Human behaviour as an aspect of cybersecurity assurance

نویسندگان

  • Mark Evans
  • Leandros A. Maglaras
  • Ying He
  • Helge Janicke
چکیده

There continue to be numerous breaches publicised pertaining to cyber security despite security practices being applied within industry for many years. This article is intended to be the first in a number of articles as research into cyber security assurance processes. This article is compiled based on current research related to cyber security assurance and the impact of the human element on it. The objective of this work is to identify elements of cyber security that would benefit from further research and development based on the literature review findings. The results outlined in this article present a need for the cyber security field to look in to established industry areas to benefit from effective practices such as human reliability assessment, along with improved methods of validation such as statistical quality control in order to obtain true assurance. The article proposes the development of a framework that will be based upon defined and repeatable quantification, specifically relating to the range of human aspect tasks that provide, or are intended not to negatively affect cyber security posture.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Devising Game-changing Approaches to Cybersecurity’s Hard Problems

depend on the technologies that implement cyberspace. Secure systems must be dependable, and dependable systems fail if not secured. Unreliable software is inherently insecure. Unfortunately, cybersecurity practice and policy are largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this predominantly reactive posture w...

متن کامل

Two Nationally Sponsored Initiatives for Disseminating Assurance Knowledge

Education in software assurance is an essential element in the effort to produce secure code. This paper describes two efforts that support national cybersecurity education goals: development of software assurance learning artifacts that can be integrated into conventional learning environments and development of a master of software assurance reference curriculum. SOFTWARE DEFENSE APPLICATION ...

متن کامل

The Third Offset and a Fifth Domain? Balancing Game-Changing Innovation and Cyber Risk Mitigation

Cyber has changed the scope of the Navy’s mission and is placing new strains on our diplomatic, warfighting, legal, and economic/budgetary processes. Cybersecurity processes and techniques are increasingly critical to our warfighting missions, but they can also inhibit the pace and potential for high impact, game-changing innovation. Throughout its history, the Navy has shown the ability of inn...

متن کامل

SecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education

SecurityEmpire is a new multiplayer computer game to teach cybersecurity concepts to high school students. We describe the design and implementation of SecurityEmpire, explain how it teaches security concepts, share preliminary evaluative data from students and teachers, and describe our experiences with developing, fielding, and evaluating this educational game. SecurityEmpire challenges each ...

متن کامل

Fortifying Our Cyber Defenses

cyber defenses, the nation’s critical infrastructure is at risk. Everything we do as a nation—from national defense to re-energizing the economy—depends on secure information technology systems and networks. Increasingly, however, these software controlled and enabled systems are vulnerable to exploitation by those that seek to do our nation harm, steal our intellectual capital, or simply colle...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Security and Communication Networks

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2016