Publikace UTB
Repozitář publikační činnosti UTB

Human factor: The weakest link of security?

Repozitář DSpace/Manakin

Zobrazit minimální záznam


dc.title Human factor: The weakest link of security? en
dc.contributor.author Jašek, Roman
dc.contributor.author Sarga, Libor
dc.relation.ispartof Proceedings of the 13th European Conference on Cyber Warfare and Security (ECCWS-2014)
dc.identifier.isbn 978-1-910309-24-7
dc.date.issued 2014
utb.relation.volume 2014-January
dc.citation.spage 317
dc.citation.epage 326
dc.event.title 13th European Conference on Cyber Warfare and Security (ECCWS)
dc.event.location Piraeus
utb.event.state-en Greece
utb.event.state-cs Řecko
dc.event.sdate 2014-07-03
dc.event.edate 2014-07-04
dc.type conferenceObject
dc.language.iso en
dc.publisher Academic Conferences Ltd.
dc.subject research en
dc.subject study en
dc.subject questionnaire en
dc.subject BYOD en
dc.subject password en
dc.subject security en
dc.description.abstract Human element plays a critical role in cyberwarfare scenarios: a malicious adversary can launch targeted social engineering campaigns to gain unfettered access to sensitive electronic resources, establish unauthorized system persistence, and use the compromised host as a stepping stone for further exploitation, incorporating it into a botnet of controlled nodes. As hardware and software infrastructure protection efforts result in increasingly resilient systems, focus on end-users who constitute a security vulnerability can be expected to increase in the future. However, password database leaks, effectiveness of social engineering, and bring your own device (BYOD) trends in organizations all raise concerns as to the security competencies the general population possess. In the article, we present results of a large-scale questionnaire study pertaining to security habits and BYOD practices of more than 700 participants conducted in the Czech Republic during the period of September-December 2013. Ranging from a preferred operating system to password selection rationale, the answers should be a representative cross-section of how an "average" user maintains their electronic identity online. The snapshot provides valuable insights and actionable intelligence based on which information and communication technology policies in organizations can be modified to better accommodate the patterns discovered. The article maps current state of selected aspects of security in increasingly interconnected, technology-driven global structures where electronic identities supplement real-world ones and their compromise results in significant negative consequences. en
utb.faculty Faculty of Applied Informatics
dc.identifier.uri http://hdl.handle.net/10563/1005709
utb.identifier.obdid 43871489
utb.identifier.scopus 2-s2.0-84991238163
utb.identifier.wok 000361692300039
utb.source d-wok
dc.date.accessioned 2015-11-05T11:27:38Z
dc.date.available 2015-11-05T11:27:38Z
utb.contributor.internalauthor Jašek, Roman
utb.contributor.internalauthor Sarga, Libor
utb.fulltext.affiliation Roman Jasek, Libor Sarga Tomas Bata University in Zlín, Zlín, Czech Republic jasek@fai.utb.cz sarga@fame.utb.cz
utb.fulltext.dates -
Find Full text

Soubory tohoto záznamu

Zobrazit minimální záznam