logo

Cyber Threat Psychology

Psychological motivations of attackers, their origins, transmission aspects, "receiver side" mindsets and behaviours, how to change...

Exploring

Cyber Threat Psychology

A cyberattack involves multiple actors whose motivation, thinking, behaviours and experiences often going back into early childhood of all actors. This research stream of the CSA Swiss Chapter is looking into the psychological motivations of attackers, potential approaches how to influence behaviours of attackers to turn them into positive constructive contribution rather than negative harmful destruction, and how to approach mindsets of those who may be attacked in order to preempt and prevent attacks from being successful. Lastly, if under attack, the behaviours of those who are impacted by the attack may significantly change how severe the impact of the attack will be, which is a further important aspect to explore.

Outline of the Research
‍1. The Attacker: mindset, behaviours and influences
2. The Victim: aspects of behaviours to preempt, prevent or mitigate attacks from being successful
3. What if it happened: how to behave under attack to positively influence the course of action and outcome
4. Mindset change: what to consider in order to turn evil into positive
5. Behaviour change: how to apply curiosity and turn it into mischievousvigilance
6. Organisational change: modifying processes, incentives and organisational mindset to effect a culture change

A Working Group within the CSA Swiss Chapter is in the process of being set up. Call for contribution to cooperate in this important research stream.

Blog

Cyber Threat Psychology

Psychological motivations of attackers, their origins, transmission aspects, "receiver side" mindsets and behaviours, how to change ...

Read More

Artificial Intelligence as a Catalyst for Social Engineering

Artificial intelligence (AI) is rapidlytransforming various aspects of our lives, driving increased efficiency andautomation. However, this technological advancement also presents significantchallenges to cybersecurity. Cybercriminals, unconstrained by ethicalconsiderations, are increasingly leveraging AI for malicious purposes, withsocial engineering attacks being a prime target. The growing accessibility ofAI tools further exacerbates this issue, making it easier for even lesssophisticated actors to deploy these tactics.

Read More

The Cloud Security Alliance Swiss Chapter has started a new Research Project on Cyber Threat Psychology

The new Cyber Threat Psychology Research Project intends to set the focus on the supply side i.e. the hackers and their motivations and incentive structures, what made them become a hacker, the transmission mechanisms supporting the attack to succeed, and of course also on the receiving side i.e. the victims.

Read More

Publications

Zero Trust Guidance for Small and Medium Size Businesses (SMBs)

This publication provides guidance for small and medium-sized businesses (SMBs) transitioning to a Zero Trust architecture

DoD Zero Trust Strategy

This Zero Trust strategy, the first of its kind for the Department, provides the necessary guidance for advancing Zero Trust concept development; gap analysis, requirements development, implementation, execution decision-making, and ultimately procurement and deployment of required ZT capabilities and activities which will have meaningful and measurable cybersecurity impacts upon adversaries. Importantly, this document serves only as a strategy, not a solution architecture. Zero Trust Solution Architectures can and should be designed and guided by the details found within this document.

Department of Defense (DoD) Zero Trust Reference Architecture

The DoD Cybersecurity Reference Architecture (CS RA) documents the Department’s approach to cybersecurity and is being updated to become data centric and infuse ZT principles. ZT supports the 2018 DoD Cyber Strategy, the 2019 DoD Digital Modernization Strategy, the 2021 Executive Order on Improving the Nation’s Cybersecurity, and the DoD Chief Information Officer’s (CIO) vision for creating “a more secure, coordinated, seamless, transparent, and costeffective architecture that transforms data into actionable information and ensures dependable mission execution in the face of a persistent cyber threat.” 2 ZT should be used to re-prioritize and integrate existing DoD capabilities and resources, while maintaining availability and minimizing temporal delays in authentication mechanisms, to address the DoD CIO’s vision

NSTAC Report

In May 2021, in the aftermath of a series of significant cybersecurity incidents, the White House tasked the President’s National Security Telecommunications Advisory Committee (NSTAC) with conducting a multi-phase study on “Enhancing Internet Resilience in 2021 and Beyond.” The tasking directed NSTAC to focus on three key

Zero Trust Architecture

This publication has been developed by NIST in accordance with its statutory responsibilities under the Federal Information Security Modernization Act (FISMA) of 2014, 44 U.S.C. § 3551 et seq., Public Law (P.L.) 113-283. NIST is responsible for developing information security standards and guidelines, including minimum requirements for federal information systems, but such standards and guidelines shall not apply to national security systems without the express approval of appropriate federal officials exercising policy authority over such systems. This guideline is consistent with the requirements of the Office of Management and Budget (OMB) Circular A-130.

Zero Trust Maturity Model

Zero trust provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised. The goal is to prevent unauthorized access to data and services and make access control enforcement as granular as possible. Zero trust presents a shift from a location-centric model to a more data-centric approach for fine-grained security controls between users, systems, data and assets that change over time; for these reasons. This provides the visibility needed to support the development, implementation, enforcement, and evolution of security policies. More fundamentally, zero trust may require a change in an organization’s philosophy and culture around cybersecurity.

NSA: Embracing a Zero Trust Security Model

As cybersecurity professionals defend increasingly dispersed and complex enterprise networks from sophisticated cyber threats, embracing a Zero Trust security model and the mindset necessary to deploy and operate a system engineered according to Zero Trust principles can better position them to secure sensitive data, systems, and services.