2020
DOI: 10.3844/jcssp.2020.321.329
|View full text |Cite
|
Sign up to set email alerts
|

Assessing Information Security Vulnerabilities and Threats to Implementing Security Mechanism and Security Policy Audit

Abstract: In spite of the massive investment of money, time and efforts an organization devotes to growth and enhancement with continuous improvements of a sound information security strategy, the human factor is ultimately and eventually the one behind the keyboard. As a result, human beings remain the most vulnerable and weakest entity in the information security chain. A negligent and irresponsible in-house employee can be a threat even to the most breath-tight secure environment, an organization built to keep intrud… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(1 citation statement)
references
References 10 publications
0
1
0
Order By: Relevance
“…Basic requirements for strong passwords. Uncontrolled use of passwords increases the risk of unauthorized access to information, fraudulent and other actions that can cause material damage and damage to the reputation of the enterprise [12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%
“…Basic requirements for strong passwords. Uncontrolled use of passwords increases the risk of unauthorized access to information, fraudulent and other actions that can cause material damage and damage to the reputation of the enterprise [12][13][14][15][16].…”
Section: Introductionmentioning
confidence: 99%