Cultivating an Atmosphere of Proactive Computer Security to Mitigate Limited End-User Awareness

نویسندگان

  • Martyn Styles
  • Theodore Tryfonas
چکیده

It is becoming increasingly important that employees are taken through a more rigorous security-awareness training programme, in order to protect their personal computer and the networks behind it and to ‘protect them from themselves’. Virus and spam writers have begun to try to fool employees with ‘social engineering’ techniques, which prey on an employee’s willingness to believe in an email sender-name or inquisitiveness stirred by the email subject title. The purpose of this case study paper is to demonstrate that, no matter how complex computer security systems are, effort should be concentrated and focused on employees to improve their security awareness. Each employee needs to become a ‘Security Deputy’ to the company’s computer security staff and he or she needs to take some responsibility for preventing security breaches – whether inside the workplace or not. In this paper we investigate whether it is possible to remove the ability of users to compromise computer security. As it is easy to unwittingly spread a virus, or open security vulnerabilities, should users be held responsible for their actions? Such actions might damage a company’s systems perhaps even more than malicious employees, through simple ignorance of security issues. Later in this work we explore the options available to increase the security awareness to a higher level, including automating security policy enforcement that will be examined as a method of removing the ‘human element’.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparing Security Perceptions of E-Commerce Users

In today’s computer security paradigm, e-commerce participants are faced with many types of malware. Spyware and viruses are two such examples that continue to threaten secure e-business. Despite the best efforts of information security professionals to lessen the frequency and impact of the infections, they show no sign of abatement. Because normal user behaviors make them vulnerable to malwar...

متن کامل

A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness

Despite the recent increased attention afforded malware by the popular press, there appears to be a dearth in user awareness and understanding of certain aspects of the security paradigm. This article presents a comparison of user awareness levels of rootkits, spyware, and viruses between U.S. and Chinese users. The results of a survey of 210 U.S. respondents and 278 Chinese respondents indicat...

متن کامل

Preventing Key Performance Indicators Violations Based on Proactive Runtime Adaptation in Service Oriented Environment

Key Performance Indicator (KPI) is a type of performance measurement that evaluates the success of an organization or a partial activity in which it engages. If during the running process instance the monitoring results show that the KPIs do not reach their target values, then the influential factors should be identified, and the appropriate adaptation strategies should be performed to prevent ...

متن کامل

No Negotiation, Limited Negotiation, and Extended Negotiation in Proactive Focus on Form in Vocabulary Acquisition

Negotiation, as an interactional strategy and proactive focus on form (FoF) have received increased attention in second language research. The combination of negotiation and proactive FoF, however, has not been examined in relation to L2 vocabulary learning. To address this gap, the present study investigated how the amount of negotiation and proactive FoF impacted learners’ vocabulary knowledg...

متن کامل

A Proactive Defense Strategy to Enhance Situational Awareness in Computer Network Security

With the development of situational awareness in intrusion defense, a proactive response is a realistic and effective approach against the attackers. It is assumed that each player can update knowledge of the opponent and assess possible future scenarios of the dynamic game based on their previous interactions. Therefore, finding the best current move of the defender is modeled as a discrete-ti...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008