The Human Element of Information Security

被引:9
|
作者
Thompson, Hugh
机构
关键词
information security; security; security architecture; social engineering;
D O I
10.1109/MSP.2012.161
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security has long hinged on trusted insiders' ability to make good decisions. However, modifying human behavior through training is difficult; some battle-worn security executives might even dismiss it as impossible. Although foundational controls such as antivirus, data leak protection, and firewalls are important, they're far from sufficient. The sharp rise in 'knowability' of people at a distance raises an important question for the information security industry about the automation of personalized attacks: what happens when the marginal cost of launching a convincing personalized attack starts to approach 0 Today, most security controls are ignorant of rich historical data about the person they're tasked with protecting. As the cost for attackers to personalize their attacks goes down, our zeal in building technology to personalize defense must rise. This article explores our industry's need to embrace security's human element. © 2003-2012 IEEE.
引用
收藏
页码:32 / 35
页数:4
相关论文
共 50 条
  • [41] Functional Security and Information Security
    不详
    [J]. ATP EDITION, 2012, (04): : 8 - 8
  • [42] Human and organizational factors in computer and information security: Pathways to vulnerabilities
    Kraemer, Sara
    Carayon, Pascale
    Clem, John
    [J]. COMPUTERS & SECURITY, 2009, 28 (07) : 509 - 520
  • [43] Changing the viewpoint of information security management by emphasising the human factor
    Katerina, Papadaki
    Antonis, Antoniou
    [J]. MANAGEMENT OF TECHNOLOGICAL CHANGES, BOOK 2, 2007, : 121 - 134
  • [44] A Holistic Approach Towards Human Factors in Information Security and Risk
    Fagbule, Omolola
    [J]. RESEARCH CHALLENGES IN INFORMATION SCIENCE (RCIS 2020), 2020, 385 : 585 - 594
  • [45] Strategic Role of Human Resource Management in Information Security Management
    Wipawayangkool, Kamphol
    [J]. AMCIS 2010 PROCEEDINGS, 2010,
  • [46] ONTOLOGY EDITING TOOL FOR INFORMATION SECURITY AND HUMAN FACTORS EXPERTS
    Mace, John C.
    Parkin, Simon
    van Moorsel, Aad
    [J]. KMIS 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON KNOWLEDGE MANAGEMENT AND INFORMATION SHARING, 2010, : 207 - 212
  • [47] The human factors issues in information security: What are they and do they matter?
    McCauley-Bell, PR
    Crumpton, LL
    [J]. PROCEEDINGS OF THE HUMAN FACTORS AND ERGONOMICS SOCIETY 42ND ANNUAL MEETING, VOLS 1 AND 2, 1998, : 439 - 443
  • [48] Making Use of Human Visual Capability to Improve Information Security
    Nishigaki, Masakatsu
    Yamamoto, Takumi
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 990 - 994
  • [49] Social Engineering: The Neglected Human Factor for Information Security Management
    Luo, Xin
    Brody, Richard
    Seazzu, Alessandro
    Burd, Stephen
    [J]. INFORMATION RESOURCES MANAGEMENT JOURNAL, 2011, 24 (03) : 1 - 8
  • [50] Information Security and Data Protection: The Role of the "Human Factor" in Organizations
    Hugl, Ulrike
    [J]. PROCEEDINGS OF THE 8TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2009, : 80 - 87