O'Reilly logo

CyberWar, CyberTerror, CyberCrime: A Guide to the Role of Standards in an Environment of Change and Danger by Mehan E. Julie

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 3. The Human Factor: The Underrated Threat

 

‘If you think technology can solve your security problems, then you don’t understand the problems and you don’t understand the technology.’

 
 --Bruce Schneier (Secrets and Lies, 2000)

Are people the problem?

Vast selections of security tools are available; firewalls, intrusion detection systems, anti-virus solutions, and many more. Each tool is designed to perform a specific function, the use of which provides one layer of protection for an information system. However, even the very best tools using the most advanced technology and the most secure algorithms cannot guarantee 100% system security. So, what is the weakest link in the security chain? The answer: people.

People are involved in the development ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required