Skip to main content

Table 1 Example: Three actors defined based on HFC characteristics

From: Cybersecurity profiles based on human-centric IoT devices

Characteristic

Denise Cantora

Bob Protocolo

Clark Firewall

Habits

9:30–14:30: working

9:30–14:30: working

15:30–18:30: working

Hobbies: marketing, management, office

Hobbies: Recipes, desserts

Hobbies: Hacking, security

Technical Skills

Apps: OpenOffice, Thunderbird

Apps: OpenOffice, Tunderbird

Apps: fcrackzip, Thunderbird

Role: user

Role: user

Role: admin

Devices

PC={IP:192.168.1.3, OS:Win10(user)}

PC={IP:192.168.1.4, OS:Win7(user)}

PC={IP:192.168.1.2, OS:Ubu10(admin)}

Smartphone(own), USB (shr)

Smartphone(own), USB(shr)

Smartphone(own), USB(shr)

USB Printer

Router(admin)= {IP:192.168.1.1}

Allow(admin)={Denise’s PC; Bob’s PC}

Rubber Ducky

Exposure

WebActivity: high

WebActivity: high

WebActivity: high

Character: distrustful

Character: friendly

Character: trusted

Salary: very good

Salary: low

Salary: very low

Job: AC Directive

Job: Creative

Job: Technician

Past: None

Past: betrayed the company

Past: None

Motivation

Personal

Economical, revenge

Economical, challenge

Privacy

vid: dcantora

vid: bprotocolo

vid: cfirewall

Domain: acantora.com

Domain: acantora.com

Domain: acantora.com

pol:null

pol:null

pol:null

Security

AC: user mode

AC: User mode

AC: Admin

pol: Default

pol: Default

pol: Default

dem: null

dem: null

dem: null

idps: Win.Defender

dem: Win7 Firewall

dem: Ubu18 Firewall

Tools: Secure Erasure

Relationships

Contacts: Bob Protocolo, Clark Firewall

Contacts: Abuela Cantora, Denise Cantora

Contacts: Denise Cantora

Family: Abuela Cantora

Family: Alice Protocolo

 

Friends

Friends: Clark Firewall

Friends: Bob Protocolo, Sue Picious

  1. own owner, shr shared, vid virtual id, id identificator, pol policy, AC access control, dem digital evidence management, idps intrusion detection and prevention system