Besnard Attacks in IT Systems : a Human Factors - Centred Approach
نویسنده
چکیده
The approaches taken to secure IT systems are currently technically focused. For instance, a recent project funded by the European Commission, MAFTIA, investigates an attack tolerance paradigm that aims at implementing technical solutions in order to protect internet-based applications against potential attacks. This technical approach is necessary but it disregards the consideration of human factors in malicious actions. Addressing this topic would provide key-elements for understanding the attackers' motivation and strategies. This would be a contribution to systems dependability, especially availability and confidentiality (see [2]).
منابع مشابه
پهنهبندی ریسک حملات گرگ به انسان و دام با استفاده از شیوۀ حداکثر بینظمی در استان اردبیل
Based on historical data, wolf is one of the large carnivores which suffers from human-wildlife conflicts especially in the animal husbandry field. In this research we tried to model wolf attacks to the humans and livestocks in Ardabil Province, and give some relevant recommendations. Focusing on the wolf attacks data (both human and livestocks), recorded during 10 years (2004–2014), we carried...
متن کاملTechnical and Human Issues in Computer-Based Systems Security
Computer systems and internet are becoming pervasive in our everyday life. Being online brings the consequence that such systems are prone to malicious attack. This vulnerability, along with our reliance on these systems, implies that it is important for us to do our best in securing them to ensure their proper functioning. In this paper, we are trying to tackle the security issues from both te...
متن کاملUsers as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملResilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation
State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...
متن کاملInnovation in the Agro-Food Sector: from Technical Innovation-Centred Approaches to Sustainability Transition Processes
Innovation is a complex phenomenon and process involving translation of knowledge into new techniques, products, services. It is considered crucial for sustainable agriculture development and achievement of long-term food security. The review describes the diversity of innovation and relates it to agro-food sector. It also sheds light on different innovation models and explores their contributi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2001