4 hours 42 minutes
The second lesson from the module attribution is gonna be about cognitive biases in this lesson, we will start by introducing biases. Then we are going to understand what are the cognitive biases, and you will see some of the common types off cognitive biases in threat intelligence,
Dr Margaret. It could income principal research scientists
at first point defines by says, as the tendency for people to favor one group person or C over another while unfairly discriminating against the remainder off choices. For better or worse, bias is
on inescapable feature off the human experience.
We are shaped by a combination off our environment, our genetics and our cognitive ability to process and make sense off our word. This means that our decisions, behavior and experiences are influenced by the experiences of the past and the present.
Basically, cognitive bias isn't specific to cybersecurity. It's universal. Manufacturers that influence of human behavior fly under our radar, especially in stressful situations that security pros often face.
When the psychologic biases off, analysts are taken into consideration.
It is important to stress that are all subject to cognitive vices, which could impact decisions and business outcomes in cyber security. It is also possible to classify Bisys as the types off cognitive limitations.
Psychological bisys, which are related to intelligence analyzes, could be classified US. Ensuring bias availability, bias, confirmation bias, illusory correlation on the framing effect.
Let's start with the first type off biases, availability, bias or availability. Heuristic is a mental shortcut that relies on immediate examples that come toe given person's mind when evaluating a specific topic. Concept, method or decision
in cyber security. New cycles that focus on rent somewhere or specific types of threats have influence analysts perception off what's risky and can influence their approaches towards security. The hot topics that continuously rise to the top off and analysts mind can be distracting
and buyers of the diagnosis off system issues
that our demon less likely simply because they are less available or less active in the analysts memory.
At an organizational level, availability bias can influence the allocation off resources and can lead toa misinterpretation off the risk.
The second example is confirmation bys. Basically, the confirmation bias is when someone seeks to confirm their beliefs, but exclusively searching for information that supports their hash were excluding opus and data.
This is especially common in cyber security
is difficult among analysts who enter any investigation digging for an answer that they really want. The third type off biases is correlation is not causation.
The correlation is not causation. Bias
is the logically valid idea. Let the events which coincide with each other, are not necessarily caused by each other.
The assumption authorization is false when all the evidence available is simple correlation,
keep in mind that it's not true that correlation cannot imply causation.
If there is still a correlation, then causation is very likely. You just need to prove it with evidence. Another common type off biases is the entering effect.
Ensuring occurs when a person locks onto the specifics, salient feature or a set of features off information early in the decision making process. This frequently talkers with numbers such as In sales 11 party in the negotiation proposes a price point. Once a price point is set,
the numbers serves as an unsure for additional negotiations, which may be too high,
maybe too low or Evan accurate.
The fifth type off biases is, ah, Luger Rico relation,
and it is the final man off perceiving a relationship between valuables typically, people events were behaviours, even when no such relationship exists.
A literary correlations awkward because the brain is constructed to search out meaningful patterns and make sense off experience.
The last common type off by Isis is the framing effect.
The framing effect, which affect is how choices are worded, often manipulates those who buy security tools. For example, a vendor might say one in five companies never got their data back after rest. Amar attack, for example, a vendor may say one in five companies never got their data back
after Ressam or attack
place and focus on the one organization that lost data instead off the four that didn't
this strategy causes security. Edmonds to Buy pricey Tools for Low Probability Risk
Basically, this is all for this lesson. After watching this video, you will be able to understand what our cognitive biases
and now you are ready to identify any off the common cognitive vices. If you encounter any of them during your day to day situation or during your investigations and analyzes,
I hope you enjoy this lesson. It's time to move to another problem encountered by analysts during their analysis face, which is logical fallacies or errors
Penetration Testing and Ethical Hacking
The Penetration Testing and Ethical Hacking course prepares students for certifications, like CEH. This course ...
7 CEU/CPE Hours Available
Certificate of Completion Offered
MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification Training
This course prepares you for the ATT&CK® Cyber Threat Intelligence Certification, and provides hands-on instruction ...
3 CEU/CPE Hours Available
Certificate of Completion Offered