Jan 1, 2006 | Research library
Phishing, e-mails sent out by hackers to lure unsuspecting victims into giving up confidential information, has been the cause of countless security breaches and has experienced in the last year an increase in frequency and diversity. While regular phishing attacks...
Jan 1, 2006 | Research library
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns that this increase in memorability could also lead to an increased susceptibility...
Dec 4, 2005 | Research library
Home computer users play a crucial role in securing the cyberspace, but the protection of home computers is left to the initiative of the users. In this study, we focus on the sociobehavioral perspective, as the behavior of home computer users on security issues is...
Sep 6, 2005 | Research library
Commonly, individuals are referred to as “the most fragile component” in the structure of system security by security specialists. Notorious hacker Kevin Mitnick stated that he seldom resorted to password cracking, finding it much easier to trick...
Sep 1, 2005 | Research library
Insider threat is widely recognised as an issue of utmost importance for IS security management. In this paper, we investigate the approach followed by ISO17799, the dominant standard in IS security management, in addressing this type of threat. We unfold the...
Jul 2, 2005 | Research library
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in...