Technical and Human Issues in Computer-Based Systems Security

نویسنده

  • Denis Besnard
چکیده

Computer systems and internet are becoming pervasive in our everyday life. Being online brings the consequence that such systems are prone to malicious attack. This vulnerability, along with our reliance on these systems, implies that it is important for us to do our best in securing them to ensure their proper functioning. In this paper, we are trying to tackle the security issues from both technical and human perspectives. From this dual standpoint, we hope to obtain a better understanding on how computer attacks are performed, including how to gain illicit access, the types of attacks, as well as the potential damage that they can cause. We also uncover sociological and psychological traits of the attackers, including their community, taxonomy, motives and work ethics. This survey paper will not provide a concrete solution on how to secure computer systems, but it highlights the socio-technical approach that we must take in order to obtain that goal.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

A Literature Review on Cloud Computing Security Issues

The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...

متن کامل

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

Assessing the Security Status of Picture Archiving and Communication Systems (PACS) of Kerman University of Medical Sciences to Record Data of COVID-19 Patients

Introduction: Today, the use of picture archiving and communication system (PACS) in health care centers is increasing. Meanwhile, the security of data of patients with COVID-19 in this system and control of access to such data is considerably significant. Therefore, this study aimed to evaluate the security of medical picture archiving and communication systems for recording data of COVID-19 p...

متن کامل

Assessing the Security Status of Picture Archiving and Communication Systems (PACS) of Kerman University of Medical Sciences to Record Data of COVID-19 Patients

Introduction: Today, the use of picture archiving and communication system (PACS) in health care centers is increasing. Meanwhile, the security of data of patients with COVID-19 in this system and control of access to such data is considerably significant. Therefore, this study aimed to evaluate the security of medical picture archiving and communication systems for recording data of COVID-19 p...

متن کامل

عوامل موثر بر پذیرش فناوری اطلاعات در محیط بالینی از دیدگاه پرستاران

 Background and Aim: Information technology acceptance model predicts acceptance based on end-users' perceived usefulness and ease of use of technology for a specific purpose. The aim of this study is to understand nursing staff’s adoption of clinical information systems based on information technology acceptance model.  Materials and Methods: This descriptive- analytic study was conducted on 3...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003