Cyber Security

Read Complete Research Material

CYBER SECURITY

Affect on Cyber Security by Human Vulnerabilities

Affect on Cyber Security by Human Vulnerabilities

Introduction

Systems are operated by humans and with the advancement of technologies, systems are becoming more and more secure. On the other hand the progress of level of human intellect required to run secure system has not kept the pace. Although the number of people with the ability to run the computer systems have increased but operating a system and being smart to protect ones end of console requires a level of intelligence of computer systems and some basic common sense. The human induce unknowingly numerous threats which can cripple a well secure system. People use personal USBs at office, connect their cell phones to office computers, integrate their office with personal activities online etc all posses an ever growing threat to the security of the system. The computerization and the availability of this technology to the masses has complicated the process of security as a careless home user can lead to the security compromise of the entire system at office if the issues have not been addressed. We will be looking at the core of the problem which puts the security of the entire system at the behest of its users. Some measures which an organization can take to reduce their security dependence on the users of the system will be reviewed.

Threat and its Causes

Two decades ago the knowledge related to the use of computer and information technology was restricted to limited few professional. Today the people who are not utilizing the computer in the modern societies represent that number. Most of the businesses in the UK are utilizing the technology of the ICT and almost 60% homes have personal computers (Sasse et al., 2009). Now with the advancement of cell phone technology, most are roaming around with a mini computer in their pocket connected with their social websites. The speed of technology development and becoming user friendly has been phenomenal but the gap of knowledge and use of this technology has widened. People lack the knowledge of efficient use to these technologies and especially have severe deficiency in the awareness of computer security. This gap is not only effecting people but also casting its shadow on the businesses and organizations. The reason is worsened as the people who are responsible for making building and design IT systems and supply of technology don't understand the implications of their decisions on the security of the systems.

The variety and number of threats for interconnected systems is rapidly increasing, and with it the security measures number. Little or no consideration of the impact on individuals is given with most security mechanisms are currently selected to protect the technology (Securelist, 2010). It multiplies the affect of increase complexity of system. Numerous systems put additional workload on the people using it. Asking passwords after few minutes, changing of pin codes and carrying of security keys, and with every online service need login, people get tired of fulfilling these requirements and make ...
Related Ads