Trust framework on exploitation of humans as the weakest link in cybersecurity

Article published by the NASK–Państwowy Instytut Wydawniczy in the Journal of Applied Cybersecurity & Internet Governance Volume 2, Issue 1, Pages 1-26

Salvato in:
Dettagli Bibliografici
Autore principale: Daudi, Morice
Natura: Articolo
Lingua:inglese
Pubblicazione: NASK–Państwowy Instytut Wydawniczy 2024
Soggetti:
Accesso online:https://www.ceeol.com/search/article-detail?id=1219177
https://scholar.mzumbe.ac.tz/handle/123456789/720
Tags: Aggiungi Tag
Nessun Tag, puoi essere il primo ad aggiungerne!!
_version_ 1820347767249174528
author Daudi, Morice
author_facet Daudi, Morice
author_sort Daudi, Morice
collection DSpace
description Article published by the NASK–Państwowy Instytut Wydawniczy in the Journal of Applied Cybersecurity & Internet Governance Volume 2, Issue 1, Pages 1-26
format Article
id oai:41.59.85.69:123456789-720
institution Mzumbe University
language English
publishDate 2024
publisher NASK–Państwowy Instytut Wydawniczy
record_format dspace
spelling oai:41.59.85.69:123456789-7202024-04-26T06:11:58Z Trust framework on exploitation of humans as the weakest link in cybersecurity Daudi, Morice cybersecurity human layer weakest link trust trust framework human trust exploitation Article published by the NASK–Państwowy Instytut Wydawniczy in the Journal of Applied Cybersecurity & Internet Governance Volume 2, Issue 1, Pages 1-26 The significance of cybersecurity is increasing in our daily digital lives. The reason for this rise is that human interactions take place in computer-mediated environments, or cyberspace, where physical cues from face-to-face interactions are either absent or very minimal. Computer users are becoming increasingly susceptible to cyberattacks as a result of human interactions in cyberspace. Understanding how cybercriminals exploit the human trust, the weakest link in cybersecurity is relevant because cybercriminals focus on attacking the human psychology of trust rather than technical-based controls. To this end, the present paper develops a trust framework on exploitation of humans as the weakest link in cybersecurity. The framework is established by linking the human psychology of trust and techniques used by cybercriminals in deceiving and manipulating users of computer systems. The framework is validated by demonstrating its application using a case study employing real data. Findings show that cybercriminals exploit human trust based on trust development processes and bases of trust, either creating (falsified) expectations or a relationship history to lure the victim in. Furthermore, it is revealed that technical-based controls cannot provide effective safeguards to prevent manipulation of the human psychology of trust. Private 2024-04-26T06:11:55Z 2024-04-26T06:11:55Z 2023 Article APA https://www.ceeol.com/search/article-detail?id=1219177 https://scholar.mzumbe.ac.tz/handle/123456789/720 en application/pdf NASK–Państwowy Instytut Wydawniczy
spellingShingle cybersecurity
human layer
weakest link
trust
trust framework
human trust exploitation
Daudi, Morice
Trust framework on exploitation of humans as the weakest link in cybersecurity
title Trust framework on exploitation of humans as the weakest link in cybersecurity
title_full Trust framework on exploitation of humans as the weakest link in cybersecurity
title_fullStr Trust framework on exploitation of humans as the weakest link in cybersecurity
title_full_unstemmed Trust framework on exploitation of humans as the weakest link in cybersecurity
title_short Trust framework on exploitation of humans as the weakest link in cybersecurity
title_sort trust framework on exploitation of humans as the weakest link in cybersecurity
topic cybersecurity
human layer
weakest link
trust
trust framework
human trust exploitation
url https://www.ceeol.com/search/article-detail?id=1219177
https://scholar.mzumbe.ac.tz/handle/123456789/720
work_keys_str_mv AT daudimorice trustframeworkonexploitationofhumansastheweakestlinkincybersecurity