140 likes | 244 Views
A Call for the Consideration of Individual Difference in Cyber Security. John E. Buckner Tilman L. Sheets. Louisiana Tech University. Security Breach. Unintentional Naïve Employees Intentional Hackers “Insiders”. Unintentional Breach. Training. Unintentional Breach.
E N D
A Call for the Consideration of Individual Difference in Cyber Security John E. Buckner Tilman L. Sheets Louisiana Tech University
Security Breach • Unintentional • Naïve Employees • Intentional • Hackers • “Insiders”
Unintentional Breach Training
Unintentional Breach • Cyber Security Training • Educational Programs for Cyber Security • Explosion of popularity and offerings (Newman, 2007) • Increased demand • Training to increase Security • Providing information to employees • Increasing awareness
Unintentional Breach Training Selection
Selection • Personality traits and Individual Differences • Job “Fit” • Creating teams to maximize performance • Cognitive Abilities • Determining key dimensions that predict job success
Unintentional Breach Intentional Breach Training Prevention/Detection Selection
Intentional Breach • Prevention and Detection • Building hardware and software systems • Beyond the scope of our presentation • Training to increase Security • Providing information to “honest “employees • Increasing vigilance for identification of potential threats (activities & behaviors)
Unintentional Breach Intentional Breach Training Prevention/Detection Selection
Selection • Individual Differences • Profiling • Motives • Professionalism and Ethicality (honesty/integrity) (Doty & O’Connor, 2010) • Hacker Personality • white-hat vs black-hat hackers • “Insiders” • Privileged information • Motivation
Selection Extraversion Emotional Stability Agreeableness Conscientiousness Openness • Personality Framework: • The BIG 5 • Extraversion, Emotional Stability, Openness, Conscientiousness, Agreeableness
Selection • Personality Framework: • The BIG 5 • Extraversion, Emotional Stability, Openness, Conscientiousness, Agreeableness • The BIG 5 + 1 • Integrity: Honesty/Humility • Correlated with the ‘‘Dark Triad’’ traits of Machiavellianism, Narcissism,and Primary Psychopathy (Lee & Ashton, 2005). • Intrinsic/Extrinsic Motivation • Largely absent in Cyber Security
Summary • Individual Differences • Predicting “at-risk” employees • Naïve Employees • “Insiders” • Identify those most capable of performing in the field • Individual personality tied to performance • Selecting team members based on personality • Profiling personality of malicious hackers • Identify potential threat