|Behavior Analysis in the Cyber World|
|Monday, May 30, 2022|
|10:00 AM–10:50 AM |
|Meeting Level 1; Room 102A|
|Area: DEV; Domain: Translational|
|Chair: Jessica Naomi Cadette Dunn (Orlando Health)|
|Discussant: Elisa M. Cruz-Torres (Florida Atlantic University)|
|CE Instructor: Elisa M. Cruz-Torres, Ed.D.|
As every behavior analyst in well aware, we as individuals exist in a world where our interaction with the environment shape who we are and how we behave. Professionals utilizing principles of behavior analysis exist in a wide array of fields outside of the traditional areas typically found at Behavior Analysis conferences, and typically call themselves something other than Behavior Analysts. The field of Cyber is one of those fields for which a large component revolves around analyzing human behavior with the goal of behavior change and education. This symposium is set out to lay the groundwork of educating attendees on what the Cyber world is, how we operate, and some areas for which Behavior Analysis is 100% in action. Furthermore, presenters will specifically discuss the use of manipulation for information gathering (Social Engineering), exploiting vulnerabilities in networks, web apps, and user security (Pentesting), and information gathering within digital media (Open Source Intelligence).
|Instruction Level: Basic|
|Keyword(s): Cyber, Social Engineering|
|Target Audience: |
Target audience for this presentation are individuals who are curious about the application of behavior analysis in the cyber field. No prerequisite knowledge required.
|Learning Objectives: At the conclusion of the presentation, participants will be able to: (1) Describe the the field of cyber and how behavior analysis is utilized in various techniques; (2) Define Social Engineering, Open-Source Intelligence, and Pentesting; (3) Understand various vectors within Social Engineering are crafted|
Where Do We Exist in the Cyber World?
|ELISEO D. JIMENEZ (Scientific Research Corporation )|
The field of Cyber or Cybersecurity began in 1972, long before the age of personal computers and smart phones. Since then, the field has grown significantly due to the increase in users, platforms, software, and hardware. More importantly, organizations heavily rely on digital resources and security in order to perform duties ranging from Human Resources to service delivery. To test the reliably of an internal network or security protocols, organizations hire outside companies to conduct a Penetration Test (Pentest) in order to assess the company systems with the goal of helping the hiring organization to fix internal issues. How the process of Pentesting works is highly dependent on tools, we as Behavior Analysts, utilize on a daily basis in our respective jobs. The goal of this presentation is to review the field of Cyber, and to build a parallel between Behavior Analysis and Cyber. Within the presentation, the presenter will also discuss ways to gather and use Intelligence gathered in digital media in order to assist Pentesters.
|Human Hacking and Behavior Analysis|
|Eliseo D. Jimenez (Scientific Research Corporation ), EDWARD JUSTIN PAGE (University of Pittsburgh)|
|Abstract: Ever find yourself in a position saying “I should not have gave them my ___________ information,” or “Why did I click on that link?” If you can recall a time in your past when that has occurred, then you were social engineered. The art of Social Engineering (SE) focuses on the direct manipulation of humans in order to collect targeted information which can be used to access a digital network or physical structure. As Behavior Analysts develop function-based interventions and Individualized treatment plants, social engineers craft vectors specific to their target in order to accomplish their mission. Techniques utilized in SE are founded in principles of behavior analysis, and has been shown to be highly effective at gaining access to secured areas, physical and/or digital. During this presentation, we will provide an overview of Social Engineering, SE techniques, and the BA foundations which allow social engineers to be successful. Additionally, attendees will develop an understanding of how SE works and the signals to look out for if they feel they are being social engineered.|