Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Crime AI Software Spam

Fujitsu Psychology Tool Profiles Users At Risk of Cyberattacks 30

itwbennett writes Fujitsu Laboratories is developing an enterprise tool that can identify and advise people who are more vulnerable to cyberattacks, based on certain traits. For example, the researchers found that users who are more comfortable taking risks are also more susceptible to virus infections, while those who are confident of their computer knowledge were at greater risk for data leaks. Rather than being like an antivirus program, the software is more like "an action log analysis than looks into the potential risks of a user," said a spokesman for the lab. "It judges risk based on human behavior and then assigns a security countermeasure for a given user."
This discussion has been archived. No new comments can be posted.

Fujitsu Psychology Tool Profiles Users At Risk of Cyberattacks

Comments Filter:
  • It's odd that they are trying to track how much people pay attention to privacy policies. I figure there's no point in reading them since they are all just complicated ways to say "We'll screw you whenever we want to."
    • It sounds like Clippy from Hell: "It looks like you did not pay close attention to the privacy policy. Your computer will be locked until you re-read it and take the subsequent test to confirm your understanding of this policy".
  • by gstoddart ( 321705 ) on Thursday January 22, 2015 @03:41PM (#48878455) Homepage

    "It judges risk based on human behavior and then assigns a security countermeasure for a given user."

    For which I'm sure for many users that amounts to "system shut down will begin in ....".

    We used to have a receptionist who would install pretty much anything from anywhere. Animated dinosaur cursors? Bring 'em on. A game? Make it so. She'd click any link, any button, anywhere.

    Periodically it was just easier to wipe her machine, re-install from an image, and then let her destroy it again.

    I honestly never knew why they let her near a computer -- it was always so full of garbage that she couldn't do anything with it, and no amount of telling her why she shouldn't do that would work.

    She clearly never used the damned thing for anything work related, she couldn't have had the time. And then when she got it so broken it was unusable, she demanded the IT guy come immediately and fix it ... because she was obviously losing valuable time clicking on pointless crap on the internet.

    • Well, if the user has to wear the helmet shown in the picture, then perhaps the punishment will be more severe!

      Seriously, what is the point of that picture?

    • Allow me to ask the question that MUST be asked here: Why did she have the necessary privileges to install the crap?

      • Well, first off, this was in the era of XP, when everybody had admin rights.

        And, second ... the developers who occasionally got suckered into trying to help her always said to IT "Can we just lock her machine down so she can't do any damage?".

        But it was like groundhog day ... just this endless loop of crap on the PC, re-install, followed by her clicking everything and getting crap on her PC. She couldn't, or wouldn't, learn not to do it.

        Hopefully, wherever she is now they've locked the machine down so she

        • by AmiMoJo ( 196126 ) *

          That sort of thing is a sacking offence at many places - damaging company equipment after being warned not to.

          In any case, it sounds like IT was incompetent. There were a couple of good options. They could simply disable the ability for her to run any apps except the ones they whitelisted. Can't install anything if you can't even run the installer. Another option was a little dongle that plugged into a PCI slot and prevented permanent changes being made to the system. After every reboot the OS would reset t

    • by khr ( 708262 )

      Animated dinosaur cursors?

      Don't knock animated dinosaur cursors... I used to work for a company in the 90's, PC-Kwik, that sold a package of cursors, including dinosaur ones. Granted, it wasn't our main product, just something for the sales people to upsell for a few dollars more once they had customers on the phone.

    • We used to have a receptionist who would install pretty much anything from anywhere. Animated dinosaur cursors? Bring 'em on. A game? Make it so. She'd click any link, any button, anywhere.

      Periodically it was just easier to wipe her machine, re-install from an image, and then let her destroy it again.

      "For example, the researchers found that users who are more comfortable taking risks are also more susceptible to virus infections"

      That also applies to real life and STDs. In that case anyone sleeping with your receptionist should use a lot of latex protection.,

  • Looking at those traits I can help but think the system would class your typical programmer as a large security risk and lock the system down so tight that writing code was not an option...
  • Er.. (Score:4, Insightful)

    by TechyImmigrant ( 175943 ) on Thursday January 22, 2015 @03:53PM (#48878587) Homepage Journal

    >those who are confident of their computer knowledge were at greater risk for data leaks.

    Doesn't that depend on why they are confident? If you're confident because you don't know what you don't know then maybe it's valid but if you're confident because you happen to have been designing computers for 30 years and are deeply involved in security architecture of computers, then maybe your confidence is well placed.

    • Or maybe people who really know what they're doing aren't going to be that confident that they're safe.

      • Or maybe people who really know what they're doing aren't going to be that confident that they're safe.

        Indeed. That's where I am concerning phones and PCs. I'm good with the hardware because I design it. But in my job I'm exposed to all the darkest security concerns, so there's lots to be concerned about.

  • My late father had a weakness for naughty bits, especially in the Double-D category. No how many times I tried to explain this to him, he always gets his computer infected with spyware, virius and other crap. He even paid $90 bucks for anti-spyware program that suddenly popped up on his computer one day. I hated driving 300 miles round trip to clean up his computer.
    • by gstoddart ( 321705 ) on Thursday January 22, 2015 @04:01PM (#48878693) Homepage

      Old men like young boobies ... this is an evolutionary fact.

      I once had to have "the talk" with my father ... Dad, I know you want to sneak a peak at boobies when mom isn't looking, but most of those sites are really dangerous ... if you're going to look at boobies, use this browser which won't run scripts or anything, and which runs as a different profile. I've bookmarked a few sites to get you started. And no matter what you the ad claims, don't click it.. ;-)

      Always practice safe click.

  • i hate cyber attacks :) than any 1 :)
  • It's all in the subject line
  • "It judges risk based on human behavior and then assigns a security countermeasure for a given user by sending all that info to security software advertisers."

  • I have a minor interest in social engineering, partly due to my run-ins with sociopaths, but psychology has always been an interest of mine in general.

    If there's one thing I, without fail, lecture my less-tech-savvy friends on anytime I ever have to fix anything computer-related, is that they are always the weak link in computer security.

    At least once a year, when I become sufficiently annoyed with other people because they post things on Facebook that get my security nerves up, I will post messages like: s

THEGODDESSOFTHENETHASTWISTINGFINGERSANDHERVOICEISLIKEAJAVELININTHENIGHTDUDE

Working...