Essays about: "weakest-link"

Showing result 1 - 5 of 24 essays containing the word weakest-link.

  1. 1. The effect of time pressure on human behavior regarding phishing susceptibility : Human aspects in information security

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Muhammad Abbas Khan Abbasi; [2023]
    Keywords : Cybersecurity behavior; phishing susceptibility; cybersecurity awareness; time pressure; the human factor;

    Abstract : Human errors are common in the contemporary cyber ecosystem, and in an organization’s cybersecurity chain, humans are considered the weakest link. Cybercriminals exploit human vulnerabilities using sophisticated attacks such as phishing. READ MORE

  2. 2. Hack the Human : A qualitative research study exploring the human factor and social engineering awareness in cybersecurity and risk management among Swedish organizations.

    University essay from Jönköping University/IHH, Företagsekonomi

    Author : Isak Andersson; Liza Bjursell; Isak Palm; [2023]
    Keywords : Cybersecurity; risk management; social engineering; risk appetite;

    Abstract : Background: With the rapid advancements in technology, cybersecurity has become a topic of great importance. However, the weakest link in cybersecurity programs is mainly due to human error. READ MORE

  3. 3. The COVID-19 pandemic impact on Information Security Policy compliance in regional healthcare. : An empirical study

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Melker Fält; Bartlomiej Minierski; [2022]
    Keywords : Computer Science; Information Security Policy; Information Security Policy compliance; COVID-19 pandemic; Healthcare;

    Abstract : Information Security (InfoSec) is a broad term used to describe the study of how to protect sensitive data from unauthorized access, modification, or deletion. InfoSec is commonly used within companies and organisations to facilitate the secure use of digital systems, taking its shape in the form of technical solutions as well as rules and guidelines defined in a so-called Information Security Policy (ISP). READ MORE

  4. 4. Awareness-Raising and Prevention Methods of Social Engineering for Businesses and Individuals

    University essay from

    Author : Dominik Harth; Emanuel Duernberger; [2022]
    Keywords : IT security; social engineering; bypass security systems; ethics psychology; guidelines; phishing; human hacking; information security;

    Abstract : A system is only as secure as the weakest link in the chain. Humans are the binding link between IT (information technology) security and physical secu-rity. READ MORE

  5. 5. Phishing ecosystem : A Qualitative Analysis of Phishing Susceptibility in Employees Who Work from Home

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Joshua Scott; [2022]
    Keywords : work from home; WFH; email phishing; employees; situationism; situational;

    Abstract : In the wake of the coronavirus pandemic, work from home (WFH) has emerged as the new normal. Organizations continue to utilize some combination of telework and work from office (WFO) but tend to overlook the cybersecurity-related implications of such disruptive practices. READ MORE