(844) 627-8267
(844) 627-8267

Learning in Cybersecurity. Applying Cognitive Psychology to… | by Sara V | Dec, 2023 | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


Applying Cognitive Psychology to Cybersecurity

Photo by Chase Chappell on Unsplash

Introduction:

Cognitive psychology is the study of how humans process information such as attention, learning, memory, perception, problem solving, reasoning, and remember. Not only does cognitive psychology apply to learning, but all aspects of cybersecurity from behavior to biometrics to social engineering. It is about making sense of human behavior. Does this sound like Artificial Intelligence? Well, cognitive psychology and brain science are the foundations of AI.

In this article and future articles, we will be applying knowledge and techniques published by cognitive psychologists and neuroscientists to cybersecurity knowledge. Additionally, I’ll be revising past articles I’ve published to apply these concepts. I should also note, I’m a cybersecurity professional with 17 years of formal (unrelated) education, a handful of certifications, and an interest in cognitive psychology. I’m not a cognitive psychologist or neuroscientist, I’ve tested these methods and have seen a _significant_ improvement in my knowledge retention, problem solving, and how I think about things.

Bloom’s Taxonomy:

Bloom’s Taxonomy is a psychology model used to classify learning objectives. There are three models to this theory but they can be summed up using the following:

1. Memorize: Recognizing and recalling
2. Understand: Discussions, summarizing, inferring
3. Apply: Implementing, relationships, problem solving
4. Analyze: Comparing and contrasting
5. Evaluate: Critiquing and prioritizing
6. Create: Hypothesizing, planning, producing

We need to combine all these levels of learning to be a successful student. Once applied appropriately, our learning skills will be developed enough to apply these techniques to any subject.

Bloom’s Taxonomy

Higher Order Thinking vs Lower Order Thinking:

——————————————————-


Click Here For The Original Source.

National Cyber Security

FREE
VIEW