Volume 20 No 8 (2022)
 Download PDF
SECURITY APPROACHES IN NEROUSCIENCE
P.Muthu Subramanian , A.Rajeswari
Abstract
In order to enhance Cybersecurity performance by people, we are striving to comprehend the neurological elements of cyber security ability. Attackers who target computer security are referred to as "hackers" in this article. In order to explore pattern classification, thinking, and choice function that facilitate the identification and manipulation of security flaws, our initial objective is to develop behavioural accuracy and response time metrics. The development of theories addressing issues relating to the identification, measurement, and training of cyber security expertise will be facilitated by an understanding of the intellectual processes involved. In addition to behavioural tests, our objective is to conduct a structural neuroimaging research of the neurological process systems which can identify individuals with varying levels of knowledge about security approaches. Our next objective is to empirically evaluate how attackers' thought processes—which psychologists refer to as biases and heuristics affect how susceptible they are to security methods. With the help of deceptive or fraudulent content, honeypots are a tried-and-true method for diverting attackers' attention away from legitimately critical data and their limited time and skills are being wasted. The ultimate objective is strengthening the present system security, we analyse hackers' minds using the vast experiments and studies we have conducted to look inside the minds of skilled grandmasters.
Keywords
Cyber security, neuroscience
Copyright
Copyright © Neuroquantology

Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Articles published in the Neuroquantology are available under Creative Commons Attribution Non-Commercial No Derivatives Licence (CC BY-NC-ND 4.0). Authors retain copyright in their work and grant IJECSE right of first publication under CC BY-NC-ND 4.0. Users have the right to read, download, copy, distribute, print, search, or link to the full texts of articles in this journal, and to use them for any other lawful purpose.