Question

In: Computer Science

discuss any three psychological approaches to launch an information security attack.

discuss any three psychological approaches to launch an information security attack.

Solutions

Expert Solution

Answer)

The Information system is mostly with respect to people, information, specific facilities, and applications. Such is called as the information assets and information security would help in protecting the assets and keeping those safe from attacks. It is mostly the confidentiality, availability, and that of integrity which might get compromised and are to be maintained safety measures. The current cyber attacks are referred to as advanced persistent threat or otherwise known as targeted attacks. Such attacks would mostly play tactics with users psychologically or check the behavioral pattern to invade into the systems. Security is more of a behavioral issue than a technological problem. With the help of behavioral science and psychological hint, the attacker can invade into the systems and achieve their goal.

Some of the approaches are as mentioned below:

1) Password protection: Users mostly tend to use easy passwords and use the same password all over which leads to the risk of attacks

2) Phishing Trap: This happens when people fall prey to the frauds of tech-based attention seekers and in turn trick people and ask them for password and personal information

3) Connected devices: Though this has been a boon to have all the devices connected but this has also made the life easier for the hackers to have access to all the connected devices if one device is exposed.

Please comment in case you need any other inputs.
Please share a like if you find the answer helpful.
Thank you.


Related Solutions

Discuss the three approaches to psychological treatment
Discuss the three approaches to psychological treatment
Discuss any limitations of the management approaches to motivation
Discuss any limitations of the management approaches to motivation
Evaluate and discuss any limitations of management approaches to motivation.
Evaluate and discuss any limitations of management approaches to motivation. Construct an alternative model, or formulate a plan, that describes how you would resolve these limitations and increase motivation.
DQ1: List any of the three common core security principles and discuss how it applies to...
DQ1: List any of the three common core security principles and discuss how it applies to your organization. DQ2: List and discuss three security policies that support the business continuity planning in your organization. How does Business Impact Analysis BIA help in realigning organizational security policies in your organization?
Discuss telecommunication operations and three (3) security measures to ensure     protection of information.
Discuss telecommunication operations and three (3) security measures to ensure     protection of information.
Define and discuss typical Web Site and Web Application Security tools and attack mitigation processes.
Define and discuss typical Web Site and Web Application Security tools and attack mitigation processes.
Discuss three approaches to safeguard online privacy of consumers.
Discuss three approaches to safeguard online privacy of consumers.
What is psychological disorder and how do psychological approaches of psychoanalysis, humanism, and behavioralism explain abnormal...
What is psychological disorder and how do psychological approaches of psychoanalysis, humanism, and behavioralism explain abnormal behavior? Why are clinical assessment and diagnosis? Please explain your answers and use examples. Include supportive evidence; such as direct applicable experience and expert sources.
WEEK 9 DISCUSSION Answer any two of the questions below: Discuss any approaches, tools, or techniques...
WEEK 9 DISCUSSION Answer any two of the questions below: Discuss any approaches, tools, or techniques that may be helpful in assessing and identifying risks in IS projects. How can communication help in identifying AND managing risk? Give an example from your personal or professional experience. When looking at risks in the project environment, why are we concerned with the impact and probability of a potential risk event? When is the best time to assess potential risks in an IS...
2. Discuss whether James Stewart’s assessment of eBay reflects any psychological phenomena.
2. Discuss whether James Stewart’s assessment of eBay reflects any psychological phenomena.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT