Security as obstacle

Assignment Help Basic Computer Science
Reference no: EM133052583

Users who see security as an obstacle or a nuisance are less likely to abide by security policies. Referred to as "resistance behavior," a Virginia Tech study found that even if people understand that a security breach can have severe consequences on an organization, that knowledge does not always make users accept and conform to security policy rules. Individuals may feel their competence challenged, which triggers a negative attitude toward security in general. Users may also view some security controls, such as scheduled password changes, as unnecessary interruptions. Security controls, such as a fingerprint scanner, that don't work consistently may make users feel overwhelmed and lead to mistrust of security controls or even overriding them.

If you were a professional in charge of security for an organization, what would you say to a user who believes they have the right to decide whether to participate in security measures?

In the same scenario, what kind of incentive do you think would encourage the user to participate?

Reference no: EM133052583

Questions Cloud

Organizing it security policies by domain : What is an advantage of organizing IT security policies by domain? What is a disadvantage of organizing IT security policies by domain?
How negotiations with accreditors on compliance : Explain how negotiations with accreditors on compliance should be dealt with. Provide an example.
Designing web-based system : If you were designing a Web-based system to make airline reservations and to sell airline tickets, which DBMS Architecture would you choose from Section 2.5?
Blockchain with cryptocurrency bitcoin : The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain;
Security as obstacle : Users who see security as an obstacle or a nuisance are less likely to abide by security policies.
Human and non-human of threats : Describe at least three different categories (human and non-human) of threats from your Unit research.
Non Ethernet protocols Wireshark can capture : Explain three possible uses of a SPAN port that you might use as a forensic investigator. Describe three non-Ethernet protocols Wireshark can capture.
Big data analytics in e-healthcare industry : There are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry.
Different types of malware to attack systems : Cybercriminals use many different types of malware to attack systems. , explain how to defend yourself against Spyware.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create national security culture

what would you do to help create a national "security culture," in which everyone is more knowledgeable and proactive about threats to information security?

  What is the greatest integer g that is not in s

What is the greatest integer g that is not in S? Just write down the answer, you don't have to show your work here or prove that g is not in S.

  Major area of focus for information governance efforts

we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application

  The final project will be placed in the doc sharing area

The final project will be placed in the Doc Sharing area

  Describe the respective function of agarose gel

Describe the respective function of agarose gel, electrophoretic buffer and power supply, in the set-up of electrophoresis.

  Physical transmission options, such as fiber optic

Physical transmission options, such as fiber optic, to provide connectivity for the stores. Wireless connectivity options, standards, and infrastructure to provide laptop connectivity. Satellite or point-to-point options should be explored.

  Which battery is most likely to last all day

MP3s. Two companies market new batteries targeted at owners of personal music players. DuraTunes claims a mean battery life of 11 hours, while RockReady advertises 12 hours.

  Create a time trial program to compare the average execution

Create a time trial program to compare the average execution times of the Formula Node and the native LabVIEW Math Functions. This program will rquire a For Loop, a Flat Sequence structure, and a Case structure. The For Loop is required to run the ti..

  Does the ap need to have two mac addresses in this case

An AP may connect a wireless network to a wired network. Does the AP need to have two MAC addresses in this case

  Probability of answering between 78 and 88questions

Find the probability of answering between 78 and 88questions, inclusive. (Assume independence, and round your answer to four decimal places.)

  Create vulnerability assessment report

Create a vulnerability assessment report based on the OWASP documents and your analysis of all the issues researched in this lab.

  Discuss in detail the stakeholder theory approach

Discuss in detail the stakeholder theory approach from an organizational perspective.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd