Human Buffer Overflow

From Cognitive Attack Taxonomy
Revision as of 04:24, 30 July 2024 by Info (talk | contribs) (Created page with "== '''Human Buffer Overflow ''' == '''Short Description:''' Exploiting cognitive workload to increase likelihood for success. <br> '''CAT ID:''' CAT-2022-194 <br> '''Layer:''' 8 <br> '''Operational Scale:''' Tactical <br> '''Level of Maturity:''' Theoretical <br> '''Category:''' Exploit <br> '''Subcategory:''' <br> '''Also Known As:''' <br> == '''Description:''' == '''Brief Description:''' <br> '''Closely Related Concepts:''' <br> '''Mechanism:''' <b...")
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Human Buffer Overflow

Short Description: Exploiting cognitive workload to increase likelihood for success.

CAT ID: CAT-2022-194

Layer: 8

Operational Scale: Tactical

Level of Maturity: Theoretical

Category: Exploit

Subcategory:

Also Known As:

Description:

Brief Description:

Closely Related Concepts:

Mechanism:

Multipliers:

Detailed Description: Exploiting cognitive workload to increase likelihood for success. The timing of an attack may greatly influence its liklihood of success, for example sending a phishing email during a period of high workload, or congruent context may increase success likelihood. Applicable to 'quick change' scams.

INTERACTIONS [VETs]:

Examples:

Use Case Example(s):

Example(s) From The Wild:

Comments:

References: