cognitive security - isc)2 quantico chapter€¦ · •cyber cultural trends •advancements in...
TRANSCRIPT
Cognitive Security(third layer of Cybersecurity – Cyber Persona)
DR. ALENKA BROWN
( A L E N K A 0 2 2 6 @ G M A I L . C O M )
Cognitive Security: Cognitive Layer
Logical Layer
(non-kinetic)
Physical Layer
(kinetic)
Cognitive Layer
Cognitive layer is the convergence between kinetic and non-kinetic operations with a dynamic set of solutions
Cognitive Security: Cognitive Layer
Cognitive forensic analytics
• identify congruence and incongruence in human behavior
• social engineering
• influencing mechanisms in social media
• predicative movements/trends
• cyber cultural trends
• advancements in insider threat
• asymmetric techniques and tradecraft (defensive and offensive operations)
Cognitive security
• cognitive authentication, cognitive firewalls, cognitive malware, cognitive IDPS
Cognitive Security:
gait
breathing
heartratehand gestures
eye movements
head posture
decision graph
sitting posture
text
signaturesVoice
typing
behavioral assessmentseye scans brainwaves
Design
Human System
COGINT
Ex: Sensory Operations Extraction
Comparing different and similar keystroke/mouse patterns
K-V
K-V
V-K
K-V
K-V
V-K
Mean typing rateCharacter frequencyAcceleration
K → V
Cogni-Patterns
Formed at the unconscious from external inputs and the sensory operators, these patterns establish
our behaviors, capabilities, intuitions, beliefs/values forming our personality or identity and decisions.
Explains / demonstrates how we think and communicate.
Cogni-pattern Cognitive Fingerprint
Baseline Cognitive Pattern
Metrics
Cogni-pattern :
• Provides baseline of thought process/patterns
• Identifies deviations of baseline cog-pattern
• Identifies behaviors associated with ‘a’ cognitive pattern
• Identifies programming from culture, peers, family, experiences…
• Identifies the types of personalities derived from the cognitive pattern
• Identifies flaws and success of decision strategies, and ….
• Deterministic• Biometrics• Digital logs• Voice
• Analog
• Character traits• Belief constructs• Self References• Inferences
Strategies
Metrics
Thought Process[V] → [ K → A → V ]
Fundamental Behaviors
Defined by the Cogni-pattern
Produces
Cognitive Fingerprint
Cognitive analytics can be used to:
• Identify applicants’ cognitive signature pattern [V] → [ K → A → V ]
from:
Clearances
questionnaires photoswritten material
or hand writing
• From the signature pattern, we can map the applicant’s stress pattern
and correlate this pattern to specific context. [K/V] → [ V → A → K ]
pre-written
assessments
cognitive
signature
pattern
Influencing User’s Cognitive Pattern
Formed from Multiple Thoughts
a single thought
CollectiveThreat
Machine Learning
of
cogni-patterns(mirror human thought
process)
Cognitive Analytics
from
Big Data Platforms
produce
cogni-patterns
Cognitive Security: AI
PCT of machine
Learning using & cogni-patterns
Smart Devices/SCADA/JCC2
Cognitive Security: System-Networks
admin
cognitive
signature
pattern
voice
Cognitive Indicators
that produce the:
heartbeatsexternal behavior
feedbk
feedfod