首页> 外文会议>International Workshop on Socio-Technical Aspects in Security >Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours
【24h】

Refining the Blunt Instruments of Cybersecurity: A Framework to Coordinate Prevention and Preservation of Behaviours

机译:完善网络安全的钝器:协调预防和保护行为的框架

获取原文

摘要

Background. Cybersecurity controls are deployed to manage risks posed by malicious behaviours or systems. What is not often considered or articulated is how cybersecurity controls may impact legitimate users (often those whose use of a managed system needs to be protected, and preserved). This oversight characterises the 'blunt' nature of many cybersecurity controls. Aim. Here we present a framework produced from a synthesis of methods from cybercrime opportunity reduction and behaviour change, and a consideration of existing risk management guidelines. Method. We illustrate the framework and its principles with a range of examples and a potential application focusing on online abuse and social media controls, relating in turn to issues inherent in cyberbullying and tech-abuse. Results. The framework describes a capacity to improve the precision of cybersecurity controls by examining shared determinants of negative and positive behaviours in a system. This identifies opportunities for risk owners to better protect legitimate users while simultaneously acting to prevent malicious activity in a managed system. Conclusions. We describe capabilities for a novel approach to managing sociotechnical cyber-risk which can be integrated into typical risk management processes. This includes consideration of user activities as a system asset to protect, and a consideration of how to engage with other stakeholders to identify behaviours to preserve in a system.
机译:出身背景网络安全控制用于管理恶意行为或系统带来的风险。网络安全控制可能会如何影响合法用户(通常是那些使用管理系统需要保护和保存的用户),这一点并不经常被考虑或阐述。这种疏忽体现了许多网络安全控制的“直截了当”性质。目标在这里,我们提出了一个框架,该框架综合了减少网络犯罪机会和改变行为的方法,并考虑了现有的风险管理指南。方法我们用一系列例子和一个潜在的应用来说明该框架及其原则,这些例子和应用侧重于在线虐待和社交媒体控制,反过来又与网络欺凌和技术滥用固有的问题有关。后果该框架描述了通过检查系统中消极和积极行为的共同决定因素来提高网络安全控制精确度的能力。这为风险所有者确定了更好地保护合法用户的机会,同时采取行动防止托管系统中的恶意活动。结论。我们描述了一种管理社会技术网络风险的新方法的能力,这种方法可以集成到典型的风险管理过程中。这包括考虑将用户活动作为要保护的系统资产,以及考虑如何与其他利益相关者接触,以确定要在系统中保留的行为。

著录项

相似文献

  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号