Human Vulnerability and IT Security

2352 Words5 Pages

Information Technology (IT) managers are constantly tasked with evaluating their organization’s overall security posture and reporting the greatest vulnerabilities to leadership. Senior management is often surprised to hear that the greatest vulnerability within an organization is not a misconfigured firewall or a virus being forwarded across an internal e-mail server, but rather a human being. When compared to a piece of hardware or software, a human user is easily the single most targeted weakness within an organization.

Defining the Human Vulnerability

Charles and Shari Pfleeger define a vulnerability as “a weakness in the security system, for example, in procedures, design, or implementation, that might be exploited to cause loss or harm (Pfleeger & Pfleeger, 2007, p. 6).” Hackers and other malicious entities often target humans as being the weakest link in a security system because their decision making process is much more complex than the “yes/no” or “on/off” logic process of a computing system. Quite simply, the fact that humans are often careless, emotional, forgetful, and mistake-prone make them excellent targets. As a result of the inherent nature of human beings, they are easily manipulated or exploited by adversaries in an effort to seriously damage an organization’s assets. The human vulnerability ultimately takes shape as a result of a broad collection of vulnerabilities including a lack of security awareness, irregular or inconsistent training and education programs, and the absence of auditing.

Security Awareness

Individuals who are unaware of the basic tenants of safe computing are an enormous vulnerability to an organization’s assets. Users who lack a solid foundation in security awareness may pract...

... middle of paper ...

...riculture Office of the Chief Information Officer. Retrieved February 26, 2011, from http://www.ocio.usda.gov/directives/doc/DM3535-002.htm

Schneier, B. (2005, December 19). Insider Threat Statistics. Schneier on Security. Retrieved February 26, 2011, from http://www.schneier.com/blog/archives/2005/12/insider_threat.html

University of Maryland University College. (2011). CSEC 610 CyberSpace & CyberSecurity – Module 2: The Vulnerability of Organization Networks and the Internet. Retrieved from http://tychousa9.umuc.edu/cgi-bin/id/FlashSubmit/fs_link.pl?class=1102:CSEC610:8480&fs_project_id=304&xload&tmpl=CSEC610fixed&moduleSelected=csec610_02

Vacca, J. R. (2009). Computer and Information Security Handbook. Burlington, MA: Morgan Kaufmann Publishers.

Wiles, J. (2005, Spring). Social Engineering - The Mother of All Trojan Horses. IA Newsletter, 7, 6,7,12.

Open Document