A Framework for Human Error, Weaknesses, Threats & Mitigation Measures in an Airgapped Network

Rizwan Ahmed Shaikh, Muhammad Sohaib Khan, Imran Rashid, H. Abbas, Farrukh I. Naeem, Muhammad Haroon Siddiqi
{"title":"A Framework for Human Error, Weaknesses, Threats & Mitigation Measures in an Airgapped Network","authors":"Rizwan Ahmed Shaikh, Muhammad Sohaib Khan, Imran Rashid, H. Abbas, Farrukh I. Naeem, Muhammad Haroon Siddiqi","doi":"10.1109/ICoDT255437.2022.9787441","DOIUrl":null,"url":null,"abstract":"Many organizations process and store classified data within their computer networks. Owing to the value of data that they hold; such organizations are more vulnerable to targets from adversaries. Accordingly, the sensitive organizations resort to an ‘air-gap’ approach on their networks, to ensure better protection. However, despite the physical and logical isolation, the attackers have successfully manifested their capabilities by compromising such networks; examples of Stuxnet and Agent.btz in view. Such attacks were possible due to the successful manipulation of human beings. It has been observed that to build up such attacks, persistent reconnaissance of the employees, and their data collection often forms the first step. With the rapid integration of social media into our daily lives, the prospects for data-seekers through that platform are higher. The inherent risks and vulnerabilities of social networking sites/apps have cultivated a rich environment for foreign adversaries to cherry-pick personal information and carry out successful profiling of employees assigned with sensitive appointments. With further targeted social engineering techniques against the identified employees and their families, attackers extract more and more relevant data to make an intelligent picture. Finally, all the information is fused to design their further sophisticated attacks against the air-gapped facility for data pilferage. In this regard, the success of the adversaries in harvesting the personal information of the victims largely depends upon the common errors committed by legitimate users while on duty, in transit, and after their retreat. Such errors would keep on repeating unless these are aligned with their underlying human behaviors and weaknesses, and the requisite mitigation framework is worked out.","PeriodicalId":291030,"journal":{"name":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 2nd International Conference on Digital Futures and Transformative Technologies (ICoDT2)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICoDT255437.2022.9787441","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Many organizations process and store classified data within their computer networks. Owing to the value of data that they hold; such organizations are more vulnerable to targets from adversaries. Accordingly, the sensitive organizations resort to an ‘air-gap’ approach on their networks, to ensure better protection. However, despite the physical and logical isolation, the attackers have successfully manifested their capabilities by compromising such networks; examples of Stuxnet and Agent.btz in view. Such attacks were possible due to the successful manipulation of human beings. It has been observed that to build up such attacks, persistent reconnaissance of the employees, and their data collection often forms the first step. With the rapid integration of social media into our daily lives, the prospects for data-seekers through that platform are higher. The inherent risks and vulnerabilities of social networking sites/apps have cultivated a rich environment for foreign adversaries to cherry-pick personal information and carry out successful profiling of employees assigned with sensitive appointments. With further targeted social engineering techniques against the identified employees and their families, attackers extract more and more relevant data to make an intelligent picture. Finally, all the information is fused to design their further sophisticated attacks against the air-gapped facility for data pilferage. In this regard, the success of the adversaries in harvesting the personal information of the victims largely depends upon the common errors committed by legitimate users while on duty, in transit, and after their retreat. Such errors would keep on repeating unless these are aligned with their underlying human behaviors and weaknesses, and the requisite mitigation framework is worked out.
气隙网络中人为错误、弱点、威胁和缓解措施的框架
许多组织在其计算机网络中处理和存储机密数据。由于它们所持有的数据的价值;这样的组织更容易受到来自对手的攻击。因此,敏感组织在其网络上采取“气隙”方法,以确保更好的保护。然而,尽管物理和逻辑隔离,攻击者已经成功地通过破坏这些网络来展示他们的能力;Stuxnet和Agent的例子。看到BTZ了。这种攻击之所以成为可能,是因为成功地操纵了人类。据观察,要建立这样的攻击,对员工的持续侦察和他们的数据收集通常是第一步。随着社交媒体迅速融入我们的日常生活,通过这个平台寻找数据的人的前景更高。社交网站/应用程序固有的风险和漏洞为外国对手提供了一个丰富的环境,可以挑选个人信息,并成功地对分配敏感约会的员工进行分析。随着针对已识别员工及其家人的针对性社会工程技术的进一步发展,攻击者将提取越来越多的相关数据,以构建智能图景。最后,所有的信息被融合在一起,以设计他们对气隙设施进行更复杂的攻击,以窃取数据。在这方面,攻击者能否成功获取受害者的个人信息,在很大程度上取决于合法用户在值日、过境和撤退后所犯的常见错误。除非这些错误与其潜在的人类行为和弱点相一致,并制定出必要的缓解框架,否则这些错误将不断重复。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信