Proceedings of the 33rd Annual Computer Security Applications Conference 2017
DOI: 10.1145/3134600.3134629
|View full text |Cite
|
Sign up to set email alerts
|

I Like It, but I Hate It

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(4 citation statements)
references
References 35 publications
0
4
0
Order By: Relevance
“…Botnets such as Mirai produce massive DoS attacks against key internet service providers and disrupt service to millions of internet users. 5 It is also possible that an attacker could intercept and block traffic to a PEP or PA from a portion or all of the user accounts within an enterprise (e.g., a branch office or even a single remote employee). In such cases, only a portion of enterprise subjects is affected.…”
Section: Denial-of-service or Network Disruptionmentioning
confidence: 99%
“…Botnets such as Mirai produce massive DoS attacks against key internet service providers and disrupt service to millions of internet users. 5 It is also possible that an attacker could intercept and block traffic to a PEP or PA from a portion or all of the user accounts within an enterprise (e.g., a branch office or even a single remote employee). In such cases, only a portion of enterprise subjects is affected.…”
Section: Denial-of-service or Network Disruptionmentioning
confidence: 99%
“…Botnets such as Mirai produce massive DoS 1091 attacks against key internet service providers and disrupt service to millions of internet users. 5 It is also possible that an attacker could intercept and block traffic to a PEP or PA from a portion or all of the user accounts within an enterprise (e.g., a branch office or even a single remote employee). In such cases, only a portion of enterprise users is affected.…”
Section: Denial-of-service or Network Disruptionmentioning
confidence: 99%
“…Security fatigue [3] is the phenomenon wherein end users are confronted with so many security policies and challenges that it begins to impact their productivity in a negative way. Other studies show that MFA may alter user behavior, but the overall change is mixed [4] [5]. Some users readily accept MFA if the process is streamlined and involves devices they are used to using or having with them (e.g., applications on a smartphone).…”
mentioning
confidence: 99%
“…Security fatigue [3] is the phenomenon wherein end users are confronted with so many security policies and challenges that it begins to impact their productivity in a negative way. Other studies show that MFA may alter user behavior, but the overall change is mixed [4] [5]. Some users readily accept MFA if the process is streamlined and involves devices they are used to using or having with them (e.g., apps on a smartphone).…”
Section: B46mentioning
confidence: 99%