Kontaktujte nás | Jazyk: čeština English
dc.title | Human factor: The weakest link of security? | en |
dc.contributor.author | Jašek, Roman | |
dc.contributor.author | Sarga, Libor | |
dc.relation.ispartof | Proceedings of the 13th European Conference on Cyber Warfare and Security (ECCWS-2014) | |
dc.identifier.isbn | 978-1-910309-24-7 | |
dc.date.issued | 2014 | |
utb.relation.volume | 2014-January | |
dc.citation.spage | 317 | |
dc.citation.epage | 326 | |
dc.event.title | 13th European Conference on Cyber Warfare and Security (ECCWS) | |
dc.event.location | Piraeus | |
utb.event.state-en | Greece | |
utb.event.state-cs | Řecko | |
dc.event.sdate | 2014-07-03 | |
dc.event.edate | 2014-07-04 | |
dc.type | conferenceObject | |
dc.language.iso | en | |
dc.publisher | Academic Conferences Ltd. | |
dc.subject | research | en |
dc.subject | study | en |
dc.subject | questionnaire | en |
dc.subject | BYOD | en |
dc.subject | password | en |
dc.subject | security | en |
dc.description.abstract | Human element plays a critical role in cyberwarfare scenarios: a malicious adversary can launch targeted social engineering campaigns to gain unfettered access to sensitive electronic resources, establish unauthorized system persistence, and use the compromised host as a stepping stone for further exploitation, incorporating it into a botnet of controlled nodes. As hardware and software infrastructure protection efforts result in increasingly resilient systems, focus on end-users who constitute a security vulnerability can be expected to increase in the future. However, password database leaks, effectiveness of social engineering, and bring your own device (BYOD) trends in organizations all raise concerns as to the security competencies the general population possess. In the article, we present results of a large-scale questionnaire study pertaining to security habits and BYOD practices of more than 700 participants conducted in the Czech Republic during the period of September-December 2013. Ranging from a preferred operating system to password selection rationale, the answers should be a representative cross-section of how an "average" user maintains their electronic identity online. The snapshot provides valuable insights and actionable intelligence based on which information and communication technology policies in organizations can be modified to better accommodate the patterns discovered. The article maps current state of selected aspects of security in increasingly interconnected, technology-driven global structures where electronic identities supplement real-world ones and their compromise results in significant negative consequences. | en |
utb.faculty | Faculty of Applied Informatics | |
dc.identifier.uri | http://hdl.handle.net/10563/1005709 | |
utb.identifier.obdid | 43871489 | |
utb.identifier.scopus | 2-s2.0-84991238163 | |
utb.identifier.wok | 000361692300039 | |
utb.source | d-wok | |
dc.date.accessioned | 2015-11-05T11:27:38Z | |
dc.date.available | 2015-11-05T11:27:38Z | |
utb.contributor.internalauthor | Jašek, Roman | |
utb.contributor.internalauthor | Sarga, Libor | |
utb.fulltext.affiliation | Roman Jasek, Libor Sarga Tomas Bata University in Zlín, Zlín, Czech Republic jasek@fai.utb.cz sarga@fame.utb.cz | |
utb.fulltext.dates | - |