Pakistan Science Abstracts
Article details & metrics
No Detail Found!!
A Framework for Human Error, Weaknesses, Threats & Mitigation Measures in an Airgapped Network
Author(s):
1. Rizwan Shaikh: Military College of Signals Rawalpindi, Pakistan
2. Sohaib Khan: Military College of Signals Rawalpindi, Pakistan
3. Imran Rashid: Military College of Signals Rawalpindi, Pakistan
4. Haidar Abbas: Military College of Signals Rawalpindi, Pakistan
5. Farrukh Naeem: Military College of Signals Rawalpindi, Pakistan
6. Muhammad Haroon Siddiqi: Military College of Signals Rawalpindi, Pakistan
Abstract:
Many organizations process and store classified data within their computer networks. Owing to the value of data that they hold; such organizations are more vulnerable to targets from adversaries. Accordingly, the sensitive organizations resort to an ‘air-gap’ approach on their networks, to ensure better protection. However, despite the physical and logical isolation, the attackers have successfully manifested their capabilities by compromising such networks; examples of Stuxnet and Agent.btz in view. Such attacks were possible due to the successful manipulation of human beings. It has been observed that to build up such attacks, persistent reconnaissance of the employees, and their data collection often forms the first step. With the rapid integration of social media into our daily lives, the prospects for dataseekers through that platform are higher. The inherent risks and vulnerabilities of social networking sites/apps have cultivated a rich environment for foreign adversaries to cherry-pick personal information and carry out successful profiling of employees assigned with sensitive appointments. With further targeted social engineering techniques against the identified employees and their families, attackers extract more and more relevant data to make an intelligent picture. Finally, all the information is fused to design their further sophisticated attacks against the airgapped facility for data pilferage. In this regard, the success of the adversaries in harvesting the personal information of the victims largely depends upon the common errors committed by legitimate users while on duty, in transit, and after their retreat. Such errors would keep on repeating unless these are aligned with their underlying human behaviors and weaknesses, and the requisite mitigation framework is worked out.
Page(s): 1-1
DOI: DOI not available
Published: Journal: IEEE International Conference on Digital Futures and Transformative Technologies (ICoDT2) May 24-26, 2022 (Book of Abstracts), Volume: 1, Issue: 1, Year: 2022
Keywords:
Keywords are not available for this article.
References:
References are not available for this document.
Citations
Citations are not available for this document.
0

Citations

0

Downloads

231

Views