DID YOU KNOW? DTIC has over 3.5 million final reports on DoD funded research, development, test, and evaluation activities available to our registered users. Click HERE
to register or log in.
BRI: Cyber Trust and Suspicion
Technical Report,30 Sep 2012,31 Dec 2014
UNIVERSITY OF TEXAS AT EL PASO EL PASO United States
Pagination or Media Count:
For the Cyber Trust and Suspicion CTS research project, the project proposal identified a substantial undertaking in advancing our knowledge and understanding of both trust and suspicion in the cyber domain, particularly as they apply to insider behaviors and insider manipulation. In order to quickly progress this effort, five separate thrusts were identified, to be addressed separately by different research teams. These five thrusts and their major findings for the first two years of the CTS project are briefly summarized inthe next few paragraphs, and then covered more extensively in the remainder of this report. THRUST 1 A Social, Cultural, And Emotional Basis for Trust and Suspicion Manipulating Insider Threat In Cyber Intelligence and Operations For 2013, the concepts of Predictability, Susceptibility, and Awareness PSA as predictors of insider types was explored. Efforts were focused on defining, representing, and validating the PSA modeling framework, as outlined in the Cyber Trust and Suspicion CTS research proposal. Synthetic scenarios reflective of realistic situations were created to analyze how PSA might appear in real-world situations, and how they could be measured and applied to identifying potential insider types.
APPROVED FOR PUBLIC RELEASE