UTSA professor’s new study explores the mind of a cyberterrorist

(Dec. 14, 2015) -- A new study by Max Kilger, director of Data Analytics Programs at The University of Texas at San Antonio (UTSA) College of Business, is delving into an aspect of cybersecurity rarely explored before now: the human component. Kilger’s research utilizes his talents as a social psychologist to show that at the beginning of any digital threat is a real person with unique motivations.
“I’ve spent a fair amount of time trying to get people to understand that the human component of cybersecurity is very important,” Kilger said. “Understanding the motivations of cyberterrorists was a foreign concept until very recently and still is to many information security professionals.”
Kilger recently represented UTSA, which is home to the nation’s top cybersecurity program, at a North Atlantic Treaty Organization (NATO) training facility in Ankara, Turkey. There, he stressed the importance of understanding that cyberterrorists are different from traditional terrorists. There are several motivations for the attacks they carry out. Kilger said that while some are driven by ego, politics or entertainment, the most common reason is money.
“You can basically rob a bank without actually robbing a bank,” he said. “The risk of getting caught is fairly low and the chance of success is pretty high.”
Kilger is among the UTSA faculty leading the charge in studying the human component of cyberterrorism. He has unique expertise in cybersecurity and social psychology.
The reason why this topic is lesser known, he said, is that security professionals become very focused on the technological side of responding to attacks and lack the social psychology background to analyze and understand the human being on the other side of that attack.
“Being able to project future scenarios is one of the most important aspects of cybersecurity,” he said. “A lot of information security efforts are defense-based and reactive. We need a more proactive approach.”
According to Kilger, a new approach is needed because now a single person can effectively attack a nation-state. In his study, published in Availability, Reliability and Security, he explains that the dramatic shift in power between a country and an individual is very enticing and it’s one sign that a cyber terrorism community could be on the rise.
“As a social psychologist, you look at markers and clues. You analyze what’s happened before and how that informs what’s going on now,” he said. “Losses are adding up significantly. They’re recruiting all the time and they’re very organized.”
As societies become more reliant on the Internet the threat of cyber terrorism looms larger. It’s something Kilger said needs to be kept in mind moving forward in a world where cars and airplanes are connected to the Internet.
“There’s no easy solution,” he said. “We need more understanding of why these attacks occur and why people do them. Then we can start figuring out what their targets will be and what they’re likely to do. With that, we can stop them from happening.”
-------------------------------
Learn more about data analytics at UTSA.
Learn more about the College of Business Information Systems and Cybersecurity program, the Center for Infrastructure Assurance and Security and the Institute for Cybersecurity.
Read Max Kilger’s study, “Integrating Human Behavior into the Development of Future Cyberterrorism Scenarios.”
Connect online at Facebook, Twitter, YouTube, Instagram and UTSA Today.
Events
Learn to use the simple but powerful features of EndNote®, a citation management tool. In this hands-on workshop, participants will learn to setup an EndNote library, save references and PDFs, and automatically create and edit a bibliography.
Virtual Event ( Zoom)The Urban Bird Project at UTSA will discuss urban bird populations, conservation efforts, and how you can get involved.
JPL Assembly Room (4.04.22,) Main CampusThe DMPTool is a free online resource that helps researchers create data management plans. This workshop will cover the main components of DMPs and how to create them using the DMPTool. Attendees will learn to: locate templates by funding agency, add research collaborators, and identify institutional guidance.
Virtual Event (Zoom)Join UTSA Libraries and Museums to learn more about the publishing discounts available for UTSA researchers. Current agreements include Elsevier, Cambridge University Press, Wiley, and more. Bring your questions and feedback for the library as we continue to pursue partnerships with publishers to reduce costs for our researchers.
Virtual Event (Zoom)Citation managers such as Zotero® can help you store and organize the citations you find during your research. Zotero can also generate bibliographies in various styles, insert in-text citations and allow you to share sources with collaborators.
Virtual Event (Zoom)Have questions about making your OER accessible on UTSA Pressbooks? The OER Team and the Digital Accessibility are ready to answer them! Bring your questions about OER and accessibility and receive guidance from our two teams.
Virtual Event (Zoom)In this workshop, attendees will be introduced to Pandas, a Python tool for working with data easily. It makes it simple to organize and analyze information when data is organized and categorized, like spreadsheets or tables.
Group Spot B, John Peace Library