SP
Authored
11 records found
Alert Alchemy
SOC Workflows and Decisions in the Management of NIDS Rules
Signature-based network intrusion detection systems (NIDSs) and network intrusion prevention systems (NIPSs) remain at the heart of network defense, along with the rules that enable them to detect threats. These rules allow Security Operation Centers (SOCs) to properly defend a n
...
‘I feel like we’re really behind the game’
Perspectives of the United Kingdom’s intimate partner violence support sector on the rise of technology-facilitated abuse
Technology-facilitated abuse or ‘tech abuse’ in intimate partner violence (IPV) contexts describes the breadth of harms that can be enacted using digital systems and online tools. While the misappropriation of technologies in the context of IPV has been subject to prior research,
...
Lessons in Prevention and Cure
A User Study of Recovery from Flubot Smartphone Malware
The smishing-based malware Flubot was taken down in mid-2022, yet there is little understanding of how it directly impacted smartphone users. We engage with customers of a partner Internet Service Provider (ISP), who have suffered a Flubot infection on their smartphones. We surve
...
The boundedly rational employee
Security economics for behaviour intervention support in organizations
Security policy-makers (influencers) in an organization set security policies that embody intended behaviours for employees (as decision-makers) to follow. Decision-makers then face choices, where this is not simply a binary decision of whether to comply or not, but also how to a
...
Change that Respects Business Expertise
Stories as Prompts for a Conversation about Organisation Security
Leaders of organisations must make investment decisions relating to the security of their organisation. This often happens through consultation with a security specialist. Consultations may be regarded as conversations taking place in a trading zone between the two domains. We pr
...
Difficult for Thee, But Not for Me
Measuring the Difficulty and User Experience of Remediating Persistent IoT Malware
Consumer IoT devices may suffer malware attacks, and be recruited into botnets or worse. There is evidence that generic advice to device owners to address IoT malware can be successful, but this does not account for emerging forms of persistent IoT malware. Less is known about pe
...
Executive decision-makers
A scenario-based approach to assessing organizational cyber-risk perception
The executive leadership in corporate organizations is increasingly challenged with managing cyber-risks, as an important part of wider business risk management. Cyber-risks are complex, with the threat landscape evolving, including digital infrastructure issues such as trust in
...
‘The trivial tickets build the trust’
A co-design approach to understanding security support interactions in a large university
Increasingly, organizations are acknowledging the importance of human factors in the management of security in workplaces. There are challenges in managing security infrastructures in which there may be centrally mandated and locally managed initiatives to promote secure behaviou
...
‘The trivial tickets build the trust’
A co-design approach to understanding security support interactions in a large university
Increasingly, organizations are acknowledging the importance of human factors in the management of security in workplaces. There are challenges in managing security infrastructures in which there may be centrally mandated and locally managed initiatives to promote secure behaviou
...
An Empirical Study of a Decentralized IdentityWallet
Usability, Security, and Perspectives on User Control
User-centric digital identity initiatives are emerging with a mission to shift control over online identity disclosures to the individual. However, there is little representation of prospective users in discussions of the merits of empowering users with new data management respon
...
“The thing doesn't have a name”
Learning from emergent real-world interventions in smart home security
Many consumer Internet-of-Things (IoT) devices are, and will remain, subject to compromise, often without the owner's knowledge. Internet Service Providers (ISPs) are among the actors best-placed to coordinate the remediation of these problems. They receive infection data and can
...
Contributed
9 records found
Have you updated your lightbulb?
Solving IoT vulnerabilities through governance
Connecting ‘things’ like a doorbell, webcam, lamp, or other objects to the web to provide a service or control is called the Internet of Things (IoT). These devices contain vulnerabilities that form risks for the device user and possibly the network owner through their heterogene
...
The Cyber Shield: Uniting Forces for Knowledge Security in Universities
A Comprehensive Investigation into the Path to Fortifying Knowledge Protection in Dutch Universities
In a rapidly evolving digital landscape, where information is the currency of progress, universities play a vital role in fostering innovation, research, and knowledge dissemination. However, this invaluable role also exposes universities to significant cybersecurity challenges.
...
This study investigates organizations’ approaches to managing cybersecurity challenges that are associated with high levels of teleworking. Over the last two and a half years the pandemic forced organizations to implement teleworking models that resulted in a large share of the w
...
Exploring the practice of organisational Security Patch Management from a socio-technical perspective
Using a Mixed Methods Approach to investigate IT-practitioners’ decision-making and patch activity
In the current digitalised society keeping assets secure is one of the most prominent challenges organisations face. In the ongoing arms race between attackers and defenders, software security patching is a well-recognised and effective strategy to mitigate vulnerabilities in sof
...
DORA: Friend or Foe
A Qualitative Study into the Perceptions of the Financial Sector in the EU on the Expectation of the Digital Operational Resilience Act
The rapid development of technology gives many opportunities but brings threats as well. The digitization of the financial sector has made the threat for cyber attacks significant. Cyber attacks such as the Petya virus or the Wannacry attack have exposed the vulnerability of the
...
Learning from phishing emails
Creating new metrics to measure the effect of anti-phishing training in a large company
Phishing attacks are a growing cause of cybersecurity incidents such as data breaches. With these attacks, malicious actors try to gain access to systems by exploiting the vulnerability of employees. Particularly, intruders use different tricks to create convincing phishing email
...
Maturity of organisational security governance
A case study at Damen Naval
Existing research has shown that due to the increasing digitalization and the adoption of digital technologies and complex (big) data solutions, along with higher firm-level productivity, comes a growing and more dynamic threat environment. Organisations rely on data and digital
...
People ignore design that ignores people
Understanding the impact of security training on the security behaviour of employees within an organisational context
Research shows that most of the security issues arise through human shortcomings, instead of technical issues (Abawajy, 2014). Therefore, users of information systems have to become more security aware. The reasonable solution to these human shortcomings was to provide users with
...
Addressing the growing problem of phishing attacks requires nurturing a reporting culture within organizations. This research examines the factors influencing reporting behavior and the role of infrastructure & support in enhancing reporting rates. By adopting a mixed methods app
...