Presentation is loading. Please wait.

Presentation is loading. Please wait.

John E. BucknerTilman L. Sheets Louisiana Tech University.

Similar presentations


Presentation on theme: "John E. BucknerTilman L. Sheets Louisiana Tech University."— Presentation transcript:

1 John E. BucknerTilman L. Sheets Louisiana Tech University

2  Unintentional Naïve Employees  Intentional Hackers “Insiders”  Unintentional Naïve Employees  Intentional Hackers “Insiders”

3

4  Cyber Security Training Educational Programs for Cyber Security  Explosion of popularity and offerings (Newman, 2007)  Increased demand Training to increase Security  Providing information to employees  Increasing awareness  Cyber Security Training Educational Programs for Cyber Security  Explosion of popularity and offerings (Newman, 2007)  Increased demand Training to increase Security  Providing information to employees  Increasing awareness

5

6  Personality traits and Individual Differences Job “Fit” Creating teams to maximize performance  Cognitive Abilities Determining key dimensions that predict job success  Personality traits and Individual Differences Job “Fit” Creating teams to maximize performance  Cognitive Abilities Determining key dimensions that predict job success

7

8  Prevention and Detection Building hardware and software systems  Beyond the scope of our presentation Training to increase Security  Providing information to “honest “employees  Increasing vigilance for identification of potential threats (activities & behaviors)  Prevention and Detection Building hardware and software systems  Beyond the scope of our presentation Training to increase Security  Providing information to “honest “employees  Increasing vigilance for identification of potential threats (activities & behaviors)

9

10  Individual Differences Profiling  Motives  Professionalism and Ethicality (honesty/integrity) (Doty & O’Connor, 2010) Hacker Personality  white-hat vs black-hat hackers “Insiders”  Privileged information  Motivation  Individual Differences Profiling  Motives  Professionalism and Ethicality (honesty/integrity) (Doty & O’Connor, 2010) Hacker Personality  white-hat vs black-hat hackers “Insiders”  Privileged information  Motivation

11  Personality Framework: The BIG 5  Extraversion, Emotional Stability, Openness, Conscientiousness, Agreeableness  Personality Framework: The BIG 5  Extraversion, Emotional Stability, Openness, Conscientiousness, Agreeableness

12  Personality Framework: The BIG 5  Extraversion, Emotional Stability, Openness, Conscientiousness, Agreeableness The BIG  Integrity: Honesty/Humility  Correlated with the ‘‘Dark Triad’’ traits of Machiavellianism, Narcissism,and Primary Psychopathy (Lee & Ashton, 2005). Intrinsic/Extrinsic Motivation  Largely absent in Cyber Security  Personality Framework: The BIG 5  Extraversion, Emotional Stability, Openness, Conscientiousness, Agreeableness The BIG  Integrity: Honesty/Humility  Correlated with the ‘‘Dark Triad’’ traits of Machiavellianism, Narcissism,and Primary Psychopathy (Lee & Ashton, 2005). Intrinsic/Extrinsic Motivation  Largely absent in Cyber Security

13  Individual Differences Predicting “at-risk” employees  Naïve Employees  “Insiders” Identify those most capable of performing in the field  Individual personality tied to performance  Selecting team members based on personality Profiling personality of malicious hackers  Identify potential threat  Individual Differences Predicting “at-risk” employees  Naïve Employees  “Insiders” Identify those most capable of performing in the field  Individual personality tied to performance  Selecting team members based on personality Profiling personality of malicious hackers  Identify potential threat

14


Download ppt "John E. BucknerTilman L. Sheets Louisiana Tech University."

Similar presentations


Ads by Google