://cedric.cnam.fr/arm

Theme of 2018: "Smart and Connected Communities for Environmental Challenges"

Rennes, France, December 10-14, 2018.

in conjunction with The ACM/IFIP/USENIX Middleware conference

ARM 2018 CFP

file

Visible to the public A Study on Situational Awareness Security and Privacy of Wearable Health Monitoring Devices

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer.

file

Visible to the public Spearphishing Defense Through Improved Usability

The information environment consists of three interrelated dimensions which are the physical, the informational and the cognitive. The most important of these is the cognitive dimension which encompasses the minds of people who interact with information and make decisions using information. Employing cyberspace operations, attackers use spearphishing to engage in espionage, sabotage and other intelligence-related activities. We discuss the use of an enhanced user interface as a means of counterintelligence to disrupt spearphishing attacks.

file

Visible to the public Strong Inference

Certain systematic methods of scientific thinking may produce much more rapid progress than others.

Science
16 October 1964, Volume 146, Number 3642

forum

Visible to the public Distracted Driving

A February 16 New York Times article on driver distraction notes systems should allow drivers to maintain hands on the wheel and not glace away from the road for more than two seconds.