Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Individual cognitive security awareness assessment method based on questionnaire survey

A consciousness and questionnaire technology, applied in the field of individual cognitive security awareness assessment based on questionnaire survey, can solve the problems of low cost of social engineering attack, small attack risk, limited effect of defense methods, etc., and achieve intuitive physical meaning, strong robustness and reasonableness sexual effect

Pending Publication Date: 2021-12-24
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the cost of social engineering attacks is low, the attack risk is small, the attack methods and models are updated quickly, and targeted attacks such as spear attacks continue to develop, and the effect of technology-based defense methods is limited. Individual network security awareness has become the key to defending against social engineering attacks based on the subject

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Individual cognitive security awareness assessment method based on questionnaire survey
  • Individual cognitive security awareness assessment method based on questionnaire survey
  • Individual cognitive security awareness assessment method based on questionnaire survey

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0120] First of all, the designed questionnaire refers to the HAIS-Q (Human Aspects of Information Security Questionnaire) model, and sets the questions covering basic knowledge, computer knowledge, behavior preference, network security awareness, cognitive psychology, cognitive style and cognitive response. ; and use the pre-test results to analyze the reliability of the questionnaire to judge the rationality and correctness of the questionnaire;

[0121] Then, analyze the cognitive attributes of the content related to network security and social engineering covered by the questionnaire, and determine the hierarchical relationship of cognitive attributes and the ideal mastery mode;

[0122] Further, the questionnaire data filled in by the subjects is preprocessed, and the outliers and blank values ​​in the data are eliminated; the cognitive level and structure of the subjects are analyzed by using the cognitive diagnostic model;

[0123] Classify desirable mastery patterns by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an individual cognitive security awareness assessment method based on questionnaire surveys, and belongs to the field of network space security. The method specifically comprises the following steps: firstly, constructing an answer questionnaire, and adjusting rationality of the questionnaire through internal and external reliability; then selecting a plurality of users to extract cognitive attributes, building a cognitive attribute association graph according to hierarchical relationships, and selecting sub-graphs as ideal mastering modes; filling in questionnaire data by each actual tested user, mapping answer results to a rule space model (RSM), and obtaining three ideal mastering modes closest to answer conditions of each user; classifying all the ideal mastering modes in the cognitive attribute association graph through unsupervised clustering, and summarizing security levels of the cognitive attributes; and finally, performing normalization and weighted average on distance values corresponding to the three closest ideal mastering modes of each user, and selecting the level corresponding to the closest score as a cognitive security awareness assessment result of each user. The method has higher robustness and rationality.

Description

technical field [0001] The invention belongs to the field of cyberspace security / social engineering / psychometrics, and specifically relates to a questionnaire-based method for assessing individual cognitive security awareness. Background technique [0002] With the widespread popularization and accelerated development of the Internet, computer users are increasingly dependent on and interacting with the Internet, and social engineering, as a network attack method that targets humans, is becoming more and more mature. Cyber ​​attackers establish reasonable communication with others (such as sending emails, setting up phishing websites, etc.), exert a certain influence on the victim's psychology to generate cognitive bias, and make the victim take actions or behaviors that the attacker wants to achieve the attack. the purpose of the attacker's attack. [0003] In recent years, social engineering attacks have shown a trend of rapid rise and even abuse. There are many types and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24G06K9/62
CPCH04L63/1441H04L63/145H04L41/145G06F18/23213
Inventor 郑康锋杨润东杨博远武斌
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products