Please use this identifier to cite or link to this item: http://elea.unisa.it:8080/xmlui/handle/10556/2688
Title: Cyber security and ubiquity: an human-centric approach
Authors: Colella, Antonio
De Santis, Alfredo
De Santis, Alfredo
Keywords: Cyber
Ubiquity
Human
Issue Date: 23-Jun-2017
Publisher: Universita degli studi di Salerno
Abstract: Recent security breaches showed that every attack begins with the involvement of users and continues with the exploitation of technology bugs. In almost all cases, without human collaboration, conscious and unconscious, it would be really difficult to reach the criminal goal. Our approach has mainly three characteristics: • Centrality of the human factor; • The ability to mold the scenario to be protected; • Dynamic adaptation to external and internal threats. The First step is to deal with the identification of a set of attributes to be used for the construction of a security system fitting to a given context, going beyond the strategy of the pre-established paradigms (CIA and similar). More precisely, in this thesis we focus on the idea that members of Society need to gain sufficient knowledge and experience to avoid the consequences of the limitations of technical solutions. This has lead us toward an integrated model based on a cultural approach in which the trust and co-partnership of the security system are the main focal point. This model implies that technology solutions separated from the surrounding environment are completely inadequate. Social, organizational, and psychological factors have to be considered when implementing security within an organization. The conjunctions among social factors, technological factors, trust, co-partnership, culture, motivation, and organizational models will be better harmonized in a single system. We analyzed Trust in a Security Environment setting up on a rational component, based on information built on experience and on an irrational element, a socalled leap of faith made out of pure instinct, without any logic. We found that Trust and Risk are two inseparable concepts whose bond is supported by rational and irrational character of 2 confidence. We then focus on a correct approach to risk management that, by considering the holistic character of the problem, would at same time adequately support the internal working relationships as well as the relationships between organizations. Moreover, we clarify why technology solutions alone are completely inadequate to ensure security. Social, organizational and psychological factors must be considered when implementing security within an organization. Indeed, we need to consider how people build communities and must take into account how communication patterns affect interactions. The above considerations guided us towards a model that includes the cultural approach where both trust and co- partnership of a security system have a very important role. Security behaviors fostered by information organizations must be achieved by pursuing the motivation and desire as cultural factors. The model considers the societal elements as the most important part of the security system. Trust and co-partnership help create a strong security culture that serves as a framework to the information security system. At the end of the thesis, we will apply trust and co-partnership to introduce a predictive cyber security risk assessment model based on Bayesian Networks and hybrid methodology (as defined by Francois-Xavier Aguessy). The motivations underlying this thesis are mainly based on two observations. The first observation is that trust and co-partnership imply a full involvement of the whole of management style. In order to gain co-partnership, the human factor needs to be the pivot of the security model. The second observation is that an hybrid risk assessment model can help provide a strong foundation for dynamic security modeling. The accuracy of such a model would be related to the number of available scenarios and to the use of the ability of the Bayesian networks to learn parameters from data... [edited by Author]
Description: 2015 - 2016
URI: http://hdl.handle.net/10556/2688
http://dx.doi.org/10.14273/unisa-1038
Appears in Collections:Informatica ed Ingegneria dell'Informazione

Files in This Item:
File Description SizeFormat 
tesi A. Colella.pdftesi di dottorato28.02 MBAdobe PDFView/Open
abstract in inglese A. Colella.pdfabstract in inglese a cura dell'autore309.84 kBAdobe PDFView/Open
abstract in italiano A. Colella.pdfabstract in italiano a cura dell'autore226.17 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.