Human behaviour as an aspect of cybersecurity assurance

被引:58
作者
Evans, Mark [1 ]
Maglaras, Leandros A. [1 ]
He, Ying [1 ]
Janicke, Helge [1 ]
机构
[1] De Montfort Univ, Sch Comp Sci & Informat, Leicester, Leics, England
关键词
cybersecurity assurance; information security management; human factors; human reliability assesment;
D O I
10.1002/sec.1657
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There continue to be numerous breaches publicised pertaining to cybersecurity despite security practices being applied within industry for many years. This paper is intended to be the first in a number of papers as research into cybersecurity assurance processes. This paper is compiled based on current research related to cybersecurity assurance and the impact of the human element on it. The objective of this work is to identify elements of cybersecurity that would benefit from further research and development based on the literature review findings. The results outlined in this paper present a need for the cybersecurity field to look in to established industry areas to benefit from effective practices such as human reliability assessment, along with improved methods of validation such as statistical quality control in order to obtain true assurance. The paper proposes the development of a framework that will be based upon defined and repeatable quantification, specifically relating to the range of human aspect tasks that provide or are intended not to negatively affect cybersecurity assurance. Copyright (C) 2016 John Wiley & Sons, Ltd.
引用
收藏
页码:4667 / 4679
页数:13
相关论文
共 35 条
  • [1] [Anonymous], 2015, 2015 INF SEC BREACH
  • [2] [Anonymous], EXPL TERMS GLOSS COM
  • [3] [Anonymous], 2009, INFORM SECURITY MANA
  • [4] Aytes K., 2004, Journal of Organizational and End User Computing, V16, P22, DOI 10.4018/joeuc.2004070102
  • [5] Big Brother Watch, 2014, NHS DAT BREACH
  • [6] British Standards Institution, 270012013 BS ISOIEC
  • [7] FRAMING THE FRAMEWORKS: A REVIEW OF IT GOVERNANCE RESEARCH
    Brown, Allen E.
    Grant, Gerald G.
    [J]. COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2005, 15 : 696 - 712
  • [8] Cabinet Office, 2011, COST CYB CRIM STUD 2
  • [9] CESG, 2012, GOOD PRACT GUID 30 A
  • [10] Cherdantseva Yulia, 2013, 2013 International Conference on Availability, Reliability and Security (ARES), P546, DOI 10.1109/ARES.2013.72