The digital security Essay

When sing digital security, the idea of machines, computing machines, information, and engineering may traverse your head. One may believe of the encoding, firewalls, and other security steps that are set up in/around a computing machine web to do certain that critical information does non acquire into the incorrect custodies. The subject of worlds and how they affect the security of a web is frequently overlooked. It is assumed that if the watchwords are set and the information is encrypted, so the security of the web is infallible. Unfortunately, this is non the instance. In this paper, we will measure “ the human factor ” and what it means to digital security.

The survey of the human race has been an on-going procedure since the beginning of clip. In recent decennaries as the digital age began, there has been much to make about computing machines, the cyberspace, and the sharing of information over practical webs. Not excessively long after information began fluxing between computing machines and across the universe, the issue of the security and privateness of information exchange became a concern. Soon digital tools were being built to assist maintain unwanted cyberspace users out and of import information in. One would believe that a web ‘s security would be sufficient plenty to protect our informations. If it were n’t for human interaction with webs, this would be true. [ 1 ] That is why the subject of “ the human factor ” is so interesting. Many have looked past the most obvious perpetrator of the loss of informations unity. Workman et al. referred to this phenomenon as the “ knowing-doing spread ” . Their research shows that even though people are cognizant of harmful security menaces, they fail to move with cautiousness and persons and corporations accordingly lose one million millions of dollars per twelvemonth. “ An of import inquiry so is why do people who are cognizant of IS security menaces and countermeasures neglect to implement them? “ [ 2 ] That in itself is a perplexing inquiry and demonstrates that “ the human factor ” is of import and should be addressed.

We will write a custom essay sample on
The digital security Essay
or any similar topic only for you
Order now

Bruce Schneier, the writer of Secrets & A ; Lies, refers to “ the human factor ” as the weakest nexus that has emerged from the information security kingdom. The engineerings to protect computing machines from viruses and hackers have gotten progressively robust in recent old ages. Ironically nevertheless, the jobs with hackers and malware have besides increased. [ 3 ] Steven Lohr of the New York Times reported that, “ In a study of 443 companies and authorities bureaus published last month, the Computer Security Institute found that 64 per centum reported malware infections, up from 50 per centum the old twelvemonth. ” Lohr besides noted that a bulk of these security breaches are attributed to employees. It is either a deficiency of preparation to cognize how to place menaces or a feeling on the portion of the employees that they would ne’er be the mark for a hacker. [ 4 ]

Even with sophisticated security applications, compulsory period watchword alterations, and employee preparation, there are ever new fast ones being developed by hackers. One such manner that these hackers gain entree is by go forthing a USB thrust in the parking batch of their targeted corporation. A funny employee will so take the USB interior and link it to a computing machine in the corporation ‘s web, unwittingly opening the floodgates for malware. Employees need to be made cognizant of the function that they play in maintaining information in the right custodies. Another large development that is deserving mentioning is the use of cell phones to derive entree to utile information. Hackers can literally take control of an ignorant individual ‘s phone to turn it into a “ surveillance ” device. While a hacker is a safe distance from the victim, they are garnering information and working them. By commanding these personal devices, people are incognizant that private information is being shared with more people than they ab initio intended. [ 5 ]

When it comes to the subject of web security, there are few people that can state that their complacence has non been used against them. Carelessness is one of the largest perpetrators of security issues. The “ Human Factor ” of internet security is such an of import subject because it has the ability to impact everyone that comes into contact with a computing machine web. I am no exclusion and can believe of many different occasions when I have let my guard down and risked the unity of my machine. The first virus I received was a direct consequence of being excessively swearing. I clicked on a nexus that was sent to me through a friends AOL instant courier name. I trusted that the nexus did non incorporate a virus because it was sent from a friend. Unfortunately I did non recognize that a virus itself could hold used my friend ‘s computing machine to direct me that nexus. Average people utilizing instant courier are non the lone group of people that hackers target. In fact, another topographic point where I have run into people seeking to work the human component is at one of the universe ‘s largest companies General Electric. While working at General Electric I, along with several other employees, received an electronic mail from person claiming to be a human resources director. This individual claimed that they needed me to supply them with employee inside informations to guarantee that everyone was being paid decently. After farther review I realized that the electronic mail was from a beginning outside of General Electric and gratefully reported it to the proper governments. Had I sent this con creative person any personally identifiable information, they could hold used the information for any figure of things such as personal or pecuniary addition. This reminded me of something Ian Mann, the writer of Choping the Human says, “ In many instances a few mouse chinks can direct confidential information heterosexual from the user to the aggressor via an electronic mail. “ [ 6 ]

Even the strongest security system is compromised if users send confidential information to the individual seeking to steal it ( deliberately or non ) . It merely takes a few chinks to do a security system useless. As antecedently mentioned, with security package going more advanced, hackers have thought up new and originative ways to outwit these advanced security tools. The manner to acquire around these new steps is by working the weakest portion of a security cyberspace ; the homo. A good illustration is that of the brassy thrust strategy that was highlighted before in this treatment. One can non deny that it is going tougher and tougher to maintain hackers out. [ 7 ]

Now that we have discussed a few of the fast ones hackers have been using as a means to come in corporate computing machine webs, we now need to inquire the most of import inquiry ; What is the overall impact of these hackers and what can be done to restrict the harm that they do? Hackers cost companies one million millions of dollars a twelvemonth in entire losingss. [ 8 ] In fact each successful onslaught costs a company 120,000 Euros. That is the cost of an full house! Research has overpoweringly shown that preparation and instruction for employees is imperative. Updated and current tendencies need to be administered and proving demands to be done internally. Most big companies realize this and hold begun to learn computing machine security as portion of their confidential information categories. Unfortunately you ca n’t be certain that your employees are larning anything for these categories. So to guarantee that all of this information is being put to utilize, you besides need to look into that your employees are non being hap jeopardy with watchwords and other of import information. To carry through this many fortune 500 companies have created squads to do certain employees are following all appropriate processs. These squads use a figure of different techniques to carry through this occupation. One of the most common techniques is known as a desk audit. To execute desk audits the security squad will travel to employee ‘s desks and look into for watchwords, societal security Numberss, and other information that a hacker could utilize to their advantage. If they do happen any of these sensitive paperss the employee is reprimanded. Although this helps to relieve the job it is far from the lone thing that needs to be done. Another attack utilized by these security squads is implementing techniques that hackers use such as spoofing and phishing look intoing to see if they can flim-flam employees. To guarantee that a hacker will non be effectual in stealing information from the company you have to more or less act as a hacker. That manner they will cognize the current province of security and who is and who is non following protocol. [ 9 ]

So what are other steps that companies can take to do certain that their employees are non the 1s leting the hackers to acquire sensitive information? They need to turn to the six facets of the human job: How people perceive hazards, How people deal with things that happen really seldom, The job of users swearing computing machines, and why that can be so unsafe, The futility of inquiring people to do intelligent security determinations, The dangers of malicious insiders, Social technology, and why it is so easy for an aggressor to merely inquire for secret information ( the book add footer ) . Merely after they have addressed each of these issues with each of their employees can they truly consider themselves safe. Until so worlds will go on to be the weakest like of any security system.

Now it is clear that worlds are frequently the weakest nexus in any security onslaught. If they do non understand computing machines or what is at hazard, they can lose companies 1000000s of dollars in mere seconds. Besides this job is non traveling off anytime shortly as security package improves hackers will look more and more for careless worlds as a manner to come in the web. Equally long as computing machines and people interact this is traveling to be a hot subject. Companies must remain in front of the curve and invariably anticipate security menaces.

  1. Panchev, Deyan P. ( 2008 ) . Cisco based end-user web security. Proceedings of the International Conference on Information Technologies, 1 ( Sept. 2008 ) , 33-38.
  2. Bommer, W.H. , Straub, D. , & A ; Workman, M. ( 2008 ) . Security oversights and the skip of information security steps: A menace control theoretical account and empirical trial. Computers in Human Behavior, 24 ( 2008 ) , 2799-2816.
  3. Schneier, B. ( 2004 ) . Secrets & A ; lies: Digital security in a networked universe. Indianapolis, Indiana: Wiley Publishing, Inc.
  4. Lohr, S. ( 2010, January 18 ) . Companies fight eternal war against computing machine onslaughts. The New York Times, pp. B1.
  5. Lohr, S. ( 2010, January 18 ) . Companies fight eternal war against computing machine onslaughts. The New York Times, pp. B1.
  6. Mann, I. ( 2008, January – February ) . Choping the human. Engineering & A ; Technology, January- February, 62-63.
  7. Lohr, Steve ( 2010, January 18 ) . Companies fight eternal war against computing machine onslaughts. The New York Times, pp. B1.
  8. BBC News. ( 2004 ) Retrieved March 16, 2010, from hypertext transfer protocol: //news.bbc.co.uk/2/hi/business/3663333.stm
  9. Panchev, Deyan P. ( 2008 ) . Cisco based end-user web security. Proceedings of the International Conference on Information Technologies, 1 ( Sept. 2008 ) , 33-38.


×

Hi there, would you like to get such a paper? How about receiving a customized one? Check it out