TY - CHAP
T1 - Introduction
AU - Huang, Linan
AU - Zhu, Quanyan
N1 - Publisher Copyright:
© 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2023
Y1 - 2023
N2 - Human cognitive capacities and the needs of human-centric solutions for “Industry 5.0” make humans an indispensable component in Cyber-Physical Systems (CPSs), referred to as Human-Cyber-Physical Systems (HCPSs), where AI-powered technologies are incorporated to assist and augment humans. The close integration between humans and technologies in Sect. 1.1 and cognitive attacks in Sect. 1.2.4 poses emerging security challenges, where attacks can exploit vulnerabilities of human cognitive processes, affect their behaviors, and ultimately damage the HCPS. Defending HCPSs against cognitive attacks requires a new security paradigm, which we refer to as “cognitive security” in Sect. 1.2.5. The vulnerabilities of human cognitive systems and the associated methods of exploitation distinguish cognitive security from “cognitive reliability” and give rise to a distinctive CIA triad, as shown in Sects. 1.2.5.1 and 1.2.5.2, respectively. Section 1.2.5.3 introduces cognitive and technical defense methods that deter the kill chain of cognitive attacks and harden the cognitive security. System scientific perspectives in Sect. 1.3 offer a promising direction to address the new challenges of cognitive security by developing quantitative, modular, multi-scale, and transferable solutions. Figure 1.1 illustrates the structure of Chap. 1.
AB - Human cognitive capacities and the needs of human-centric solutions for “Industry 5.0” make humans an indispensable component in Cyber-Physical Systems (CPSs), referred to as Human-Cyber-Physical Systems (HCPSs), where AI-powered technologies are incorporated to assist and augment humans. The close integration between humans and technologies in Sect. 1.1 and cognitive attacks in Sect. 1.2.4 poses emerging security challenges, where attacks can exploit vulnerabilities of human cognitive processes, affect their behaviors, and ultimately damage the HCPS. Defending HCPSs against cognitive attacks requires a new security paradigm, which we refer to as “cognitive security” in Sect. 1.2.5. The vulnerabilities of human cognitive systems and the associated methods of exploitation distinguish cognitive security from “cognitive reliability” and give rise to a distinctive CIA triad, as shown in Sects. 1.2.5.1 and 1.2.5.2, respectively. Section 1.2.5.3 introduces cognitive and technical defense methods that deter the kill chain of cognitive attacks and harden the cognitive security. System scientific perspectives in Sect. 1.3 offer a promising direction to address the new challenges of cognitive security by developing quantitative, modular, multi-scale, and transferable solutions. Figure 1.1 illustrates the structure of Chap. 1.
KW - CIA triad
KW - Cognitive attacks
KW - Cognitive reliability
KW - Cognitive security
KW - Cognitive vulnerability
KW - Cyber security
KW - Data science
KW - Human-centered AI
KW - Human-cyber-physical systems
KW - System science
UR - http://www.scopus.com/inward/record.url?scp=85161928740&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85161928740&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-30709-6_1
DO - 10.1007/978-3-031-30709-6_1
M3 - Chapter
AN - SCOPUS:85161928740
T3 - SpringerBriefs in Computer Science
SP - 1
EP - 25
BT - SpringerBriefs in Computer Science
PB - Springer
ER -