Human Centric Cyber Security: What are the New Trends in Data Protection?

被引:0
|
作者
Kassicieh, Sul [1 ]
Lipinski, Valerie [1 ]
Seazzu, Alessandro F. [1 ]
机构
[1] Univ New Mexico, Anderson Sch Management, Albuquerque, NM 87131 USA
关键词
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
The debate about the use of automated security measures versus training and awareness of people with access to data (such as employees) to protect sensitive and/or private information has been going on for some time. In this paper, we outline the thinking behind security, what hackers are trying to accomplish and the best ways of combating these efforts using the latest techniques that combine multiple lines of defense. Different major categories of automated security measures as well as major training and awareness techniques are discussed outlining strengths and weaknesses of each method.
引用
下载
收藏
页码:1321 / 1338
页数:18
相关论文
共 50 条
  • [41] Reengineering Cyber Security Process: A New Perspective on Cyber Security Quality Management
    Sharbaf, Mehrdad S.
    IEEE 17TH INT CONF ON DEPENDABLE, AUTONOM AND SECURE COMP / IEEE 17TH INT CONF ON PERVAS INTELLIGENCE AND COMP / IEEE 5TH INT CONF ON CLOUD AND BIG DATA COMP / IEEE 4TH CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2019, : 332 - 337
  • [42] Big Data Analytics for Cyber Security
    Angin, Pelin
    Bhargava, Bharat
    Ranchal, Rohit
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [43] Data Mining and Its Cyber Security
    Qiang, Xinjian
    Cheng, Guojian
    Xiao, Hong
    2011 INTERNATIONAL CONFERENCE ON COMPUTER, ELECTRICAL, AND SYSTEMS SCIENCES, AND ENGINEERING (CESSE 2011), 2011, : 218 - 221
  • [44] Personal Data in Cyber Systems Security
    Ogiela, Marek R.
    Ogiela, Lidia
    COMPLEX, INTELLIGENT, AND SOFTWARE INTENSIVE SYSTEMS, CISIS-2017, 2018, 611 : 174 - 180
  • [45] Security and data protection
    Stud. Health Technol. Informatics, (273-279):
  • [46] DATA PROTECTION AND SECURITY
    MALIK, M
    PACE-PACING AND CLINICAL ELECTROPHYSIOLOGY, 1994, 17 (02): : 240 - 241
  • [47] A Data Mining Framework to Predict Cyber Attack for Cyber Security
    Rahman, Md Anisur
    Al-Saggaf, Yeslam
    Zia, Tanveer
    PROCEEDINGS OF THE 15TH IEEE CONFERENCE ON INDUSTRIAL ELECTRONICS AND APPLICATIONS (ICIEA 2020), 2020, : 207 - 212
  • [48] Protection of Critical Infrastructure in National Cyber Security Strategies
    Izycki, Eduardo
    Colli, Rodrigo
    PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 219 - 228
  • [49] Research on the privacy protection model of government cyber security in smart cities based on big data
    Chen G.
    Wang H.
    International Journal of Web Engineering and Technology, 2023, 18 (03) : 202 - 220
  • [50] Security Protection Technology of Cyber-Physical Systems
    Ye, Hong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (02): : 159 - 168