Abstract
This article aims to model the amygdala’s fight, flight, and freeze responses within the context of cybersecurity, to enable more intuitive and rapid responses to cyber threats. The developed model labels each type of cyber attack with numbers attributed to fundamental defense responses. Although the practical effectiveness of the model has not yet been tested, it is theoretically considered to add a new dimension to cybersecurity strategies. The article proposes that this approach could improve the adaptation of cybersecurity systems to the dynamic and continuously changing threat environment and make defense mechanisms more flexible.
Supplementary materials
Title
Cyber Attack Table
Description
This table is modeled after the chemical periodic table and serves as an example and representation for classifying cyber attacks. Each number corresponds to a different type of cyber attack and is grouped accordingly. It is proposed as an alternative to CVE codes. Considering that cyber security attacks are constantly evolving and mutating, this means that attackers are continually developing new methods to overcome new defense measures. Cyber attackers use advancements in technology and vulnerabilities in security measures to constantly change and adapt their attack strategies. Accordingly, each numerical range and the ongoing types of attack types represent the advanced process of this mutated or evolved type of cyber attack. (e.g., 4: Man in the Middle, 4.1: ARP Snooping, 4.2: DNS Snooping, 4.3: SSL Stripping, 4.4: Wi-Fi Hacking, etc.)
Actions
Title
“Fight, Flight, Freeze” interactive action plan in terms of cyber security
Description
The “Fight” command ensures security by responding to attacks through encryption, voice-generated encryption, or biometric identification. Encryption is a commonly used method to secure communication and protect data. Particularly during the transfer or storage of data, encrypting the data is crucial for maintaining data integrity and confidentiality.
When faced with an unidentified cyber attack, we activated the “FLIGHT” command in the system to lock it down. After generating a report, we proceeded with the backup and update process to ensure the system’s security and data integrity.
In this code, the steps to be taken in the system in the event of a detected cyber attack are specified. First, we executed the “freeze” command to freeze the system, then we carried out data backup and update processes, and finally, we created an attack report.
Actions