• Complain

Leron Zinatullin [Leron Zinatullin] - The Psychology of Information Security

Here you can read online Leron Zinatullin [Leron Zinatullin] - The Psychology of Information Security full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2016, publisher: IT Governance Publishing, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Leron Zinatullin [Leron Zinatullin] The Psychology of Information Security

The Psychology of Information Security: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The Psychology of Information Security" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Ensure the success of your security program by understanding users motivationsThis book cuts to the heart of many of the challenges in risk management, providing advice and tips from interviews as well as models that can be employed easily. Leron manages to do this without being patronizing or prescriptive, making it an easy read with some very real practical takeaways.Thom Langford, Chief Information Security Officer at Publicis GroupeBased on real world examples the book provides valuable insights into the relationship of information security, compliance, business economics and decision theory. Drawing on interdisciplinary studies, commentary from the field and his own research Leron gives the reader the necessary background and practical tools to drive improvements in their own information security program.Daniel Schatz, Director for Threat & Vulnerability Management at Thomson Reuters In todays corporations, information security professionals have a lot on their plate. In the face of constantly evolving cyber threats they must comply with numerous laws and regulations, protect their companys assets, and mitigate risks to the furthest extent possible.Security professionals can often be ignorant of the impact that implementing security policies in a vacuum can have on the end users core business activities. These end users are, in turn, often unaware of the risk they are exposing the organization to. They may even feel justified in finding workarounds because they believe that the organization values productivity over security. The end result is a conflict between the security team and the rest of the business, and increased, rather than reduced, risk.This can be addressed by factoring in an individuals perspective, knowledge, and awareness, and a modern, flexible, and adaptable information security approach. The aim of the security practice should be to correct employee misconceptions by understanding their motivations and working with the users rather than against them after all, people are a companys best assets.Product descriptionBased on insights gained from academic research as well as interviews with UK-based security professionals from various sectors, The Psychology of Information Security Resolving conflicts between security compliance and human behaviour explains the importance of careful risk management and how to align a security program with wider business objectives, providing methods and techniques to engage stakeholders and encourage buy-in.The Psychology of Information Security redresses the balance by considering information security from both viewpoints in order to gain insight into security issues relating to human behavior , helping security professionals understand how a security culture that puts risk into context promotes compliance.ContentsChapter 1: Introduction to information securityChapter 2: Risk managementChapter 3: The complexity of risk managementChapter 4: Stakeholders and communicationChapter 5: Information security governanceChapter 6: Problems with policiesChapter 7: How security managers make decisionsChapter 8: How users make decisionsChapter 9: Security and usabilityChapter 10: Security cultureChapter 11: The psychology of complianceChapter 12: Conclusion - Changing the approach to securityAppendix: AnalogiesAbout the authorLeron Zinatullin (zinatullin.com) is an experienced risk consultant specialising in cyber security strategy, management, and delivery. He has led large-scale, global, high-value security transformation projects with a view to improve cost performance and support business strategy.He has extensive knowledge and practical experience in solving information security, privacy, and architectural issues across multiple industry sectors.He has an MSc in information security from University College London, where he focused on the human aspects of information security. His research was related to modelling conflicts between security compliance and human behavior.Series informationThe Psychology of Information Security is part of the Fundamentals Series, co-published by IT Governance Publishing and Information Security Buzz.Ensure the success of your security programs by understanding the psychology of information security. Buy this book today.

Leron Zinatullin [Leron Zinatullin]: author's other books


Who wrote The Psychology of Information Security? Find out the surname, the name of the author of the book and a list of all author's works by series.

The Psychology of Information Security — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The Psychology of Information Security" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
ABOUT THE AUTHOR

Leron Zinatullin is an experienced risk consultant, specialising in cyber security strategy, management and delivery. He has led large-scale, global, high-value security transformation projects with a view to improving cost performance and supporting business strategy.

He has extensive knowledge and practical experience in solving information security, privacy and architectural issues across multiple industry sectors.

He has an MSc in Information Security from University College London, where he focused on the human aspects of information security. His research was related to modelling conflicts between security compliance and human behaviour.

Website: zinatullin.com

Twitter: @le_rond

ACKNOWLEDGEMENTS

I would like to thank the many people who helped me with this book; those who provided support, talked things over, offered comments and assisted in the editing.

APPENDIX: ANALOGIES

Im passionate about helping people understand security. In my experience, using analogies is one of the best tools to enhance learning. People have a far better and longer-lasting understanding of a concept when they can relate to a real-life experience that emulates it. Describing situations and possible outcomes can be just as easily done by telling stories: they are not only pleasant to read, hear or imagine, but they also transfer knowledge in the most effective way.

Thats why I decided to contribute to the Analogies Project. The aim of this project is to illustrate the importance of information security in the modern world, by drawing parallels between what people already know and how these relate to information security.

In this appendix I would like to share a couple of my analogies to help you to communicate the value of security.

Analogy 1: Cake and Security

There is no doubt that security is necessary, but why is it so unpleasant to follow a security policy? Reminding yourself to stick to the rules feels like your partner telling you to eat your salad. You know they are right, but anticipating that bland taste and mindless chewing that awaits you simply puts you off. You decide to leave it for tomorrow, so much so that you never get to it.

Cakes, on the other hand, are yummy and require no effort whatsoever to indulge in our cravings for them. Nobody needs to force us to eat a piece.

In our day-to-day lives we prefer to do cake tasks without giving it a seconds thought. Things like storing confidential files on Dropbox or emailing them to our personal accounts you know, taking a little bite here and there. Its only for today, no biggie This onetime thing is so harmless, its like a comfort snack. We might later feel guilty that we bypassed a few salad controls. Maybe we used our personal USB drive instead of a company-issued encrypted one, but at the end of the day who cares? Who will notice? As long as there is no dramatic impact on our health, a bite here or a bite there wont cause any harm.

And one day we realise that its not all rosy. The result of our laziness or lack of willpower eventually rears its ugly head when the doctor makes us stand on the scales and has a look at our blood pressure. So to add to your partners words of wisdom is the doctors warning of an unhealthy present and a bleak future; something that would sound very similar during the companys security audit:

You have got to eat more salad and lay off the cakes!

To make matters worse, even with our best intentions to have the salad at the office cafeteria, we discover that the one available is practically inedible. Pretty much like finding that the companys secure shared drive doesnt have the necessary space to store our files or that the encrypted pen drive is not compatible with the clients Mac.

So if there are chefs coming up with ways to make salads more appealing, what can security professionals do to help us, the employees, maintain our security diet?

They could aim at making security more like a cake effortless, even attractive, but still keep it as healthy as a salad. Sound simple? Perhaps not so much, but they should invest in usability studies to make sure that the secure solution is the easiest to use. It might involve discovering an entirely new culinary art altogether: how to make a cake-tasting salad. But if they fail to realise just how unpalatable the salads are to begin with, we should let them know. Security professionals need employees support.

Organisations are like families: everyone has to stay healthy, otherwise when a single member gets sick, the whole family is at risk of getting sick as well, whether it be catching an infectious disease or adopting an unhealthy lifestyle. Its like having the slimmest, fittest family member refrain from adding biscuits to the grocery list in order not to tempt the couch potatoes. Its a team effort. In order for a company to stay healthy, everyone has to keep a healthy lifestyle of eating salad regularly, even when it is not that pleasant.

The whole company needs to know that security is important for achieving its goals not something that gets in the way just as we should all know that having a healthy diet of greens will guarantee a sound body. Employees contribute to the efficient operation of the business when they comply with security policies. Not only does security ensure confidentiality and the integrity of information, but it also guarantees that the resources are available for employees to complete their primary tasks.

We need to realise that we contribute to security, and we can inflict serious damage on a company when we dont comply with security policies, no matter how insignificant or harmless they may seem. As employees, we are individually responsible for the organisations exposure to security risks, just as we are responsible for exposing ourselves to illness. Our behaviour and daily regime significantly shape our quality of life, and our practices shape the quality of our business.

The health of the company is everyones business. Lets all eat our salad while helping the security specialists to come up with better-tasting ones.

Analogy 2: Poker and Security

Good poker players are known to perform well under pressure. They play their cards based on rigorous probability analysis and impact assessment. These skills are very similar to those which a security professional must have for managing information security risks.

What can security professionals learn from a game of cards? It turns out, quite a bit. Skilled poker players are very good at making educated guesses about opponents cards and predicting their next moves. Security professionals are also required to be on the forefront of emerging threats and discovered vulnerabilities to see what the attackers next move might be.

At the beginning of a traditional Texas holdem poker match, players are only dealt two cards (a hand). Based on this limited information, they have to try to evaluate the odds of winning, and act accordingly. Players can either decide to stay in the game in this case they have to pay a fee which contributes to the overall pot or give up (fold). Security professionals also usually make decisions under a high degree of uncertainty. There are many ways they can treat risk: they can mitigate it by implementing necessary controls, avoid, transfer or accept it. Costs of such decisions vary as well.

Not all cards, however, are worth playing. Similarly, not all security countermeasures should be implemented. Sometimes it is more effective to fold your cards and accept the risk than to pay for an expensive control. When the odds are right a security professional can start a project to implement a security change to increase the security posture of a company.

When the game progresses and the first round of betting is over, the players are presented with a new piece of information. The poker term flop is used for the three additional cards that the dealer places on the table. These cards can be used to create a winning combination with each players hand. When the cards are revealed, the player has the opportunity to reassess the situation and make a decision. This is exactly the way in which the changing market conditions or business requirements provide an instant to re-evaluate the business case for implementing a security countermeasure.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The Psychology of Information Security»

Look at similar books to The Psychology of Information Security. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The Psychology of Information Security»

Discussion, reviews of the book The Psychology of Information Security and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.