SlideShare a Scribd company logo
1 of 16
A TECHNICAL PAPER 
ON 
COGNITIVE HACKING 
FROM 
MOTHER TERESA INSTITUTE OF SCIENCE & TECHNOLOGY 
SATHUPALLY,KHAMMAM DIST 
B.SRUTHI M.SRINIVAS 
III CSE III CSE
CONTENTS 
 TYPES OF ATTACKS 
 DEFINITION OF COGNITIVE HACKING 
 WHEN DOES A COGNITIVE HACKING TAKES 
PLACE? 
 PREVENTION OF COGNITIVE HACKING 
 EXAMPLES 
 LEGAL ISSUES RELATED TO COGNITIVE 
HACKING 
 COGNITIVE HACKING COUNTERMEASURES 
 CONCLUSION
Types of attacks 
 We delineate between two classes of information systems 
attacks: autonomous attacks and cognitive attacks. 
Autonomous attacks operate totally within the fabric of 
the computing and networking infrastructures. For 
example, files containing private information such as 
credit card numbers can be downloaded and used by an 
attacker. Such an attack does not require any intervention 
by users of the attacked system, hence we call it an 
"autonomous" attack. By contrast, a cognitive attack 
requires some change in users' behavior, affected by 
manipulating their perception of reality.
What is Cognitive Hacking? 
 Cognitive hacking refers to a computer or information 
system attack that relies on changing human users' 
perceptions and corresponding behaviors in order to be 
successful. This is in contrast to denial of service (DOS) 
and other kinds of well-known attacks that operate solely 
within the computer and network infrastructure.
When does a cognitive hack takes 
place? 
 A cognitive hack takes place when a user’s behavior is 
influenced by misinformation. At that point the focus 
is on detecting that a cognitive hack has occurred and 
on possible legal action.
Prevention of Cognitive Hacking 
Our concern is with developing tools to prevent cognitive hacking, that is, 
tools that can recognize and respond to misinformation before a user acts 
based on the misinformation. 
Traditional 
computer 
security 
Preventing 
Cognitive Hacking Legal 
Remedies 
Time 
Misinformation 
Posted 
Cognitive Hack 
Misinformed 
User Decision
PAYPAL.COM
 PayPal.com 
“We regret to inform you that your username 
and password have been lost in our database. To help 
resolve this matter, we request that you supply your login 
information at the following website.” 
Many customers of PayPal received this kind of email and 
subsequently gave personal information about their PayPal 
account to the site linked by the message 
(http://paypalsecure.com not http://www.paypal.com). 
The alleged perpetrators apparently used their access to 
PayPal accounts in order to purchase items on eBay.
EMULEX 
 Mark S. Jakob, after having sold 3,000 shares of Emulex 
Corporation in a “short sale” at prices of $72 and $92, 
realized that, since the price rose to $100, he lost almost 
$100,000. 
 On August 25th 2000, when he realized the loss, he decided 
to do something against the company. The easiest and most 
effective action was to send a false press release to Internet 
Wire Inc. 
 He is subject to a maximum of 25 years in prison, a 
maximum fine of $220 million, two times investor losses, 
and an order of restitution up to $110 million to the victims 
of his action
LEGAL ISSUES RELATED TO 
COGNITIVE HACKING 
Cognitive hacking challenges security experts because 
it aims at the vulnerable human/computer interface, it 
challenges legal experts because it both targets and 
exploits information, the very lifeblood of free speech 
and democracy. 
Laws already exist that can fight disinformation 
without violating fundamental rights. But cognitive 
hacking introduces new characteristics requiring 
revised legal doctrines. Ultimately, confronting 
cognitive hacking will require integrating legal and 
technological anti-hacking tools.
•SINGLE SOURCE COGNITIVE HACKING 
By single source, we mean situations in which 
redundant, independent sources of information about the same 
topic are not available. 
•MULTIPLE SOURCE COGNITIVE HACKING 
Cognitive hacking when multiple, presumably 
redundant, sources of information are available about the same 
subject of interest.
COGNITIVE HACKING COUNTER 
MEASURES 
 SINGLE SOURCE COGNITIVE HACKING: 
.Authentication and trust ratings of source 
.Information "trajectory" modeling 
. ULAM games 
 MULTIPLE SOURCE COGNITIVE HACKING: 
.Byzantine generals models 
.Detection of collusion by information sources 
.linguistic analysis
Conclusion 
 Cognitive hacking represents a new kind of threat. It 
requires new kinds of tools to prevent it and a deep 
understanding of the problem to be able to identify 
how the law should be applied to these activities. 
Meeting the technical and legal challenges presented 
by cognitive hacking will require a multidisciplinary 
approach.
QUERIES?
THANK YOU

More Related Content

What's hot

Common hacking tactics
Common hacking tacticsCommon hacking tactics
Common hacking tactics
Fariha Khudzri
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
shaks9151
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethics
Xophia Montawal
 

What's hot (20)

Internet related frauds
Internet related fraudsInternet related frauds
Internet related frauds
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secure
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
Unit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hrUnit 3 Cyber Crimes and Torts 8 hr
Unit 3 Cyber Crimes and Torts 8 hr
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
Cyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12thCyber crime ppt for class 9th and 12th
Cyber crime ppt for class 9th and 12th
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cyber crime paper
Cyber crime paperCyber crime paper
Cyber crime paper
 
Cybercrime ppt
Cybercrime pptCybercrime ppt
Cybercrime ppt
 
Common hacking tactics
Common hacking tacticsCommon hacking tactics
Common hacking tactics
 
Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.Cyber crime:The Transformation Of Crime In The Information Age.
Cyber crime:The Transformation Of Crime In The Information Age.
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Internet cybercrime,ebanking and security
Internet cybercrime,ebanking and  securityInternet cybercrime,ebanking and  security
Internet cybercrime,ebanking and security
 
CyberSecurity.pptx
CyberSecurity.pptxCyberSecurity.pptx
CyberSecurity.pptx
 
cyber crime
cyber crime cyber crime
cyber crime
 
Conducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and FraudConducting Digital Forensics against Crime and Fraud
Conducting Digital Forensics against Crime and Fraud
 
10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt10.2.2015 e commerce fraud final slide show.ppt
10.2.2015 e commerce fraud final slide show.ppt
 
E commerce law and ethics
E commerce law and ethicsE commerce law and ethics
E commerce law and ethics
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Copyright patent& intellectual property
Copyright patent& intellectual propertyCopyright patent& intellectual property
Copyright patent& intellectual property
 

Similar to Cognitive hacking

Cyber crime
Cyber crimeCyber crime
Cyber crime
24sneha
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
Alisha Korpal
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
Raj Goel
 

Similar to Cognitive hacking (20)

223 - Computer ethics
223 - Computer ethics223 - Computer ethics
223 - Computer ethics
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Unit 1
Unit 1Unit 1
Unit 1
 
Top Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on CybersecurityTop Positive and Negative Impacts of AI & ML on Cybersecurity
Top Positive and Negative Impacts of AI & ML on Cybersecurity
 
Email phishing and countermeasures
Email phishing and countermeasuresEmail phishing and countermeasures
Email phishing and countermeasures
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Ethical Hacking Essay
Ethical Hacking EssayEthical Hacking Essay
Ethical Hacking Essay
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes2009 10 21 Rajgoel Trends In Financial Crimes
2009 10 21 Rajgoel Trends In Financial Crimes
 
The Immune System of Internet
The Immune System of InternetThe Immune System of Internet
The Immune System of Internet
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
BỘ LUYỆN NGHE TIẾNG ANH 8 GLOBAL SUCCESS CẢ NĂM (GỒM 12 UNITS, MỖI UNIT GỒM 3...
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
Trauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical PrinciplesTrauma-Informed Leadership - Five Practical Principles
Trauma-Informed Leadership - Five Practical Principles
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
demyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptxdemyelinated disorder: multiple sclerosis.pptx
demyelinated disorder: multiple sclerosis.pptx
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
PSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptxPSYPACT- Practicing Over State Lines May 2024.pptx
PSYPACT- Practicing Over State Lines May 2024.pptx
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"Mattingly "AI and Prompt Design: LLMs with NER"
Mattingly "AI and Prompt Design: LLMs with NER"
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 

Cognitive hacking

  • 1. A TECHNICAL PAPER ON COGNITIVE HACKING FROM MOTHER TERESA INSTITUTE OF SCIENCE & TECHNOLOGY SATHUPALLY,KHAMMAM DIST B.SRUTHI M.SRINIVAS III CSE III CSE
  • 2.
  • 3. CONTENTS  TYPES OF ATTACKS  DEFINITION OF COGNITIVE HACKING  WHEN DOES A COGNITIVE HACKING TAKES PLACE?  PREVENTION OF COGNITIVE HACKING  EXAMPLES  LEGAL ISSUES RELATED TO COGNITIVE HACKING  COGNITIVE HACKING COUNTERMEASURES  CONCLUSION
  • 4. Types of attacks  We delineate between two classes of information systems attacks: autonomous attacks and cognitive attacks. Autonomous attacks operate totally within the fabric of the computing and networking infrastructures. For example, files containing private information such as credit card numbers can be downloaded and used by an attacker. Such an attack does not require any intervention by users of the attacked system, hence we call it an "autonomous" attack. By contrast, a cognitive attack requires some change in users' behavior, affected by manipulating their perception of reality.
  • 5. What is Cognitive Hacking?  Cognitive hacking refers to a computer or information system attack that relies on changing human users' perceptions and corresponding behaviors in order to be successful. This is in contrast to denial of service (DOS) and other kinds of well-known attacks that operate solely within the computer and network infrastructure.
  • 6. When does a cognitive hack takes place?  A cognitive hack takes place when a user’s behavior is influenced by misinformation. At that point the focus is on detecting that a cognitive hack has occurred and on possible legal action.
  • 7. Prevention of Cognitive Hacking Our concern is with developing tools to prevent cognitive hacking, that is, tools that can recognize and respond to misinformation before a user acts based on the misinformation. Traditional computer security Preventing Cognitive Hacking Legal Remedies Time Misinformation Posted Cognitive Hack Misinformed User Decision
  • 9.  PayPal.com “We regret to inform you that your username and password have been lost in our database. To help resolve this matter, we request that you supply your login information at the following website.” Many customers of PayPal received this kind of email and subsequently gave personal information about their PayPal account to the site linked by the message (http://paypalsecure.com not http://www.paypal.com). The alleged perpetrators apparently used their access to PayPal accounts in order to purchase items on eBay.
  • 10. EMULEX  Mark S. Jakob, after having sold 3,000 shares of Emulex Corporation in a “short sale” at prices of $72 and $92, realized that, since the price rose to $100, he lost almost $100,000.  On August 25th 2000, when he realized the loss, he decided to do something against the company. The easiest and most effective action was to send a false press release to Internet Wire Inc.  He is subject to a maximum of 25 years in prison, a maximum fine of $220 million, two times investor losses, and an order of restitution up to $110 million to the victims of his action
  • 11. LEGAL ISSUES RELATED TO COGNITIVE HACKING Cognitive hacking challenges security experts because it aims at the vulnerable human/computer interface, it challenges legal experts because it both targets and exploits information, the very lifeblood of free speech and democracy. Laws already exist that can fight disinformation without violating fundamental rights. But cognitive hacking introduces new characteristics requiring revised legal doctrines. Ultimately, confronting cognitive hacking will require integrating legal and technological anti-hacking tools.
  • 12. •SINGLE SOURCE COGNITIVE HACKING By single source, we mean situations in which redundant, independent sources of information about the same topic are not available. •MULTIPLE SOURCE COGNITIVE HACKING Cognitive hacking when multiple, presumably redundant, sources of information are available about the same subject of interest.
  • 13. COGNITIVE HACKING COUNTER MEASURES  SINGLE SOURCE COGNITIVE HACKING: .Authentication and trust ratings of source .Information "trajectory" modeling . ULAM games  MULTIPLE SOURCE COGNITIVE HACKING: .Byzantine generals models .Detection of collusion by information sources .linguistic analysis
  • 14. Conclusion  Cognitive hacking represents a new kind of threat. It requires new kinds of tools to prevent it and a deep understanding of the problem to be able to identify how the law should be applied to these activities. Meeting the technical and legal challenges presented by cognitive hacking will require a multidisciplinary approach.