A novel approach for improving information security management and awareness for home environments

被引:1
|
作者
Alotaibi, Fayez Ghazai [1 ,2 ]
Clarke, Nathan [3 ,4 ]
Furnell, Steven M. [3 ,4 ]
机构
[1] Univ Plymouth, Ctr Secur Commun & Network Res, Plymouth, Devon, England
[2] Shaqra Univ, Dept Comp Sci, Coll Sci & Humanities Dawadmi, Dawadmi, Saudi Arabia
[3] Univ Plymouth, Plymouth, Devon, England
[4] Edith Cowan Univ, Secur Res Inst, Joondalup, Australia
关键词
Information security management; Information security awareness; Human factors; Home users; Information security policy;
D O I
10.1108/ICS-05-2020-0073
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Purpose - The human factor is a major consideration in securing systems. A wide and increasing range of different technologies, devices, platforms, applications and services are being used every day by home users. In parallel, home users are also experiencing a range of different online threats and attacks and are increasingly being targeted as they lack the knowledge and awareness about potential threats and how to protect themselves. The increase in technologies and platforms also increases the burden upon a user to understand how to apply security across differing technologies, operating systems and applications. This results in managing the security across their technology portfolio increasingly more troublesome and time consuming. This paper aims to propose an approach that attempts to propose a system for improving security management and awareness for home users. Design/methodology/approach - The proposed system is capable of creating and assigning different security policies for different digital devices in a user-friendly fashion. These assigned policies are monitored, checked and managed to review the user's compliance with the assigned policies to provide bespoke awareness content based on the user's current needs. Findings - A novel framework was proposed for improving information security management and awareness for home users. In addition, a mock-up design was developed to simulate the proposed approach to visualise the main concept and the functions which might be performed when it is deployed in a real environment. A number of different scenarios have been simulated to show how the system can manage and deal with different types of users, devices and threats. In addition, the proposed approach has been evaluated by experts in the research domain. The overall feedback is positive, constructive and encouraging. The experts agreed that the identified research problem is a real problem. In addition, they agreed that the proposed approach is usable, feasible and effective in improving security management and awareness for home users. Research limitations/implications - The proposed design of the system is a mock-up design without real data. Therefore, implementing the proposed approach in a real environment can provide the researcher with a better understanding of the effectiveness and the functionality of the proposed approach. Practical implications - This study offers a framework and usable mock-up design which can help in improving information security management for home users. Originality/value - Improving the security management and awareness for home users by monitoring, checking and managing different security controls and configurations effectively are the key to strengthen information security. Therefore, when home users have a good level of security management and awareness, this could protect and secure the home network and subsequently business infrastructure and services as well.
引用
收藏
页码:25 / 48
页数:24
相关论文
共 50 条
  • [1] An Analysis of Information Security Awareness within Home and Work Environments
    Talib, Shuhaili
    Clarke, Nathan L.
    Furnell, Steven M.
    [J]. FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 196 - 203
  • [2] Improving Organisational Information Security Management: The Impact of Training and Awareness
    Waly, Nesren
    Tassabehji, Rana
    Kamala, Mumtaz
    [J]. 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1270 - 1275
  • [3] Hybrid approach to provide situational awareness for information security in computational environments
    Almeida, Ricardo
    Machado, Roger
    da Rosa, Diorgenes Yuri
    Pernas, Ana Marilza
    Yamin, Adenauer
    [J]. 2018 XLIV LATIN AMERICAN COMPUTER CONFERENCE (CLEI 2018), 2018, : 427 - 435
  • [4] Improving the Automation of Security Information Management: A Collaborative Approach
    Aguirre, Idoia
    Alonso, Sergio
    [J]. IEEE SECURITY & PRIVACY, 2012, 10 (01) : 55 - 59
  • [5] Risk management in digitalized educational environments: Teachers' information security awareness levels
    Sapanca, Hamza Fatih
    Kanbul, Sezer
    [J]. FRONTIERS IN PSYCHOLOGY, 2022, 13
  • [6] Towards Metamodel-based Approach for Information Security Awareness Management
    Jama, Ahmed Yousuf
    Siraj, Maheyzah Md
    Kadir, Rashidah
    [J]. 2014 INTERNATIONAL SYMPOSIUM ON BIOMETRICS AND SECURITY TECHNOLOGIES (ISBAST), 2014, : 316 - 321
  • [7] Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.
    Smith, E.
    [J]. COMPUTERS & SECURITY, 2008, 27 (5-6) : 224 - 231
  • [8] Towards a systematic approach for improving information security risk management methods
    Papadaki, Katerina
    Polemi, Nineta
    [J]. 2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 3733 - +
  • [9] A practical approach to information security awareness in the organization
    Vroom, C
    von Solms, R
    [J]. SECURITY IN THE INFORMATION SOCIETY: VISIONS AND PERSPECTIVES, 2002, 86 : 19 - 37
  • [10] [SA](2): a situation awareness approach to computational environments security
    Machado, Roger da Silva
    Almeida, Ricardo Borges
    Leal da Rosa, Diorgenes Yuri
    Donato, Lucas Medeiros
    Pernas, Ana Marilza
    Yamin, Adenauer Correa
    [J]. REVISTA BRASILEIRA DE COMPUTACAO APLICADA, 2016, 8 (01): : 89 - 103