University : Teesside University UniLearnO is not sponsored or endorsed by this college or university.
Country : United Kingdom
Assignment Task

 

Introduction
There are multiple approaches to analysing cybersecurity breaches. One approach is the social engineering attack framework, devised by Mouton et al in their paper from 2014, which extends upon Kevin Mitnick’s original SE attack cycle and combines it with the ontological model they established previously. This framework commences analysis from the point of view of the attack, focusing on the ‘process flow’ of the event occurring, by breaking down the steps of executing the attack into separate phases the operator moved through to complete the goal (Mouton, et al., 2014). Another approach previously established is a novel taxonomy to classify attacks into different categories dependant on the scenario and characteristics of the attack (Krombholz, et al., 2015).

However, a more recent paper summarises and criticizes both these approaches for neglecting the elements of human weakness which are exploited to make social engineering attacks possible (Fan, et al., 2017). The authors instead propose an ‘I-E based model of human weakness for attack and defence investigations’, this approach to analysing SE attacks lays human weakness as the foundation. It creates a list of fourteen internal human psychological characteristics divided into positive and negative, using terminology from the Catholic catechism. It then defines nine external circumstance influencers which can trigger the psychological traits allowing an operator/attacker to exploit them by choosing a specific attack vector/type, it’s important to note ‘external circumstance influencers could objectively exist around the dupe or be subjectively constructed by the social engineer’.

In the next section the I-E based model will be tested in analysing the Watson’s Widgets cybersecurity data breach and attack, which will be broken down as two separate (maybe related) incidents. The persons involved and surrounding the event during its occurrence will be described using the internal psychological characteristics and the external circumstance influencers which impacted them and allowed the operator to exploit through certain attack vectors. In choosing this approach, the expectations are that it will allow for a multi-dimensional analysis of the events resulting in a more complete understanding of how and why the attack occurred – thus evaluating its effectiveness and facilitating the formulation of appropriate interventions to prevent future attacks.

 

This IT Assignment has been solved by our IT experts at UniLearnO. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

  • Uploaded By : Brett
  • Posted on : December 27th, 2019
  • Downloads : 445

Whatsapp Tap to ChatGet instant assistance