TY - CHAP
T1 - Review of System-Scientific Perspectives for Analysis, Exploitation, and Mitigation of Cognitive Vulnerabilities
AU - Huang, Linan
AU - Zhu, Quanyan
N1 - Publisher Copyright:
© 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2023
Y1 - 2023
N2 - Chapter 3 elaborates on three critical types of human cognitive capabilities to fulfill four classes of CPS tasks in Fig. 3.2. For all of its advantages, the active presence of human cognition also brings vulnerabilities. Compared to computer programs and robots that strictly follow the algorithms and retain the same level of performance, human operators may violate security procedures or be prone to errors due to misaligned incentives, herding effects, inattention, fatigue, and bounded rationality. In Chap. 4, we classify cognitive vulnerabilities into innate vulnerabilities in Sect. 4.1 and acquired vulnerabilities in Sect. 4.2 based on whether they can be mitigated through short-term external interference, including security training and mechanism design in Fig. 1.8. For each cognitive vulnerability, we first illustrate its impact on HCPSs and how cognitive attacks can exploit it. Then, we present system-scientific perspectives to characterize the vulnerability, the attacks, and the defense methods in different security scenarios, which focus on the computational aspects of vulnerability analysis, exploitation, and mitigation in the literature.
AB - Chapter 3 elaborates on three critical types of human cognitive capabilities to fulfill four classes of CPS tasks in Fig. 3.2. For all of its advantages, the active presence of human cognition also brings vulnerabilities. Compared to computer programs and robots that strictly follow the algorithms and retain the same level of performance, human operators may violate security procedures or be prone to errors due to misaligned incentives, herding effects, inattention, fatigue, and bounded rationality. In Chap. 4, we classify cognitive vulnerabilities into innate vulnerabilities in Sect. 4.1 and acquired vulnerabilities in Sect. 4.2 based on whether they can be mitigated through short-term external interference, including security training and mechanism design in Fig. 1.8. For each cognitive vulnerability, we first illustrate its impact on HCPSs and how cognitive attacks can exploit it. Then, we present system-scientific perspectives to characterize the vulnerability, the attacks, and the defense methods in different security scenarios, which focus on the computational aspects of vulnerability analysis, exploitation, and mitigation in the literature.
KW - Acquired vulnerability
KW - Active learning
KW - Bounded rationality
KW - Inattentional blindness
KW - Incompliance
KW - Innate vulnerability
KW - Misaligned incentive
KW - Rational inattention
KW - Security awareness
UR - http://www.scopus.com/inward/record.url?scp=85161897128&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85161897128&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-30709-6_4
DO - 10.1007/978-3-031-30709-6_4
M3 - Chapter
AN - SCOPUS:85161897128
T3 - SpringerBriefs in Computer Science
SP - 49
EP - 65
BT - SpringerBriefs in Computer Science
PB - Springer
ER -