Out to explore the cybersecurity planet

被引:2
|
作者
Bella, Giampaolo [1 ]
机构
[1] Univ Catania, Dipartimento Matemat & Informat, Catania, Italy
关键词
Computer security; Computer privacy; Socio-technical security; PSYCHOLOGY;
D O I
10.1108/JIC-05-2019-0127
中图分类号
F [经济];
学科分类号
02 ;
摘要
Purpose Security ceremonies still fail despite decades of efforts by researchers and practitioners. Attacks are often a cunning amalgam of exploits for technical systems and of forms of human behaviour. For example, this is the case with the recent news headline of a large-scale attack against Electrum Bitcoin wallets, which manages to spread a malicious update of the wallet app. The author therefore sets out to look at things through a different lens. Design/methodology/approach The author makes the (metaphorical) hypothesis that humans arrived on Earth along with security ceremonies from a very far planet, the Cybersecurity planet. The author's hypothesis continues, in that studying (by huge telescopes) the surface of Cybersecurity in combination with the logical projection on that surface of what happens on Earth is beneficial for us earthlings. Findings The author has spotted four cities so far on the remote planet. Democratic City features security ceremonies that allow humans to follow personal paths of practice and, for example, make errors or be driven by emotions. By contrast, security ceremonies in Dictatorial City compel to comply, hence humans here behave like programmed automata. Security ceremonies in Beautiful City are so beautiful that humans just love to follow them precisely. Invisible City has security ceremonies that are not perceivable, hence humans feel like they never encounter any. Incidentally, the words "democratic" and "dictatorial" are used without any political connotation. Originality/value A key argument the author shall develop is that all cities but Democratic City address the human factor, albeit in different ways. In the light of these findings, the author will also discuss security ceremonies of our planet, such as WhatsApp Web login and flight boarding, and explore room for improving them based upon the current understanding of Cybersecurity.
引用
收藏
页码:291 / 307
页数:17
相关论文
共 50 条
  • [2] Demythifying Cybersecurity
    Talbot, Edward B.
    Frincke, Deborah
    Bishop, Matt
    IEEE SECURITY & PRIVACY, 2010, 8 (03) : 56 - 59
  • [3] Cybersecurity Education Insights From a Novel Cybersecurity Summer Workshop
    Crabb, James
    Izurieta, Clemente
    Van Wie, Bernard
    Adesope, Olusola
    Gebremedhin, Assefaw
    IEEE SECURITY & PRIVACY, 2024, 22 (06) : 89 - 98
  • [4] Humans in the Loop: Cybersecurity Aspects in the Consumer IoT Context
    Rohan, Rohani
    Funilkul, Suree
    Pal, Debajyoti
    Thapliyal, Himanshu
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2022, 11 (04) : 78 - 84
  • [5] Teaching Cybersecurity with DeterLab
    Mirkovic, Jelena
    Benzel, Terry
    IEEE SECURITY & PRIVACY, 2012, 10 (01) : 73 - 76
  • [6] Blockchain, Cryptocurrency, and Cybersecurity
    Andriole, Stephen J.
    IT PROFESSIONAL, 2020, 22 (01) : 13 - 16
  • [7] Impact of xG on Cybersecurity
    Rajabion, Lila
    Unhelkar, Bhuvan
    IT PROFESSIONAL, 2023, 25 (03) : 30 - 35
  • [8] A Cybersecurity Educated Community
    Ahmad, Norita
    Laplante, Phillip A.
    DeFranco, Joanna F.
    Kassab, Mohamad
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2022, 10 (03) : 1456 - 1463
  • [9] A Primer on Cybersecurity for Physicians
    Lea, Nathan C.
    De Meyer, Filip
    ACTA MEDICA PORTUGUESA, 2019, 32 (09): : 563 - 564
  • [10] Recent Advances on Federated Learning for Cybersecurity and Cybersecurity for Federated Learning for Internet of Things
    Ghimire, Bimal
    Rawat, Danda B.
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (11) : 8229 - 8249