{"title":"Assessing the effect size of users’ consciousness for computer networks vulnerability","authors":"László Bognár, A. Joós, B. Nagy","doi":"10.2478/ausm-2020-0002","DOIUrl":null,"url":null,"abstract":"Abstract In this paper the conditions and the findings of a simulation study is presented for assessing the effect size of users’ consciousness to the computer network vulnerability in risky cyber attack situations at a certain business. First a simple model is set up to classify the groups of users according to their skills and awareness then probabilities are assigned to each class describing the likelihood of committing dangerous reactions in case of a cyber attack. To quantify the level of network vulnerability a metric developed in a former work is used. This metric shows the approximate probability of an infection at a given business with well specified parameters according to its location, the type of the attack, the protections used at the business etc. The findings mirror back the expected tendencies namely if the number of conscious user is on the","PeriodicalId":0,"journal":{"name":"","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2478/ausm-2020-0002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
Abstract In this paper the conditions and the findings of a simulation study is presented for assessing the effect size of users’ consciousness to the computer network vulnerability in risky cyber attack situations at a certain business. First a simple model is set up to classify the groups of users according to their skills and awareness then probabilities are assigned to each class describing the likelihood of committing dangerous reactions in case of a cyber attack. To quantify the level of network vulnerability a metric developed in a former work is used. This metric shows the approximate probability of an infection at a given business with well specified parameters according to its location, the type of the attack, the protections used at the business etc. The findings mirror back the expected tendencies namely if the number of conscious user is on the