Trust framework on exploitation of humans as the weakest link in cybersecurity

dc.contributor.authorDaudi, Morice
dc.date.accessioned2024-04-26T06:11:55Z
dc.date.available2024-04-26T06:11:55Z
dc.date.issued2023
dc.descriptionArticle published by the NASK–Państwowy Instytut Wydawniczy in the Journal of Applied Cybersecurity & Internet Governance Volume 2, Issue 1, Pages 1-26
dc.description.abstractThe significance of cybersecurity is increasing in our daily digital lives. The reason for this rise is that human interactions take place in computer-mediated environments, or cyberspace, where physical cues from face-to-face interactions are either absent or very minimal. Computer users are becoming increasingly susceptible to cyberattacks as a result of human interactions in cyberspace. Understanding how cybercriminals exploit the human trust, the weakest link in cybersecurity is relevant because cybercriminals focus on attacking the human psychology of trust rather than technical-based controls. To this end, the present paper develops a trust framework on exploitation of humans as the weakest link in cybersecurity. The framework is established by linking the human psychology of trust and techniques used by cybercriminals in deceiving and manipulating users of computer systems. The framework is validated by demonstrating its application using a case study employing real data. Findings show that cybercriminals exploit human trust based on trust development processes and bases of trust, either creating (falsified) expectations or a relationship history to lure the victim in. Furthermore, it is revealed that technical-based controls cannot provide effective safeguards to prevent manipulation of the human psychology of trust.
dc.description.sponsorshipPrivate
dc.identifier.citationAPA
dc.identifier.urihttps://www.ceeol.com/search/article-detail?id=1219177
dc.identifier.urihttps://scholar.mzumbe.ac.tz/handle/123456789/720
dc.language.isoen
dc.publisherNASK–Państwowy Instytut Wydawniczy
dc.subjectcybersecurity
dc.subjecthuman layer
dc.subjectweakest link
dc.subjecttrust
dc.subjecttrust framework
dc.subjecthuman trust exploitation
dc.titleTrust framework on exploitation of humans as the weakest link in cybersecurity
dc.typeArticle
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Daudi, M-(2023).pdf
Size:
6.43 KB
Format:
Adobe Portable Document Format
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: