Towards using pervasive information security education to influence information security behaviour in undergraduate computing graduates
نویسندگان
چکیده
Information security has become increasingly important and is far more than a collection of physical and technical controls. It is widely cited in literature that humans are potentially the ‘weakest link’ when it comes to information security, whether intentionally or unintentionally. For information security to be truly effective, the behaviour and actions of users, with regard to information security, should become part of their daily activities and, ultimately, part of an information security culture. Therefore, it could be argued that graduates entering the employment of an organisation should be aware and properly educated with regard to information security and its related practices. This information security awareness and education should, preferably, be a part of their formalized studies. This is particularly important for those graduates with computing qualifications as they could play a vital role in ensuring the protection of an organisation’s information assets. This paper motivates the need for the implementation of pervasive information security education in computing undergraduate curricula, which could positively influence the information security behaviour of computing graduates. This research is based on a literature study.
منابع مشابه
An Educators Perspective of Integrating Information Security into Undergraduate Computing Curricula
Information is an integral part of our everyday lives and organisations need to have their information and related systems protected from various threats that exist. Therefore, information security education is of vital importance to all computing learners. It is the duty of higher education institutions to ensure that information security is pervasively integrated into the undergraduate comput...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملCAMAC: a context-aware mandatory access control model
Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کامل