Human Centric Cyber Security: What are the New Trends in Data Protection?

被引:0
|
作者
Kassicieh, Sul [1 ]
Lipinski, Valerie [1 ]
Seazzu, Alessandro F. [1 ]
机构
[1] Univ New Mexico, Anderson Sch Management, Albuquerque, NM 87131 USA
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The debate about the use of automated security measures versus training and awareness of people with access to data (such as employees) to protect sensitive and/or private information has been going on for some time. In this paper, we outline the thinking behind security, what hackers are trying to accomplish and the best ways of combating these efforts using the latest techniques that combine multiple lines of defense. Different major categories of automated security measures as well as major training and awareness techniques are discussed outlining strengths and weaknesses of each method.
引用
下载
收藏
页码:1321 / 1338
页数:18
相关论文
共 50 条
  • [31] Trends in standardization of smart grid cyber security
    Shimada, T. (shimada@criepi.denken.or.jp), 1600, Institute of Electrical Engineers of Japan (133):
  • [32] Cyber security basic defenses and attack trends
    Cardenas, Alvaro A.
    Roosta, Tanya
    Taban, Gelareh
    Sastry, Shankar
    HOMELAND SECURITY TECHNOLOGY CHALLENGES: FROM SENSING AND ENCRYPTING TO MINING AND MODELING, 2008, : 73 - +
  • [33] Human aspects of cyber security
    Clarke, Nathan
    Furnell, Steven
    INFORMATION AND COMPUTER SECURITY, 2023, 31 (03) : 265 - 266
  • [34] Cyber security: The human factor
    Welander, Peter
    CONTROL ENGINEERING, 2007, 54 (11) : C2 - C3
  • [35] Cyber security - the human factor
    Amende, James
    NUCLEAR ENGINEERING INTERNATIONAL, 2018, 63 (767): : 28 - 28
  • [36] Data-Centric Security for the IoT
    Schreckling, Daniel
    Parra, Juan David
    Doukas, Charalampos
    Posegga, Joachim
    INTERNET OF THINGS: IOT INFRASTRUCTURES, IOT 360, PT II, 2016, 170 : 77 - 86
  • [37] A Metadata Model for Data Centric Security
    Aziz, Benjmin
    Crompton, Shirley
    Wilson, Michael
    SECURE AND TRUST COMPUTING, DATA MANAGEMENT, AND APPLICATIONS, 2011, 186 : 21 - +
  • [38] An Ensemble approach to Big Data Security (Cyber Security)
    Hashmani, Manzoor Ahmed
    Jameel, Syed Muslim
    Ibrahim, Aidarus M.
    Zaffar, Maryam
    Raza, Kamran
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (09) : 75 - 77
  • [39] Cyber security: what are we talking about?
    Furnell S.
    Collins E.
    Computer Fraud and Security, 2021, 2021 (07): : 6 - 11
  • [40] A new arena of cyber protection
    Miorelli, Sam
    Hydrocarbon Engineering, 2021, 26 (06): : 19 - 21