Social Cognitive Bias: A Case Study

Great Essays
The ever advancing field of technology is an amazing feat that the human race has developed. With any strive forward, there is always negatives that come with it. Throughout history mankind has always been curious and wanted to find out way to circumvent the systems that they use. Mankind does it out of curiosity and malicious intent though. Technology has quickly attempted to block these malicious attacks through new security measures and proper training, but malicious users will always find a way. These malicious users began using a technique called social engineering to infiltrate into places they were not allowed into. So what is social engineering when defined in a technology environment? Hadnagy defines social engineering as the art or …show more content…
Why would someone willing give away secrets or their own information to an unknown person? The human decision making process plays a large role in how people react with the world. AL-Msloum and AL-Johani explain that most people have a preconceived cognitive bias for most scenarios that they experience (2013). Cognitive bias is how the human brain looks at a scenario and alters it to fit what is expected. Many social cognitive bias can be abused by malicious attackers when social engineering a victim out of information. The attacks can be as simple as sending an email out from a Nigerian prince who is in need of assistance in withdrawing money from his oversea account. The email states that there is a problem with how the prince can access the money and request that the user help the price for a fee. The prince is actually fictional and the malicious user is trying to get the user invested enough to send the attacker money for an increased amount later. The social engineering attack is known as phishing. The attacker is playing on the user’s cognitive bias and greed thinking that if they do just this one thing they will make a lot more money later. People fall into these traps easily because of our tendencies to think a certain way. The best method to prevent ourselves from following our cognitive bias is having continuously updated awareness training. A study …show more content…
When it comes to social engineering, malicious attackers prey upon this fact and use it to their advantage. In a lot of the cases resulting in data loss, the victim never suspected anything to be wrong because they thought the person they were working with was legitimate (Watson, Ackroyd, & Mason, 2014). This attack is sometimes called an impersonation attack. An impersonation attack can be in person, over the internet, or by phone. Some attackers have cold called large tech firms using different extension and tell them that they are tech support. The attackers will continue to call until they reach someone who has already placed asked for help. The victim trust that the person calling is tech support because the outlying factors match their expectation of help. This allows the attacker to essential talk the victim into anything that they want. These attacks are becoming more and more common with fake Microsoft technical personal calling homes. The attacker tells the victim that there software has detecting a virus running on the victim’s computer and continue from there. The largest issue is people without the knowledge of how the technology industries works almost automatically trust a person who they believe have authority. Kahneman and Tversky state that the human mind will immediately revert to the engrained knowledge of a bias that is developed over time (1972). Basically stating

Related Documents

  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    What is Identity robbery? Fraud is a type of taking somebody's character in which somebody puts on a show to be you with a specific end goal to have entry to assets, for example, getting your bank data, Visa numbers, and passwords to get to your own data. 9. How is fraud done? Fraud is finished by utilizing a PC, experiencing somebody's waste, skimming gadgets, spyware and programmers utilize a savvy project to have admittance to your money related data.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Prompt 1: What effect do bias and stereotyping have on self-esteem? Do you think that children in target groups for bias automatically have low self-esteem? Why or why not? The effects bias and stereotyping have on self-esteem is slowing down the devolvement process and low self-esteem.…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    These people use social media to pretend to be someone that they are not. In some cases they do this in order to date someone they feel is out of their league. Catfishing has become increasingly popular, they even made a hit TV show about it. In the show, the creator of the show and his partner try and see if the person online is who they say they are and usually they are not. Catfishers steal information and pictures from strangers or a friend they wish they could be and put it out there hoping to deceive a person into being with them.…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In their article, “Discrimination and Implicit Bias in a Racially Unequal Society,” R. Richard Banks, Jennifer L. Eberhardt, and Lee Rosst take the position that even as a society denounces racism publicly, there are still many practices of racism. That racism in fact evolved into a more potent form. One that is harder to get rid of, and might not even present itself. The authors arguments had three main components. They spoke on racial profiling, citing that people, even the police officers that were tested, are more likely to say a “stereotypical” African-American male is a criminal, as opposed to a “less stereotypical” African-American man, based on a study conducted by Eberhardt and some of his colleagues.…

    • 590 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The deaths of many unarmed African Americans by police has ignited a nationwide debate on racial disparities in the United States. Many people think we have a race issue, but what if the problem was beneath our conscious awareness. This issue is a psychological issue that everybody possess called implicit bias. “Implicit Biases are automatic attitudes or stereotypes that can influence our beliefs, actions and decisions in an unconscious manner” (Weir 1). Due to their implicit biases, Police Officers are more likely to target and kill black people.…

    • 944 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Stereotyping is a big part of the human life. They are formed by our experiences and how we grow up. Stereotypes form our judgement about others and impact our mindset. It can help you determine someone’s identity in a positive or a negative way. Stereotyping is a big problem in this world.…

    • 365 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    When it comes to biases, it is important that we are self-aware of our own biases on a personal level, because they can negatively or positively impact us as…

    • 638 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Incredible Pre-Text

    • 790 Words
    • 4 Pages

    The most dangerous social engineers are those who can invent a lie so believable that they are able to successfully impersonate a legitimate employee without ever raising any suspicion. This tactic is particularly harmful because if real employees can be tricked into believing the criminal is actually a coworker or a member of upper management, it is not very difficult for a charismatic social engineer to manipulate the employee into divulging extremely sensitive information, or even worse, unwittingly grant the impersonator unfettered access to the network. As improbable as this technique seems, it is actually a favorite weapon in the social engineer's arsenal, and it has a frighteningly high rate of success!…

    • 790 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Unconscious Bias

    • 1514 Words
    • 7 Pages

    Review of Literature Unconscious Bias People subjected to racism and bias attitudes often face a multitude of challenges when placed in racially hostile environments. One of these challenges is unconscious bias. “Unconscious bias refers to a bias that we are unaware of, and which happens outside of our control. It is a bias that happens automatically and is triggered by our brain making quick judgments and assessments of people and situations, influenced by our background, cultural environment and personal experiences.”…

    • 1514 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    1. List the five (5) steps of the Hacking Process. a. Foot-printing, Enumeration, System Hacking, Covering Tracks, Planting Backdoors 2. In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior to devising an attack and penetration test plan?…

    • 802 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Scammers or swindlers seem to be everywhere: in the media, the market or in politics. They all possess one unique ability, which is artifice. Artifice is described by Chris Hedges as “the most essential skill…” (Prompt). In other words, artifice is the art of being clever or cunning, and Hedges explains in his passage, “Empire of Illusion,” that culture now revolves around artifice.…

    • 721 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In today's generation, our world seems to be controlled a lot by technology and social media. Why does this matter? The fact people are wasting a lot of their life time on their phones and missing out on important and more valuable things in life by doing so is letting technology win the battle against us. " Can We Auto-Correct Humanity?" by Richard Williams, best known as Prince Ea, expressed thoughts of social media and technology taking over humanity. "We cannot auto-correct humanity because we must correct ourselves," (Williams 2014) was Williams’s own answer to his question of auto-correcting humanity.…

    • 851 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Application of the Social Cognitive Theory on Child Obesity The social cognitive theory (SCT) developed by Albert Bandura emphasizes how cognitive, behavioral, personal, and environmental factors interact to determine motivation and behavior (Crothers, Hughes, & Morine, 2008). The SCT is composed of four methods of goal realization: self-observation, self-evaluation, self-reaction and self-efficacy (Crothers, Hughes, & Morine, 2008). These factors are constantly influencing each other and used as a framework for designing, implementing and evaluation studies and program (Crothers, Hughes, & Morine, 2008).…

    • 843 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Integrity Displayed throughout Social Media Is integrity displayed through social media? Integrity is the quality of being proven to be trustworthy and having upright morals. Integrity is one who has strong morals and principles; one who can be trusted and reliable upon. The concept of integrity can be applied through social media in many ways, such as positive and negative. Social media is the collective of online communications channels whose purpose is to provide a community-based input, interaction, content-sharing and collaboration.…

    • 999 Words
    • 4 Pages
    Improved Essays