Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Presentation1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 25

Psychology for Cybersecurity ,Digital Addiction and Hackers

Prepared by፡
Cyber shield

25/12/2023
Content
Introduction

Digital Addiction

The Psychology of Hackers

ha Hacker and DA psychological impact for Cybersecurity

Conclusion
Introduction
• As reliance on technology continues to grow, so need of effective
cybersecurity measures is critical. However, in order to truly understand the
threats we face, we must also examine the psychological factors that drive
both digital addiction and hacking behavior.

• In cybersecurity, attention to digital addiction is critical for addressing user


vulnerabilities. while studying the psychology of hackers is essential for
anticipating and countering evolving threats.
why is learning cyberpsychology important?
Issues related to digital addiction and Hacking Role of Cyberpsychology
Understanding Human Behavior Online:- Cyberpsychology explores how individuals behave, interact, and
designing online experiences, platforms, and communicate in the digital realm.
technologies that align with human psychology and
preferences.
Knowledge of cyberpsychology can aid in developing effective
Cybersecurity cybersecurity measures. By understanding the psychology behind
cyberattacks, social engineering tactics, and online fraud, individuals
and organizations can better protect themselves from digital threats.
Online Wellbeing: With the increasing amount of Cyberpsychology helps identify potential risks, such as cyberbullying
time people spend online, it's important to study and online addiction, and provides insights into mitigating these issues.
how digital interactions impact mental and
emotional health
Digital Marketing and Advertising Businesses can benefit from cyber psychological insights when creating
online marketing campaigns. Understanding consumer behavior,
decision-making processes, and the impact of online ads on users'
psychology can lead to more effective advertising strategies.
Cont..
Cyberpsychology sheds light on how individuals engage in social
Social Media and Online Communities media, form online communities, and build digital identities. This
knowledge can guide the development of safer and more
inclusive online spaces.
Ethical Considerations:- As technology advances, Cyberpsychology can inform discussions on ethical practices in the
ethical concerns related to AI, privacy, and digital digital world and help individuals and organizations make informed
surveillance become increasingly important. decisions.
Cyberpsychology research can aid in identifying the causes and
Cyberbullying Prevention consequences of cyberbullying. This knowledge is essential for
implementing effective prevention and intervention programs to protect
individuals, particularly children and adolescents, from online
harassment.
Human-Computer Interaction (HCI): In HCI, Cyber psychological insights can enhance the design of user-friendly
understanding how users interact with technology interfaces and systems that cater to users' cognitive and emotional needs.
is crucial.
Digital Education: As education becomes Cyberpsychology can inform educators and institutions on how to
increasingly digital, understanding how students optimize online learning experiences.
learn and engage with online educational platforms
is essential.
Digital Addiction
Digital addiction, also known as internet addiction, refers to a compulsive and excessive use of
technology that interferes with daily life, such as smartphones, computers, and social media
platforms.
It is considered a psychological issue because it involves a compulsive behavior pattern that
can interfere with an individual's daily life and cause negative consequences, such as social
isolation, anxiety, depression, and sleep disturbances.
It has become a growing concern in today's society, with an estimated
6% of the global population experiencing symptoms of digital addiction.
Several psychological factors contribute to digital addiction. One such
factor is social isolation, as individuals may turn to technology as a
means of connecting with others.
Digital addiction can have negative consequences on mental health, including
increased anxiety and depression. It can also lead to decreased productivity and poor
academic or work performance

Risks associated with excessive technology use (cyberbullying)


Comparison and Low Self-esteem

Depression

Social Isolation

Impact of digital addiction Negative Relationships

Fear of Missing Out (FOMO)

Sleep Deprivation

Addictive Behavior and Eating Disorders


The Psychology of Hackers
 A hacker is a person who can spot weakness of software and computer
systems.
 a hacker is someone who uses their technical skills and knowledge to gain
unauthorized access to computer systems or networks for various purposes,
such as stealing data, disrupting operations, or spreading malware.
 However, not all hackers have malicious intentions. Some hackers use their
skills for ethical purposes, such as identifying and fixing security
vulnerabilities in software and systems.
 With the rise of cyberattacks and the growing importance of cybersecurity
measures, understanding the mindset of hackers has become more crucial
than ever.
“An inside look into the behavior and
motivation of hackers (2019) “,Dr. Robert R. Perkoski, Assistant Professor

• He review different hackers Cases


https://www.telegraph.co.uk/technology/6670127/Top-10-most-

Famous Hacker Cases - famous-hackers.html

• Kevin Mitnick
• Hacked into large technology and telecom companies including Nokia,
Fujitsu, and Motorola.
• Served a five year sentence and released on parole.
• He referred to his hacking as social engineering.
Famous Hacker Cases
• Kevin Poulson
• Hacked into phones to make sure he would win contests.
• Had an alias named Dark Dante.
• Hacked into a federal investigation database.
• After release from prison he entered journalism.
Famous Hacker Cases
• Adrian Lamo
• Noted as homeless hacker because he used coffee shops, libraries
and internet cafes.
• Broke into internet sites and showed vulnerabilities to companies.
• Broke into New York Times – used the LexisNexis account to view
information on high profile people.
Famous Hacker Cases

• Stephen Wozniak
• While at college he created “blue boxes – devices for bypassing the
phone system.
• After dropping out of college he co-founded Apple.
Famous Hacker Cases
• Loyd Blankenship
• Member of elite hacking groups like the Legend of Doom.
• Author of the Hacker Manifesto – cornerstone of hacker philosophy.
• Views the activities of a hacker motivated by curiosity.
• Currently a writer.
famous hacker cases
- short summary

• Hack into
• Companies
• Phones
• Federal databases
• What they achieved
• Win contests
• View info of other people

In the following slides, we will use these key words to help you understand concepts
Integrated theory to explain hacker behavior
• Xu et al. [1] proposed a model that integrates Social Learning Theory,
Routine Activity Theory and Situational Activity Theory to explain hacker
behavior.
• Social Learning Theory
• Popularized by Albert Bandura supports the idea that people learn from each other
and often times model or imitate others.
• Routine Activity Theory
• Supports the idea that if an individual is motivated and lacks a guardian they will
likely engage in criminal activity.
• Situational Activity Theory
• Posits the idea that an individual has a moral lexicon and interacts with their specific
environmental circumstances.
[1] Xu, Z., Hu, Q., & Zhang, C. (2013). Why computer talents become computer hackers.
Communications of the ACM, 58(4), 64-74.
XU et al Integrated theory to explain hacker
behavior
Social Learning Theory

Routine Activity Theory

Situational Activity Theory


Five Major Values that some Hackers possess
• The following five values were ascertained from a European study:
• Creativity & Innovation
• Interest
• Individual Autonomy & Liberty
• Community Development
• Social Development
• This study focuses on hacktivists (hackers who further social or
political ends and makers (hackers developing novel uses for
technology).
01
Technical Expertise: Hackers typically
possess advanced technical skills, curiosity,
and a deep understanding of systems,
networks, and software

Risk-Taking Behavior: Many hackers Personality


exhibit a willingness to take risks, push

boundaries, and challenge established


02 of hackers :

norms, often driven by a desire for

adventure or accomplishment

detection

03 Autonomy and Independence: The hacker culture


often values independence, autonomy, and freedom,
leading individuals to pursue hacking as a way to
assert their independence from traditional structures
There are various motivations behind why hackers do what they do.

01 Financial Gain and Beyond:- aiming 02 Understanding the Complex


to profit from their activities through World of Hackers
theft, fraud, or extortion

The Complex Web Behind Hacker Behavior.


• Lack of Empathy 04 Recognition / Achievement
03 • Sense of Power and Control Some hackers seek recognition and prestige within the hacker
• Addiction to Challenge, community by demonstrating their skills through sophisticated
• Escapism and Anonymity attacks or by finding vulnerabilities in high-profile systems
• Peer Validation

05 Revenge:- Unfortunately, some


06
Political Agendas . Activism and Ideology
hackers engage in malicious activities for Hackers may be motivated by political, social, or
the thrill of causing disruption, damage, or ideological causes.

chaos

07 Insider Threats
08 Social Justice / Positive Change
Some common psychological tactics used by hackers include:

Social Engineering
• Phishing
• Pretexting: Creating a fabricated scenario or pretext to manipulate someone into providing information or
taking actions that compromise security.
• Baiting: Offering something enticing (such as free software, downloads, or rewards) to lure individuals into
clicking on malicious links or downloading malware-infected files.
.

• Fear, Urgency, and Authority


• Deception through Persuasion Techniques

• Manipulating Curiosity and Trust


• Psychological Manipulation in Tech Support Scams
Psychology and cybersecurity intersect in various ways

Cybersecurity
Culture and
Organizational
User Behavior Psychological Behavior Ethical
Social and Awareness Implications and
Profiling of
Engineering and Digital Ethics
Attackers
Manipulation
03
Ways to address the motivations of 04
hackers through security measures Vulnerability to security
01 and law enforcement efforts breaches due to digital
addiction
digital addiction can
lead to security 06
breaches. E.g. clicking
on for CS developing
• phishing emails User Behavior
• sharing sensitive and Awareness
information programs
online)

05
Psychological Profiling of
02 Attackers
Strategies for preventing and
treating digital addiction (e.g.
mindfulness practices, setting
boundaries)
Conclusion
Hackers
Cyber psychology
Psychology

The use of social media and other


Psychology plays a significant role in digital platforms has been linked
cybersecurity, as understanding human to increased rates of anxiety, Hacking is not
behavior, motivations, and cognitive depression, and other mental
biases is crucial in creating effective
perceived as only a
health issues.
security measures technical activity.
10Q

You might also like