The Psychology of Information Security by Leron Zinatullin
Author:Leron Zinatullin [Leron Zinatullin]
Language: eng
Format: epub
Tags: Information Technology/Operations, Security
Publisher: IT Governance Publishing
Published: 2016-01-25T22:00:00+00:00
There is an inability to comply
There are extreme cases in which enforced compliance fails to be an option for employees, even when they are more than willing to invest their time and effort. In such cases, the predominant scenario is that users cannot comply because the security mechanisms do not match their basic requirements.
Examples include an organisation giving employees encrypted USB drives with too little storage space, forcing them to share files via email or via larger, non-encrypted drives. It is also common to see users copying files onto laptops because remote accessibility is problematic, or because their network drive capacity is too small.
Another recurring issue is a requirement for numerous passwords to access different corporate systems, all of which employees tend to have difficulty in memorising. Users will “fix” this problem by writing down their passwords, either physically on a document they carry with them or in an electronic form on their laptop.
People tend to be aware of how their behaviour can pose an increased risk, but feel justified in finding these workarounds because the organisation has failed to provide them with a proper technical implementation. They assume that the organisation would rather allow security violations than stop the main business process: an opinion that also happens to be adopted by managerial staff. When everybody shares this inadequate and risky perspective, the organisation is an accomplice in the employees’ non-compliant behaviour.
The researchers concluded that implementation of security compliance seems to create a strain and enlarges the gap between security professionals and the rest of the organisation. Employees tend to develop a negative view of information security in general and respond to security enforcers with scepticism, or may simply ignore them.
This bias can easily discourage employees from behaving in a compliant manner with security controls, regardless of how sensibly designed they may be.
Overly complicated security mechanisms are usually implemented at the cost of the organisation’s productivity, because they tend to consume valuable employee resources. It is not unusual to find that important parts of the organisation will foster non-compliant behaviour, because they value productivity over security and don’t perceive any immediate risk.
Employees generally try to comply with an organisation’s security policies, but, most importantly, they simply want to get their work done. Sometimes employees may violate an organisation’s security policy through malicious behaviour, but it is often because of poor control implementation which does not consider their needs.
Here is where information security professionals’ job gets interesting. When non-compliant behaviour is identified, they should first rule out the possibility of malicious behaviour, and then should understand where and why the security policy failed to work properly, forcing the employees to find workarounds.
The more a security policy implementation facilitates employee values and priorities, the better it fosters employee incentives and strengthens the security culture.
In order to achieve alignment between security and employee perspective, the process of formulating security policies must be focused on employee behaviour. A security professional should remember that employee performance is goal-oriented.
These goals are usually focused on business processes
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Effective Threat Investigation for SOC Analysts by Yahia Mostafa;(6683)
Practical Memory Forensics by Svetlana Ostrovskaya & Oleg Skulkin(6400)
Machine Learning Security Principles by John Paul Mueller(6373)
Attacking and Exploiting Modern Web Applications by Simone Onofri & Donato Onofri(6043)
Operationalizing Threat Intelligence by Kyle Wilhoit & Joseph Opacki(6001)
Solidity Programming Essentials by Ritesh Modi(4094)
Microsoft 365 Security, Compliance, and Identity Administration by Peter Rising(3734)
Operationalizing Threat Intelligence by Joseph Opacki Kyle Wilhoit(3464)
Mastering Python for Networking and Security by José Manuel Ortega(3365)
Future Crimes by Marc Goodman(3354)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3310)
Learn Computer Forensics - Second Edition by William Oettinger(3219)
Incident Response with Threat Intelligence by Roberto Martínez(2951)
Mobile App Reverse Engineering by Abhinav Mishra(2892)
Mastering Bitcoin: Programming the Open Blockchain by Andreas M. Antonopoulos(2880)
Building a Next-Gen SOC with IBM QRadar: Accelerate your security operations and detect cyber threats effectively by Ashish M Kothekar(2856)
The Code Book by Simon Singh(2840)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2790)
