Human-Related It Security: a Reliability Model for Network and Computer Maintenance
| dc.contributor.author | Kondakei S. | |
| dc.date.accessioned | 2023-06-16T15:01:53Z | |
| dc.date.available | 2023-06-16T15:01:53Z | |
| dc.date.issued | 2015 | |
| dc.description | World Congress on Internet Security, WorldCIS 2015 -- 19 October 2015 through 21 October 2015 -- 119461 | en_US |
| dc.description.abstract | User vigilance and security awareness are two interrelated factors, which we often oversee and merely rely on the default configurations set by the related vendor. User-related mistakes can lead to serious threats to computerized systems. If not performed adequately, system maintenance tasks including backup, restore, patch, upgrade, and malconfigurations can create critical vulnerabilities throughout the Internet. This paper presents a numerical method to analyze the system availability and predict the cost of mistakes (or maloperations) done by users. A reliability-based impact analysis method with a concise formulation can help system administrators to easily capture the risks of human-rooted threats and take the necessary measures to mitigate them. The proposed work can be specially useful for the analysis of threats in social networks. Because social networks are more vulnerable in the sense that they connect a heavily crowded community with relatively low security-awareness, which encompasses a wide spectrum of user applications running on different platforms with different protection profiles. Due to the immense number of interconnections and highly improved communication infrastructures viruses/warms, popups, phishers, and Trojans can easily propagate to millions of users in a few milliseconds of time causing losses that are worth being aware. © 2015 Infonomics Society. | en_US |
| dc.identifier.doi | 10.1109/WorldCIS.2015.7359421 | |
| dc.identifier.isbn | 978-1-908320-50-6 | |
| dc.identifier.scopus | 2-s2.0-84967211916 | |
| dc.identifier.uri | https://doi.org/10.1109/WorldCIS.2015.7359421 | |
| dc.identifier.uri | https://hdl.handle.net/20.500.14365/3657 | |
| dc.language.iso | en | en_US |
| dc.publisher | Institute of Electrical and Electronics Engineers Inc. | en_US |
| dc.relation.ispartof | 2015 World Congress on Internet Security, WorldCIS 2015 | en_US |
| dc.rights | info:eu-repo/semantics/closedAccess | en_US |
| dc.subject | reliability and dependability | en_US |
| dc.subject | security threat modeling | en_US |
| dc.subject | stochastic risk assessment | en_US |
| dc.subject | User-trust modeling | en_US |
| dc.subject | Availability | en_US |
| dc.subject | Computer privacy | en_US |
| dc.subject | Internet | en_US |
| dc.subject | Malware | en_US |
| dc.subject | Numerical methods | en_US |
| dc.subject | Reliability | en_US |
| dc.subject | Reliability analysis | en_US |
| dc.subject | Risk assessment | en_US |
| dc.subject | Security of data | en_US |
| dc.subject | Security systems | en_US |
| dc.subject | Social networking (online) | en_US |
| dc.subject | Stochastic systems | en_US |
| dc.subject | Communication infrastructure | en_US |
| dc.subject | Computerized systems | en_US |
| dc.subject | Protection profile | en_US |
| dc.subject | Security awareness | en_US |
| dc.subject | Security threat modeling | en_US |
| dc.subject | System availability | en_US |
| dc.subject | System maintenance | en_US |
| dc.subject | User trust models | en_US |
| dc.subject | Network security | en_US |
| dc.title | Human-Related It Security: a Reliability Model for Network and Computer Maintenance | en_US |
| dc.type | Conference Object | en_US |
| dspace.entity.type | Publication | |
| gdc.author.scopusid | 15061511300 | |
| gdc.bip.impulseclass | C5 | |
| gdc.bip.influenceclass | C5 | |
| gdc.bip.popularityclass | C5 | |
| gdc.coar.access | metadata only access | |
| gdc.coar.type | text::conference output | |
| gdc.collaboration.industrial | false | |
| gdc.description.departmenttemp | Kondakei, S., Izmir University of Economics, Faculty of Engineering and Computer Sciences, Balcova-Izmir, 35330, Turkey | en_US |
| gdc.description.endpage | 96 | en_US |
| gdc.description.publicationcategory | Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı | en_US |
| gdc.description.scopusquality | N/A | |
| gdc.description.startpage | 91 | en_US |
| gdc.description.wosquality | N/A | |
| gdc.identifier.openalex | W2289135491 | |
| gdc.identifier.wos | WOS:000376087500013 | |
| gdc.index.type | WoS | |
| gdc.index.type | Scopus | |
| gdc.oaire.diamondjournal | false | |
| gdc.oaire.impulse | 0.0 | |
| gdc.oaire.influence | 2.5349236E-9 | |
| gdc.oaire.isgreen | false | |
| gdc.oaire.popularity | 7.4808554E-10 | |
| gdc.oaire.publicfunded | false | |
| gdc.oaire.sciencefields | 0202 electrical engineering, electronic engineering, information engineering | |
| gdc.oaire.sciencefields | 02 engineering and technology | |
| gdc.oaire.sciencefields | 0101 mathematics | |
| gdc.oaire.sciencefields | 01 natural sciences | |
| gdc.openalex.collaboration | National | |
| gdc.openalex.fwci | 0.0 | |
| gdc.openalex.normalizedpercentile | 0.2 | |
| gdc.opencitations.count | 0 | |
| gdc.plumx.mendeley | 15 | |
| gdc.plumx.scopuscites | 0 | |
| gdc.scopus.citedcount | 0 | |
| gdc.virtual.author | Kondakçı, Süleyman | |
| gdc.wos.citedcount | 0 | |
| relation.isAuthorOfPublication | 3803a306-2ebf-4571-b717-d5fc214767b5 | |
| relation.isAuthorOfPublication.latestForDiscovery | 3803a306-2ebf-4571-b717-d5fc214767b5 | |
| relation.isOrgUnitOfPublication | b4714bc5-c5ae-478f-b962-b7204c948b70 | |
| relation.isOrgUnitOfPublication | 26a7372c-1a5e-42d9-90b6-a3f7d14cad44 | |
| relation.isOrgUnitOfPublication | e9e77e3e-bc94-40a7-9b24-b807b2cd0319 | |
| relation.isOrgUnitOfPublication.latestForDiscovery | b4714bc5-c5ae-478f-b962-b7204c948b70 |
Files
Original bundle
1 - 1 of 1
