首页> 外文会议>Americas Conference on Information Systems(AMCIS 2006) vol.6 >Personality and IT security: An application of the five-factor model
【24h】

Personality and IT security: An application of the five-factor model

机译:人格与IT安全:五因素模型的应用

获取原文

摘要

Despite numerous advances in IT security, many computer users are still vulnerable to security-related risks because they do not comply with organizational policies and procedures. In a network setting, individual risk can extend to all networked users. Endpoint security refers to the set of organizational policies, procedures, and practices directed at securing the endpoint of the network connections - the individual end user. As such, the challenges facing IT managers in providing effective endpoint security are unique in that they often rely heavily on end user participation. But vulnerability can be minimized through modification of desktop security programs and increased vigilance on the part of the system administrator or CSO. The cost-prohibitive nature of these measures generally dictates targeting high-risk users on an individual basis. It is therefore important to differentiate between individuals who are most likely to pose a security risk and those who will likely follow most organizational policies and procedures.
机译:尽管IT安全性取得了许多进步,但是许多计算机用户仍然不符合组织策略和程序,因此仍然容易遭受与安全性相关的风险。在网络环境中,个人风险可以扩展到所有联网的用户。端点安全性是指旨在保护网络连接的端点(单个最终用户)的一组组织策略,过程和实践。因此,IT经理在提供有效的端点安全性方面面临的挑战是独特的,因为它们通常严重依赖于最终用户的参与。但是可以通过修改桌面安全程序和提高系统管理员或CSO的警惕性来最大程度地降低漏洞。这些措施的成本禁止性质通常要求针对个别高风险用户。因此,重要的是要区分最有可能构成安全风险的个人和可能遵循大多数组织策略和程序的个人。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号