Human Factor: The Weakest Link of Security?

被引:0
|
作者
Jasek, Roman [1 ]
Sarga, Libor [1 ]
机构
[1] Tomas Bata Univ Zlin, Zlin, Czech Republic
关键词
research; study; questionnaire; BYOD; password; security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Human element plays a critical role in cyberwarfare scenarios: a malicious adversary can launch targeted social engineering campaigns to gain unfettered access to sensitive electronic resources, establish unauthorized system persistence, and use the compromised host as a stepping stone for further exploitation, incorporating it into a botnet of controlled nodes. As hardware and software infrastructure protection efforts result in increasingly resilient systems, focus on end-users who constitute a security vulnerability can be expected to increase in the future. However, password database leaks, effectiveness of social engineering, and bring your own device (BYOD) trends in organizations all raise concerns as to the security competencies the general population possess. In the article, we present results of a large-scale questionnaire study pertaining to security habits and BYOD practices of more than 700 participants conducted in the Czech Republic during the period of September-December 2013. Ranging from a preferred operating system to password selection rationale, the answers should be a representative cross-section of how an "average" user maintains their electronic identity online. The snapshot provides valuable insights and actionable intelligence based on which information and communication technology policies in organizations can be modified to better accommodate the patterns discovered. The article maps current state of selected aspects of security in increasingly interconnected, technology-driven global structures where electronic identities supplement real-world ones and their compromise results in significant negative consequences.
引用
收藏
页码:317 / 326
页数:10
相关论文
共 50 条
  • [1] THE HUMAN FACTOR - THE WEAKEST LINK
    BREDE, HD
    [J]. LABORATORY ANIMAL SCIENCE, 1980, 30 (02): : 451 - 459
  • [2] Is the service desk the weakest link in IT security?
    Jensen, Finn
    [J]. Computer Fraud and Security, 2020, 2020 (12): : 15 - 17
  • [3] Addressing the weakest link: Implementing converged security
    Azeem Aleem
    Alison Wakefield
    Mark Button
    [J]. Security Journal, 2013, 26 : 236 - 248
  • [4] Uncertainty in the Weakest-Link Security Game
    Grossklags, Jens
    Johnson, Benjamin
    [J]. 2009 INTERNATIONAL CONFERENCE ON GAME THEORY FOR NETWORKS (GAMENETS 2009), 2009, : 673 - +
  • [5] Addressing the weakest link: Implementing converged security
    Aleem, Azeem
    Wakefield, Alison
    Button, Mark
    [J]. SECURITY JOURNAL, 2013, 26 (03) : 236 - 248
  • [6] Transforming the 'weakest link' - a human/computer interaction approach to usable and effective security
    Sasse, MA
    Brostoff, S
    Weirich, D
    [J]. BT TECHNOLOGY JOURNAL, 2001, 19 (03) : 122 - 131
  • [7] From Weakest Link to Security Hero: Transforming Staff Security Behavior
    Pfleeger, Shari Lawrence
    Sasse, M. Angela
    Furnham, Adrian
    [J]. JOURNAL OF HOMELAND SECURITY AND EMERGENCY MANAGEMENT, 2014, 11 (04) : 489 - 510
  • [8] The Weakest Link Human Behaviour and the Corruption of Information Security Management in Organisations - an Analytical Framework
    Holmberg, Robert
    Sundstrom, Mikael
    [J]. IMSCI '08: 2ND INTERNATIONAL MULTI-CONFERENCE ON SOCIETY, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, 2008, : 94 - +
  • [9] Defining "The Weakest Link": Comparative Security in Complex Systems of Systems
    Pieters, Wolter
    [J]. 2013 IEEE FIFTH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM), VOL 2, 2013, : 39 - 44
  • [10] As strong as the weakest link. Transport and supply chain security
    Jazdzewska-Gutta, Magdalena
    Borkowski, Przemyslaw
    [J]. TRANSPORT REVIEWS, 2022, 42 (06) : 762 - 783