Human behaviour as an aspect of cybersecurity assurance
نویسندگان
چکیده
There continue to be numerous breaches publicised pertaining to cyber security despite security practices being applied within industry for many years. This article is intended to be the first in a number of articles as research into cyber security assurance processes. This article is compiled based on current research related to cyber security assurance and the impact of the human element on it. The objective of this work is to identify elements of cyber security that would benefit from further research and development based on the literature review findings. The results outlined in this article present a need for the cyber security field to look in to established industry areas to benefit from effective practices such as human reliability assessment, along with improved methods of validation such as statistical quality control in order to obtain true assurance. The article proposes the development of a framework that will be based upon defined and repeatable quantification, specifically relating to the range of human aspect tasks that provide, or are intended not to negatively affect cyber security posture.
منابع مشابه
Devising Game-changing Approaches to Cybersecurity’s Hard Problems
depend on the technologies that implement cyberspace. Secure systems must be dependable, and dependable systems fail if not secured. Unreliable software is inherently insecure. Unfortunately, cybersecurity practice and policy are largely heuristic, reactive, and increasingly cumbersome, struggling to keep pace with rapidly evolving threats. Advancing beyond this predominantly reactive posture w...
متن کاملTwo Nationally Sponsored Initiatives for Disseminating Assurance Knowledge
Education in software assurance is an essential element in the effort to produce secure code. This paper describes two efforts that support national cybersecurity education goals: development of software assurance learning artifacts that can be integrated into conventional learning environments and development of a master of software assurance reference curriculum. SOFTWARE DEFENSE APPLICATION ...
متن کاملThe Third Offset and a Fifth Domain? Balancing Game-Changing Innovation and Cyber Risk Mitigation
Cyber has changed the scope of the Navy’s mission and is placing new strains on our diplomatic, warfighting, legal, and economic/budgetary processes. Cybersecurity processes and techniques are increasingly critical to our warfighting missions, but they can also inhibit the pace and potential for high impact, game-changing innovation. Throughout its history, the Navy has shown the ability of inn...
متن کاملSecurityEmpire: Development and Evaluation of a Digital Game to Promote Cybersecurity Education
SecurityEmpire is a new multiplayer computer game to teach cybersecurity concepts to high school students. We describe the design and implementation of SecurityEmpire, explain how it teaches security concepts, share preliminary evaluative data from students and teachers, and describe our experiences with developing, fielding, and evaluating this educational game. SecurityEmpire challenges each ...
متن کاملFortifying Our Cyber Defenses
cyber defenses, the nation’s critical infrastructure is at risk. Everything we do as a nation—from national defense to re-energizing the economy—depends on secure information technology systems and networks. Increasingly, however, these software controlled and enabled systems are vulnerable to exploitation by those that seek to do our nation harm, steal our intellectual capital, or simply colle...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Security and Communication Networks
دوره 9 شماره
صفحات -
تاریخ انتشار 2016