Infrastructure Cyber-Attack Awareness Training: Effective or Not?

被引:0
|
作者
White, Garry L. [1 ]
机构
[1] Texas State Univ, San Marcos, TX 78666 USA
关键词
Catastrophic Cyber Attack; Countermeasures; Cyber Self-Efficacy; Cyber-Warfare; Technology Optimism; Worry; CONFIRMATORY FACTOR-ANALYSIS; SELF-EFFICACY; SECURITY; WORRY; DISASTER; BEHAVIOR; IMPACT;
D O I
10.4018/IJISP.291702
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The purpose of this study is to provide insight as to how infrastructure countermeasures awareness training will impact individuals dealing with a nationwide catastrophic cyber-attack. Can this awareness training lessen the psychological effect of an attack? This study showed no value for this type of training. Reading about such an attack, the subjects had lower technical optimism and cyber self-efficacy. Reading about infrastructure countermeasures, before or after reading about a cyberattack, did not improve or maintain the subjects' optimism and self-efficacy. A possible explanation is that emotional arousal may override or block rational thinking. Another explanation may be that a nationwide attack is towards the infrastructure and not the personal computer. Here the individual lacks any control. Future research needs to look at personal preparation and response training to see if it will help the psychological effects of a catastrophic cyber-attack.
引用
收藏
页数:26
相关论文
共 50 条
  • [21] Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning
    Dutt, Varun
    Ahn, Young-Suk
    Gonzalez, Cleotilde
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV, 2011, 6818 : 280 - 292
  • [22] An Overview of Cyber-Attack Vectors on SCADA Systems
    Irmak, Erdal
    Erkek, Ismail
    2018 6TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2018, : 350 - 354
  • [23] Cyber-Attack Detection for Automotive Cyber-Physical Systems
    Lee, Suyun
    Jung, Sunjae
    Baek, Youngmi
    BUILDSYS'21: PROCEEDINGS OF THE 2021 ACM INTERNATIONAL CONFERENCE ON SYSTEMS FOR ENERGY-EFFICIENT BUILT ENVIRONMENTS, 2021, : 214 - 215
  • [24] Construction of Damage Path Diagram and Risk Assessment of Cyber-attack on Power Advanced Metering Infrastructure
    Liang H.
    Liu D.
    Zeng X.
    Zhai Y.
    Zhang Q.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2024, 48 (12): : 89 - 99
  • [25] Attack Analysis Framework for Cyber-Attack and Defense Test Platform
    Qi, Yulu
    Jiang, Rong
    Jia, Yan
    Li, Aiping
    ELECTRONICS, 2020, 9 (09) : 1 - 18
  • [26] Cyber-attack risk low for medical devices
    Tse, Zion Tsz Ho
    Xu, Sheng
    Fung, Isaac Chun-Hai
    Wood, Bradford J.
    SCIENCE, 2015, 347 (6228) : 1323 - 1324
  • [27] A Flow Attack Strategy based on Critical Links for Cyber-attack
    Qi, Jiming
    Zhang, Jiazheng
    Liu, Qingxia
    Wang, Bang
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 913 - 920
  • [28] Thwarting cyber-attack reconnaissance with inconsistency and deception
    Rowe, Neil C.
    Goh, Han C.
    2007 IEEE INFORMATION ASSURANCE WORKSHOP, 2007, : 151 - +
  • [29] Telecom links provide cyber-attack route
    Fulghum, DA
    AVIATION WEEK & SPACE TECHNOLOGY, 1999, 151 (19): : 81 - 83
  • [30] Counterplanning deceptions to foil cyber-attack plans
    Rowe, NC
    IEEE SYSTEMS, MAN AND CYBERNETICS SOCIETY INFORMATION ASSURANCE WORKSHOP, 2003, : 221 - 228