[go: up one dir, main page]

Bruggen, 2014 - Google Patents

Studying the impact of security awareness efforts on user behavior

Bruggen, 2014

View PDF
Document ID
11900835823141510731
Author
Bruggen D
Publication year

External Links

Snippet

Security has long been a technical problem with technical solutions. Over time, it has become apparent that human behavior is a major weakness in technical solutions. Extensive efforts have been taken to inform individuals about the threats and safeguards …
Continue reading at curate.nd.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2133Verifying human interaction, e.g., Captcha
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2143Clearing memory, e.g. to prevent the data from being stolen

Similar Documents

Publication Publication Date Title
Zwilling et al. Cyber security awareness, knowledge and behavior: A comparative study
Van Bruggen et al. Modifying smartphone user locking behavior
Lowry et al. An integrative theory addressing cyberharassment in the light of technology-based opportunism
Distler et al. A systematic literature review of empirical methods and risk representation in usable privacy and security research
Posey et al. The impact of organizational commitment on insiders’ motivation to protect organizational information assets
D'Arcy et al. User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
Crossler et al. An extended perspective on individual security behaviors: Protection motivation theory and a unified security practices (USP) instrument
Akhgar et al. Cyber crime and cyber terrorism investigator's handbook
Bruggen Studying the impact of security awareness efforts on user behavior
Nguyen et al. A comparison of features in a crowdsourced phishing warning system
Ashenden et al. Can we sell security like soap? A new approach to behaviour change
Ammar Cyber Gremlin: social networking, machine learning and the global war on Al-Qaida-and IS-inspired terrorism
Banfield A study of information security awareness program effectiveness in predicting end-user security behavior
Alhasan Human factors in cybersecurity: A cross-cultural study on trust
Anti et al. Explanations of insider deviant behavior in information security: a systematic literature review
Black et al. Insider Threat and White Collar Crime in Non-Government Organisations and Industries
Das Social Cybersecurity: Reshaping Security Through An Empirical Understanding of Human Social Behavior.
Kuraku Curiosity Clicks: The Need for Security Awareness
Yeo Unintentional insider threat assessment framework: Examining the human security indicators in healthcare cybersecurity
Dorasamy et al. Cybersecurity issues among working youths in an iot environment: A design thinking process for solution
Mark An analysis of factors influencing phishing threat avoidance behavior: a quantitative study
Jamil Factors affecting users cybersecurity practices: A study of Australian microbusinesses
Bhattacharya Leadership styles and information security in small businesses: An empirical investigation
Murphy A quantitative study using the protection motivation theory to examine information protection awareness in a healthcare organization
Schneider Customized Cybersecurity Awareness Training: Addressing the Human Factor