Application of sonification method in teaching information security

A Vishnevsky, N Abbas - International Conference on Information …, 2023 - Springer
International Conference on Information Technology & Systems, 2023Springer
Issues related to the detection of computer attacks are among the key issues in the field of
information security. This study is devoted to the possibilities of sonification of signs of
computer attacks, particularly their voicing. Examples and theoretical justification of the
method of audialization of the behavior of computer violators are presented. Particular
attention is paid to the study of interaction between the attacker and the defense system from
the rational and emotional points of view in order to display behavioral signs using …
Abstract
Issues related to the detection of computer attacks are among the key issues in the field of information security. This study is devoted to the possibilities of sonification of signs of computer attacks, particularly their voicing. Examples and theoretical justification of the method of audialization of the behavior of computer violators are presented. Particular attention is paid to the study of interaction between the attacker and the defense system from the rational and emotional points of view in order to display behavioral signs using fragments of musical compositions. The hypothesis that the expressiveness of music language is sufficient to detect or define by ear such characteristics of digital portraits of computer violators as manipulative text messages, phishing images and the nature of behavioral activity itself was formulated. Fragments of classical musical compositions were used to describe different states of the information system due to their semantics and associations available to potential users of the sound protection system being developed. The focus of the defense system was shifted from technical signs of computer attacks to psycholinguistic and behavioral ones. This is done because attackers know and avoid most of the existing technical means of detecting attacks. In some cases, it is more difficult to affect violators’ behavior than to modify the technical characteristics of computer attack tools. The proposed method could be developed to an expert tool by automatic selection of music for each particular situation of information interaction. The original combination of musicology and applied problems of information security could serve to solve the urgent social problem of inclusive education. A prototype of a security system with a sound user interface has already been developed and it could be used as an assistive technology for example, when detecting computer attacks or teaching information security courses for visually impaired students.
Springer
以上显示的是最相近的搜索结果。 查看全部搜索结果