Strength and Weakness of Information Security: Human Nature

نویسنده

  • Phuong T. Tran
چکیده

In today’s society, information has become so readily and instantly available that the search engine, Google, has been incorporated into the English vernacular. With this explosive growth of information availability, however, comes increasing concern for security. Today’s information security systems are designed to be highly secure, yet information is leaked anyway, and many of these security failures lie in the human factor—in both creativity and negligence. In “The Psychology of Security,” West discusses the psychology of human risk assessment and why end users make bad security decisions. Humans will always be the weakest link in any information security system because we can create these systems, we can exploit any flaws in the creation of it, and we are imperfect and can be negligent. However, a study of psychology is not enough, at least not individual psychology as described by West. Humans are complex as individuals, but they become a different entity as a group. To study and model whole environments is necessary, as well as using both individual and organizational psychology and also quantitative system dynamics to help create security and privacy policies that adapt to dynamic environments and work with the security technologies today. Adaptability is the key because ultimately, no matter how tightly written and implemented security policies and features are, breaches due to human creativity or negligence can only be mitigated.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Strength and Weakness of Crisis Management in Hormozgan Medical University’s Hospitals

Background & Objective: Various communities continuously try to manage the unexpected events. In this regard, hospitals with providing timely health care services has transformed to the most pragmatic unit of health system. Planning and preparation of them should be strategic policy of health system. This paper aimed to investigate the strength and weakness of crisis management in training hosp...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Explaining The Territoriality Of Fundamentalist Organizations in Fragile States(Case Study: ISIS in Libya)

Fundamentalism is one of the security issues of today's world, and the Territorialize and , Territoriality of  fundamentalist terrorist groups has attracted a large part of the world's security literature.  Over the past decade, Southwest Asia and North Africa have emerged from domestic crises and transnational power interference, the focus of the emergence and expansion of radical ideas that i...

متن کامل

Developing a grounded-based model of tranquility in contemporary apartments in Urmia City

Introduction: Stressful life and lack of tranquility in modern society, have been serious problems for human life. Environmental psychology has shown that physical and architectural environments play an important role in this, and since the home is one of the most important environments, they try to offer solutions. This study tries to identify the factors that play an effective role in creatin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009