Trust framework on exploitation of humans as the weakest link in cybersecurity
Article published by the NASK–Państwowy Instytut Wydawniczy in the Journal of Applied Cybersecurity & Internet Governance Volume 2, Issue 1, Pages 1-26
Salvato in:
Autore principale: | |
---|---|
Natura: | Articolo |
Lingua: | inglese |
Pubblicazione: |
NASK–Państwowy Instytut Wydawniczy
2024
|
Soggetti: | |
Accesso online: | https://www.ceeol.com/search/article-detail?id=1219177 https://scholar.mzumbe.ac.tz/handle/123456789/720 |
Tags: |
Aggiungi Tag
Nessun Tag, puoi essere il primo ad aggiungerne!!
|
_version_ | 1820347767249174528 |
---|---|
author | Daudi, Morice |
author_facet | Daudi, Morice |
author_sort | Daudi, Morice |
collection | DSpace |
description | Article published by the NASK–Państwowy Instytut Wydawniczy in the Journal of Applied Cybersecurity & Internet Governance Volume 2, Issue 1, Pages 1-26 |
format | Article |
id | oai:41.59.85.69:123456789-720 |
institution | Mzumbe University |
language | English |
publishDate | 2024 |
publisher | NASK–Państwowy Instytut Wydawniczy |
record_format | dspace |
spelling | oai:41.59.85.69:123456789-7202024-04-26T06:11:58Z Trust framework on exploitation of humans as the weakest link in cybersecurity Daudi, Morice cybersecurity human layer weakest link trust trust framework human trust exploitation Article published by the NASK–Państwowy Instytut Wydawniczy in the Journal of Applied Cybersecurity & Internet Governance Volume 2, Issue 1, Pages 1-26 The significance of cybersecurity is increasing in our daily digital lives. The reason for this rise is that human interactions take place in computer-mediated environments, or cyberspace, where physical cues from face-to-face interactions are either absent or very minimal. Computer users are becoming increasingly susceptible to cyberattacks as a result of human interactions in cyberspace. Understanding how cybercriminals exploit the human trust, the weakest link in cybersecurity is relevant because cybercriminals focus on attacking the human psychology of trust rather than technical-based controls. To this end, the present paper develops a trust framework on exploitation of humans as the weakest link in cybersecurity. The framework is established by linking the human psychology of trust and techniques used by cybercriminals in deceiving and manipulating users of computer systems. The framework is validated by demonstrating its application using a case study employing real data. Findings show that cybercriminals exploit human trust based on trust development processes and bases of trust, either creating (falsified) expectations or a relationship history to lure the victim in. Furthermore, it is revealed that technical-based controls cannot provide effective safeguards to prevent manipulation of the human psychology of trust. Private 2024-04-26T06:11:55Z 2024-04-26T06:11:55Z 2023 Article APA https://www.ceeol.com/search/article-detail?id=1219177 https://scholar.mzumbe.ac.tz/handle/123456789/720 en application/pdf NASK–Państwowy Instytut Wydawniczy |
spellingShingle | cybersecurity human layer weakest link trust trust framework human trust exploitation Daudi, Morice Trust framework on exploitation of humans as the weakest link in cybersecurity |
title | Trust framework on exploitation of humans as the weakest link in cybersecurity |
title_full | Trust framework on exploitation of humans as the weakest link in cybersecurity |
title_fullStr | Trust framework on exploitation of humans as the weakest link in cybersecurity |
title_full_unstemmed | Trust framework on exploitation of humans as the weakest link in cybersecurity |
title_short | Trust framework on exploitation of humans as the weakest link in cybersecurity |
title_sort | trust framework on exploitation of humans as the weakest link in cybersecurity |
topic | cybersecurity human layer weakest link trust trust framework human trust exploitation |
url | https://www.ceeol.com/search/article-detail?id=1219177 https://scholar.mzumbe.ac.tz/handle/123456789/720 |
work_keys_str_mv | AT daudimorice trustframeworkonexploitationofhumansastheweakestlinkincybersecurity |