Effective Security for the Post-compliance Era Security Awareness and Training for Security Specialists
- M. ANGELA SASSE, RUHR UNIVERSITY BOCHUM & UCL
Effective Security for the Post-compliance Era Security Awareness - - PowerPoint PPT Presentation
Effective Security for the Post-compliance Era Security Awareness and Training for Security Specialists M. ANGELA SASSE, RUHR UNIVERSITY BOCHUM & UCL The problem MENSCHLICH WELTOFFEN LEISTUNGSSTARK 2 ENISA Report December 2018
Effective Security for the Post-compliance Era Security Awareness and Training for Security Specialists
MENSCHLICH – WELTOFFEN – LEISTUNGSSTARK 2
MENSCHLICH – WELTOFFEN – LEISTUNGSSTARK 3
ENISA Report December 2018 Co-authored with Adam Joinson (Bath University) & Thomas Schlienger (Tree Solutions)
MENSCHLICH – WELTOFFEN – LEISTUNGSSTARK 4
Safa N. S., Von Solms, R. & Furnell, S. Information security policy compliance model in organizations. Computers & Security, Volume 56, February 2016, Pages 70-82.
MENSCHLICH – WELTOFFEN – LEISTUNGSSTARK 5
MENSCHLICH – WELTOFFEN – LEISTUNGSSTARK 6
7
8
MENSCHLICH – WELTOFFEN – LEISTUNGSSTARK 9
MENSCHLICH – WELTOFFEN – LEISTUNGSSTARK 10
Thanks to Robert Watson Cambridge University Computer Lab
12
14
Another example: Devil’s in your details https://www.youtube.com/watch?v=Ugl8bmZF9Pc
MENSCHLICH – WELTOFFEN – LEISTUNGSSTARK 15
XKCD https://xkcd.com/1837/
MENSCHLICH – WELTOFFEN – LEISTUNGSSTARK 20
21 Usable Security and Privacy: Human Factors
Auguste Kerckhoffs, ‘La cryptographie militaire’, Journal des sciences militaires, vol. IX, pp. 5–38, Jan. 1883, pp. 161–191, Feb. 1883.
22
23
12 Everyday Security
to housing. In order to provide this service, the local authority may have data sharing agreements with private landlords, with social housing institutions, with third sector charities and with other departments across the local authority. Each one of these institutions may have details on a particular tenant. Legislation and regulation related to the sharing of this information is complex and the technological infrastructure may also be complex. In order to ensure that a citizen has access to the appropriate housing services and is able to make an informed decision about their housing needs, the local authority worker may need to access a number
Not only must there be data sharing agreements that align with the legal and regulatory requirements and a technological infrastructure that enables the access to the data, there must also be a willingness to discuss the cases of particular tenants across institutions where the complexity of the case warrants it. For this discussion to be successful, both parties must be willing to share, agree on how the data should be protected and clear on the goal of sharing that data. Contextualising the use of digital protection and transmission methods in this way is a part of everyday security in the work place.
1 Practising Creative Securities Book 3 • Everyday Security Series Editor : Lizzie Coles-Kemp Editor : Peter Hall Design : Giles Lane | proboscis.org.uk Published by Royal Holloway University of London © RHUL & individual contributors 2018 ISBN : 978-1-905846-83-2 Acknowledgements: Illustrations by Makayla Lewis front cover : Illustration by Makayla Lewis Funded through EPSRC – (grant no. EP/N02561X/1) 13
Poor performance of IT systems combined with the complexity of work processes and policies make for a diffjcult working environment and often cause barriers to information sharing and information protection. Individuals often employ everyday security practices to respond to this problem by building networks of collaboration and additional information sharing between colleagues so that common goals are re-enforced and effective information sharing paths are found.
interactions in security design. Strategic Design Research Journal, 11(2): 65-78 May-August 2018
28
Insecurity of the Citizen. Politics and Governance 2018, Volume 6, Issue 2, Pages 41–48.