2016
DOI: 10.18178/ijssh.2016.v6.761
|View full text |Cite
|
Sign up to set email alerts
|

IT Security Trust Model - Securing the Human Perimeter

Abstract: Abstract-There are numerous technical advances in the field of Information Security (IS). Despite the application of these IS technological controls, it is often not enough to address security issues due to the vulnerable human component. With a considerable amount of support in literature, there is no doubt that the human factor is a major weakness in preventing IS breaches. The true level of security in technology and process relies on the people involved in its use and implementation. Thus, human factors pl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 31 publications
0
2
0
Order By: Relevance
“…Finally, from the perspective of the delivery path, we identify two main views for an organization security perimeter: the logical and the physical view. The human fact is a key piece in security that has been largely analyzed [59][60][61], and some even works [62][63][64] define a human perimeter for organizations. However, we will focus on the logical and physical perimeters: although many delivery techniques, such as spear phishing, rely on human vulnerabilities, the delivery itself has to be performed, breaking a logical or a physical protection.…”
Section: Our Proposalmentioning
confidence: 99%
“…Finally, from the perspective of the delivery path, we identify two main views for an organization security perimeter: the logical and the physical view. The human fact is a key piece in security that has been largely analyzed [59][60][61], and some even works [62][63][64] define a human perimeter for organizations. However, we will focus on the logical and physical perimeters: although many delivery techniques, such as spear phishing, rely on human vulnerabilities, the delivery itself has to be performed, breaking a logical or a physical protection.…”
Section: Our Proposalmentioning
confidence: 99%
“…Finally, from the perspective of the delivery path, we identify two main views for an organization security perimeter: the logical and the physical view. The human fact is a key piece in security that has been largely analyzed [36,147,240], and some even works [44,600,639] define a human perimeter for organizations. However, we will focus on the logical and physical perimeters: although many delivery techniques, such as spear phishing, rely on human vulnerabilities, the delivery itself has to be performed, breaking a logical or a physical protection.…”
Section: Our Proposalmentioning
confidence: 99%