cognitive bias and security vulnerabilities the psychology of software engineering neil dixley
TRANSCRIPT
![Page 1: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/1.jpg)
Cognitive Bias and Security VulnerabilitiesTHE PSYCHOLOGY OF SOFTWARE ENGINEERING
NEIL DIXLEY
![Page 2: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/2.jpg)
Cognitive
![Page 3: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/3.jpg)
Security failures are cognitive failures
![Page 4: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/4.jpg)
Two systems one brain
AutomaticIntuitiveInstinctivePrimaryRapidBlind
ConsideredEffortfulFocusedSecondarySlowerLazy
![Page 5: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/5.jpg)
Cognitive Bias
![Page 6: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/6.jpg)
Anchoring
![Page 7: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/7.jpg)
Loss Aversion
![Page 8: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/8.jpg)
Principle of Authority
![Page 9: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/9.jpg)
Mitigating cognitive failures
![Page 10: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/10.jpg)
Threat Modelling
![Page 11: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/11.jpg)
Check Lists
![Page 12: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/12.jpg)
Security First
![Page 13: Cognitive Bias and Security Vulnerabilities THE PSYCHOLOGY OF SOFTWARE ENGINEERING NEIL DIXLEY](https://reader036.vdocuments.mx/reader036/viewer/2022070323/56649dd25503460f94ac8b85/html5/thumbnails/13.jpg)
Further information
BBC Horizon – How we really make decisions
Wikipedia – List of Cognitive Biases
Cognitive Dissonance – the book
Cognitive Dissonance – the podcast