Human Centric Cyber Security: What are the New Trends in Data Protection?

被引:0
|
作者
Kassicieh, Sul [1 ]
Lipinski, Valerie [1 ]
Seazzu, Alessandro F. [1 ]
机构
[1] Univ New Mexico, Anderson Sch Management, Albuquerque, NM 87131 USA
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The debate about the use of automated security measures versus training and awareness of people with access to data (such as employees) to protect sensitive and/or private information has been going on for some time. In this paper, we outline the thinking behind security, what hackers are trying to accomplish and the best ways of combating these efforts using the latest techniques that combine multiple lines of defense. Different major categories of automated security measures as well as major training and awareness techniques are discussed outlining strengths and weaknesses of each method.
引用
下载
收藏
页码:1321 / 1338
页数:18
相关论文
共 50 条
  • [21] An IoT-Centric Data Protection Method for Preserving Security and Privacy in Cloud
    Gupta, Rishabh
    Gupta, Ishu
    Singh, Ashutosh Kumar
    Saxena, Deepika
    Lee, Chung-Nan
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2445 - 2454
  • [22] Data-centric security: Integrating data privacy and data security
    Hennessy, S. D.
    Lauer, G. D.
    Zunic, N.
    Gerber, B.
    Nelson, A. C.
    IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 2009, 53 (02)
  • [23] Data-centric security: Integrating data privacy and data security
    Hennessy, Shawn D.
    Lauer, George D.
    Zunic, Nev
    Gerber, Benjamin
    Nelson, Adam C.
    IBM Journal of Research and Development, 2009, 53 (02):
  • [24] Data mining and Cyber security
    Thuraisingham, B
    THIRD INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE, PROCEEDINGS, 2003, : 2 - 2
  • [25] CYBER SECURITY AND DATA VISUALISATION
    Azvine, Ben
    Ghanea-Hercack, Robert
    JOURNAL OF THE INSTITUTE OF TELECOMMUNICATIONS PROFESSIONALS, 2016, 10 : 9 - 13
  • [26] Cyber security for home users: A new way of protection through awareness enforcement
    Kritzinger, E.
    von Solms, S. H.
    COMPUTERS & SECURITY, 2010, 29 (08) : 840 - 847
  • [27] Improving patient centric data retrieval and cyber security in healthcare: privacy preserving solutions for a secure future
    Arunprasath, S.
    Annamalai, Suresh
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (27) : 70289 - 70319
  • [28] Cyber Security: Terms, Laws, Threats and Protection
    Jha, Manasi
    Anand, C. S.
    Mahawar, Yogesh
    Kalyan, Uday
    Verma, Vikas
    2021 INTERNATIONAL CONFERENCE ON COMPUTING SCIENCES (ICCS 2021), 2021, : 148 - 151
  • [29] Cyber-security: Who will provide protection?
    ViaSat, United Kingdom
    Comput. Fraud Secur., 12 (19-20): : 19 - 20
  • [30] Hidden Danger and Protection Strategy of Cyber Security
    Yang, Guan-ying
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON MANUFACTURING ENGINEERING AND INTELLIGENT MATERIALS (ICMEIM 2017), 2017, 100 : 272 - 278