By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Enhance cybersecurity with human-centric approach, beware of bias
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Enhance cybersecurity with human-centric approach, beware of bias
EnterpriseSoftware

Enhance cybersecurity with human-centric approach, beware of bias

Grace Chng
Last updated: August 13, 2020 at 10:37 PM
Grace Chng
Published: August 6, 2019
6 Min Read
SHARE
PHOTO: Gordon Johnson from Pixabay

A data breach at financial company Capital One last week exposed the personal information of about 106 million of its customers and applicants. It is another victim on a long and fast growing list of cyberattacks.

Cyber attackers are relentless in breaching the defences despite the billions of dollars spent on protecting organisations’ networks and crown jewels. The truth is that organisations are finding it tough to detect when large amounts of information leave their networks.

Security perimeters have expanded and attack surfaces have become amorphous with the emergence of cloud services, mobile devices and expanding inter-connectivity. Traditional security measures that block all instances that look like data theft do not cut it any more.  

A new approach is needed to understand the context behind a user’s actions. For example, an organisation may restrict the use of USB flash drives but some staff may routinely rely on portable storage devices to do their jobs.

Users will look for a workaround solution to this problem, leading to more headaches for security administrators. This situation makes it difficult to tell the difference between real threats and staff simply trying to work.

Hence understanding the context behind a user’s actions is becoming an important layer of security provision. This concept lies at the intersection of people and data, said Alvin Rodrigues, Forcepoint’s senior director and security strategist for Asia-Pacific and Japan.

Describing this as a human-centric approach to better manage risk, he said it focuses on how, when and why people use and access information, placing users’ actions into a larger context based on their normal activities.

A way to do this is via risk scores which establish baselines for normal and anomalous behaviour, said Rodrigues, in an interview with Techgoondu last week.

Depending on access level, different people have different risk scores which can be automatically tracked. In an event, like the downloading of data to a USB drive from the server, the security system automatically notes the risk score and the proportionate response kicks in.

This ranges from making the downloaded data read-only on an office computer to triggering encryption, based on the preset variables.

One issue to note in human-centric approach, however, is the concept of cognitive bias. David Coffey, Forcepoint senior vice-president of engineering, explained: “People’s decisions, behaviours, and experiences are influenced by the experiences of the past and the present.”

“This top-of-mind recall is a common human decision-making tool which can lead to faulty conclusions, resulting in even greater threat to enterprise data security,” he added.

There are different types of cognitive biases that can colour decision making, said Coffey, who was recently in Singapore.

The biases can colour security practitioners’ understanding of the cyber landscape, their perception of risks, and even the perceptions about each other, he added.

Aggregate bias or stereotyping is one cognitive bias. Older users, for example, may be unfairly considered to be riskier because they are not tech savvy.

However, Rodrigues said various studies have shown that young users, including digital natives, tend to share passwords.

“In aggregate bias, a security practitioner can focus on the wrong behaviour as they look for answers to support their assumptions. The danger is that this bias delays identification of the true source of security issues,” he pointed out.

Another is anchor bias, which refers to a permanent first impression or a latching on to a specific set of features, like numbers, early in the decision making process. A security analyst may be drawn to a specific feature, thus missing or discounting other influential information related to the threat.

Availability bias refers to memory. The more frequently a person encounters specific types of information, the faster the recall and the more readily accessible the information is in their memory.

So if a CEO or security practitioner comes across frequent news articles on ransomware, he can be influenced by what’s risky and impact his approach towards security.

Yet another bias is fundamental attribution error where the blame is always placed on someone else. Or that the mistake is due to other people’s failure or mistake. So, a person who trips is seen as clumsy, even though there may be other causes in the wider context.

Rodrigues said biases impact resource allocation and delay threat analysis, which endanger enterprise security. “No one is immune to these biases, but we must be aware of them, admit they play a part in our thinking process. With this awareness, we can make better informed decisions.”

Overcoming these biases requires creative thinking and studying the data closely to more accurately represent the state of the threat, he added.

MyRepublic firms up plans to become Singapore’s fourth telco
Asus Eee Pad tablets to get Android 3.2 update “over the air”
Parallels Desktop 13 brings Windows apps to Mac Touch Bar
Nearly 60 per cent of organisations in APAC still running Windows Server 2003
DDoS threats worsen with more powerful attacks
TAGGED:Capital Onecognitive biascybersecurityForcepointhuman-centric

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByGrace Chng
Follow:
A seasoned writer, author and industry observer, Grace was the key tech writer for The Straits Times for more than three decades. She co-founded and edited Computer Times, later renamed Digital Life. She helmed this publication, the de facto national IT magazine, for nearly 19 years. Grace is also the editor and co-curator of Intelligent Island: The Untold Story of Singapore’s Tech Journey, a book highlighting Singapore’s ICT development.
Previous Article StarHub’s new 2Gbps fibre broadband plan comes with free Asus router
Next Article Hands on: Samsung Galaxy Note 10, Note 10+ get slimmed down, drop headphone jack
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Scammers are so successful they even accidentally scam themselves now
Cybersecurity Internet
June 10, 2025
Doom: The Dark Ages review: Future fantastic demon slaying
Gaming
June 10, 2025
Plaud NotePin review: Note-taking made easy with AI
Internet Mobile
June 9, 2025
Can smart grocery carts, biometric payments boost retailers like FairPrice?
Enterprise Internet
June 6, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Join Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?