An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data

ثبت نشده
چکیده

Standards bodies and industry organisations spend a considerable amount of time, effort and money on the development and deployment of next generation solutions that address network security issues. However it is becoming increasingly apparent that people are in fact the main weakness with regards to the protection of personal and sensitive data. This paper explores in detail the areas in which personal and sensitive data was socially engineered. The study investigated people’s attitudes to security, their risk taking ability and their awareness regarding online and offline security. The analysis supports the theory that the security of data is entirely dependent on the security awareness and knowledge of individuals. In addition the study revealed that students who had undertaken one or more security modules at University had a greater awareness of security vulnerabilities, yet had limited knowledge regarding social engineering exploits. The paper concludes that a number of individuals had little awareness and understanding regarding basic computer security and the need for such security. The results showed a distinct lack of respect and awareness amongst demographics in relation to online security and the security of others. These respondents were unaware of the potential consequences of disrespecting implemented security measures and as such were considered more vulnerable. The study also revealed that none of the respondents could correctly differentiate between a legitimate and illegitimate (Phishing) email which consequently increased the possibility of exploitation. In addition it was revealed that many individuals were making themselves increasingly vulnerable to social engineering attacks by posting personal and sensitive information on social networking websites.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Assessment of People’s Vulnerabilities in Relation to Personal and Sensitive Data

Social engineering refers to a number of techniques that are used to exploit human vulnerabilities and manipulate people into breaking normal security procedures. Evidence suggests that this problem is rapidly increasing and cyber criminals are using a magnitude of different avenues to reach their intended victims. This paper presents an assessment of people’s vulnerabilities in relation to per...

متن کامل

باورهای مذهبی دانشجویان پرستاری کارشناسی و ارتباط آن با میزان اضطراب آنان

  Background and Aim: Anxiety is a widespread human phenomenon accompanying the painful expectation of an undesirable event (1), and it’s a common response to tension, an unpleasant mental situation.   Stress and anxiety would result in hopelessness, lacking power, proficiency and control over life.   We can reduce the affects of anxiety by applying some methods. The research results, as an exa...

متن کامل

ارایه یک روش جدید انتشار داده‌ها با حفظ محرمانگی با هدف بهبود دقّت طبقه‌‌بندی روی داده‌های گمنام

Data collection and storage has been facilitated by the growth in electronic services, and has led to recording vast amounts of personal information in public and private organizations databases. These records often include sensitive personal information (such as income and diseases) and must be covered from others access. But in some cases, mining the data and extraction of knowledge from thes...

متن کامل

Calculating the amount of personal protection equipment’s (masks and gloves) and investigating Tehran's people knowledge about its management during the outbreak of COVID-19 (spring 2020)

Background and Objective: Changes in the quantity and quality of waste produced as a result of compliance with health protocols are the result of the COVID-19 outbreak. The present study aimed to determine the quantity of personal protection equipment produced in Tehran and people’s knowledge of its management. Materials and Methods: The present cross-sectional and descriptive-analytical study...

متن کامل

Assessment Methodology for Anomaly-Based Intrusion Detection in Cloud Computing

Cloud computing has become an attractive target for attackers as the mainstream technologies in the cloud, such as the virtualization and multitenancy, permit multiple users to utilize the same physical resource, thereby posing the so-called problem of internal facing security. Moreover, the traditional network-based intrusion detection systems (IDSs) are ineffective to be deployed in the cloud...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011