cognitive security - isc)2 quantico chapter€¦ · •cyber cultural trends •advancements in...

13
Cognitive Security (third layer of Cybersecurity – Cyber Persona) DR. ALENKA BROWN ([email protected])

Upload: others

Post on 18-Oct-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Cognitive Security(third layer of Cybersecurity – Cyber Persona)

DR. ALENKA BROWN

( A L E N K A 0 2 2 6 @ G M A I L . C O M )

Page 2: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Cognitive Security: Cognitive Layer

Logical Layer

(non-kinetic)

Physical Layer

(kinetic)

Cognitive Layer

Cognitive layer is the convergence between kinetic and non-kinetic operations with a dynamic set of solutions

Page 3: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Cognitive Security: Cognitive Layer

Cognitive forensic analytics

• identify congruence and incongruence in human behavior

• social engineering

• influencing mechanisms in social media

• predicative movements/trends

• cyber cultural trends

• advancements in insider threat

• asymmetric techniques and tradecraft (defensive and offensive operations)

Cognitive security

• cognitive authentication, cognitive firewalls, cognitive malware, cognitive IDPS

Page 4: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Cognitive Security:

gait

breathing

heartratehand gestures

eye movements

head posture

decision graph

sitting posture

text

signaturesVoice

typing

behavioral assessmentseye scans brainwaves

Design

Human System

COGINT

Page 5: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Ex: Sensory Operations Extraction

Comparing different and similar keystroke/mouse patterns

K-V

K-V

V-K

K-V

K-V

V-K

Mean typing rateCharacter frequencyAcceleration

K → V

Page 6: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Cogni-Patterns

Formed at the unconscious from external inputs and the sensory operators, these patterns establish

our behaviors, capabilities, intuitions, beliefs/values forming our personality or identity and decisions.

Explains / demonstrates how we think and communicate.

Page 7: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Cogni-pattern Cognitive Fingerprint

Baseline Cognitive Pattern

Metrics

Cogni-pattern :

• Provides baseline of thought process/patterns

• Identifies deviations of baseline cog-pattern

• Identifies behaviors associated with ‘a’ cognitive pattern

• Identifies programming from culture, peers, family, experiences…

• Identifies the types of personalities derived from the cognitive pattern

• Identifies flaws and success of decision strategies, and ….

• Deterministic• Biometrics• Digital logs• Voice

• Analog

• Character traits• Belief constructs• Self References• Inferences

Strategies

Metrics

Thought Process[V] → [ K → A → V ]

Fundamental Behaviors

Defined by the Cogni-pattern

Produces

Cognitive Fingerprint

Page 8: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Cognitive analytics can be used to:

• Identify applicants’ cognitive signature pattern [V] → [ K → A → V ]

from:

Clearances

questionnaires photoswritten material

or hand writing

• From the signature pattern, we can map the applicant’s stress pattern

and correlate this pattern to specific context. [K/V] → [ V → A → K ]

pre-written

assessments

Page 9: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

cognitive

signature

pattern

Influencing User’s Cognitive Pattern

Page 10: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Formed from Multiple Thoughts

a single thought

CollectiveThreat

Page 11: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Machine Learning

of

cogni-patterns(mirror human thought

process)

Cognitive Analytics

from

Big Data Platforms

produce

cogni-patterns

Cognitive Security: AI

PCT of machine

Learning using & cogni-patterns

Smart Devices/SCADA/JCC2

Page 12: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)

Cognitive Security: System-Networks

admin

cognitive

signature

pattern

voice

Cognitive Indicators

that produce the:

heartbeatsexternal behavior

feedbk

feedfod

Page 13: Cognitive Security - ISC)2 Quantico Chapter€¦ · •cyber cultural trends •advancements in insider threat •asymmetric techniques and tradecraft (defensive and offensive operations)