By Paul Kearney

This pocket consultant relies at the technique utilized by BT to guard its personal information safety - one who attracts at the services of either humans and expertise. The consultant will turn out worthwhile for IT managers, info defense officials and enterprise executives.

Show description

Read or Download Security The Human Factor PDF

Best kindle short reads books

Judgment Hill

A amazing and intricate portrait of a land and its humans in transition.

Conspicuous Consumption

All through historical past, a few books have replaced the realm. they've got reworked the best way we see ourselves ? and every different. they've got encouraged debate, dissent, struggle and revolution. they've got enlightened, outraged, provoked and comforted. they've got enriched lives ? and destroyed them. Now Penguin brings you the works of the good thinkers, pioneers, radicals and visionaries whose rules shook civilization and helped make us who we're.

Additional resources for Security The Human Factor

Example text

Examples include the controls in cars, aircraft cockpit design and the now-familiar WIMP (window, icon, menu, pointing) interface on computers. These are all the result of years of coevolution, whereby designers have responded to users’ experiences, and users have learned mental models that enable them to use the controls intuitively. The result is that a driver can adapt to a new car in seconds, and a Macintosh owner can grasp the basics of the Windows® interface without instruction. Unfortunately, we understand relatively little about what exactly it is about the way things are designed that increases – or reduces – the chance that users will accidentally do things that expose organisations to attack.

Gradually, the criminals learnt everything they needed to be able to transfer large sums of money into their accounts – user codes, passwords, customer account details, and so on. Fortunately, the authorities became aware of what was going on, and when wire transfers were attempted, they were blocked15. Even the security professionals who man IT helpdesks, find it hard to resist the pleas of damsels (and their male equivalents) in distress. stm. htm. 31 5: People are Helpful and Trusting away for a few days, and need to prepare something for an important meeting, but have forgotten their password, new ones get issued, so the callers can get whatever they need.

Design security in – Not just to your networks and applications, but into your systems, processes and culture. Provide backup – Make it easy for people to ask questions, report problems and get help. Monitor, review and refresh – Don’t rest on your laurels. New threats are always emerging, people slip back into old habits and training becomes stale. Define meaningful and varied measures of security performance, assess them regularly and take early action if performance starts slipping. 57 ITG RESOURCES IT Governance Ltd sources, creates and delivers products and services to meet the real-world, evolving IT governance needs of today’s organisations, directors, managers and practitioners.

Download PDF sample

Rated 4.36 of 5 – based on 46 votes