Skip to main content

Wake Up: You Are the Target!

  • Chapter
  • First Online:
Navigating New Cyber Risks
  • 967 Accesses

Abstract

This chapter goes beyond the usual understanding of cyberthreats and considers how humans perceive these threats. We start by listing 5 major misconceptions, which often cloud people’s ability to adequately assess cyber risks. We also present our Psycho-technological Matrix of Cybersecurity Threats and conclude that social engineering is a necessary part for the success of the majority of cybercriminal activities. We then argue that humans are prone to making mistakes when they engage in judgments about security and safety online. By presenting new experimental evidence, we show that people often behave recklessly with regard to their personal data. We also discuss measurement and context-dependency issues, which make accurate assessment of cybersecurity risks difficult in practice.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 29.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 37.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 37.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See https://nexusconsultancy.co.uk/blog/email-scam-ashamed-of-yourself/ and https://www.news.com.au/technology/scammers-catch-porn-users-with-8217ransomware8217/news-story/b328a238d3e5e7dca4219833749150fb for more detail.

  2. 2.

    See https://www.darkreading.com/endpoint/91--of-cyberattacks-start-with-a-phishing-email/d/d-id/1327704 for more detail.

  3. 3.

    See https://www.bbc.co.uk/news/uk-england-london-45440850 for more detail.

  4. 4.

    The same organization is alleged to be responsible for the “Novichok” poisonings in Salisbury, UK, in 2018.

  5. 5.

    See https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/702074/Cyber_Security_Breaches_Survey_2018_-_Main_Report.pdf for more detail.

  6. 6.

    See https://www.idc.com/topic/security for more information.

  7. 7.

    See https://www.whitehouse.gov/wp-content/uploads/2018/03/The-Cost-of-Malicious-Cyber-Activity-to-the-U.S.-Economy.pdf for more detail.

  8. 8.

    Of course, there are several methods in which zero vulnerabilities can be understood. In subsequent chapters, we discuss some of these methods, such as engaging ethical hackers, having broader conversations with the staff and the general public, etc.

References

  1. Frank Abagnale: “Catch me if you can” | Talks at Google. https://www.youtube.com/watch?v=vsMydMDi3rI.

  2. Indictment. United States of America v. Victor Netyksho, Boris Antonov, Dmitriy Badin, Ivan Yermakov, Aleksey Lukashev, Sergey Morgachev, Nikolay Kozachek, Pavel Yershov, Artem Mayshev, Aleksandr Osadcguk, Aleksey Potemkin, and Alatoliy Kovalev. https://int.nyt.com/data/documenthelper/80-netyksho-et-al-indictment/ba0521c1eef869deecbe/optimized/full.pdf?action=click&module=Intentional&pgtype=Article.

  3. Digital Catapult UK. (2015). Trust in personal data: The UK review (The Digital Catapult Report).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ganna Pogrebna .

Rights and permissions

Reprints and permissions

Copyright information

© 2019 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Pogrebna, G., Skilton, M. (2019). Wake Up: You Are the Target!. In: Navigating New Cyber Risks. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-13527-0_4

Download citation

Publish with us

Policies and ethics