1/16
Flashcards on Cyber Psychology
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cyber psychology
The human factors aspects of cyber security.
Vishing
A type of cyber attack. See link provided.
Phishing emails
In Australia, 74% of cyber attacks are phishing emails.
Social Engineering
Strategies deployed in phishing attempts to trick users into divulging information.
Cialdini's principles of persuasion
Authority, Consistency, Liking, Reciprocity, Scarcity, Social Proof, and Unity; Referred to in cyber security as Social Engineering Principles.
Social Engineering Principle: Authority
People are more likely to respond if they perceive the message sender as having power or authority.
Social Engineering Principle: Scarcity/Urgency
People are more likely to respond when they perceive an offer as rare or as time limited.
Social Engineering Principle: Social Proof
People are more likely to respond when they think that other people are doing the same thing.
Event congruency
Contextualizing messages increases the effectiveness of phishing.
Time pressure
People's information processing changes when they have limited time to make decisions.
Stress
Peoples’ information processing changes when they are under stress and makes one more susceptible to social engineering attacks.
Trusted sources
We are more likely to evaluate information in a positive light when delivered by someone we trust.
Personalisation
When an email contains cues that it is specifically for you and typically uses your name in the salutation.
Cyber Hygiene
Desired online behaviors such as keeping strong passwords, updating systems, and using 2FA.
Dual process model of cognition
System 1: Fast, no effort, automatic. System 2: Slow, high effort, must be consciously engaged in.
System 1
Intuitive / Instinctive: Fast, no effort, automatic, autonomous, many different processes (Heuristics), does NOT require Working Memory.
System 2
Rational / Analytical: Slow, high effort, must be consciously engaged in, can be mediated, arguably a single resource, dependent on Working Memory.