People a The Weak Link in Security

Article ID

CSTNWSP1SGR

People a The Weak Link in Security

Steven Thomason
Steven Thomason
DOI

Abstract

The weakest link in any security plan or implementation is a human. The weak links include everyone from the hourly paid end user to the owner of the company. Even many of today’s security professionals may not have the time or ability to perform their current duties and keep up with an ever-growing number of threats. If someone is not aware of a threat then they are going to behave as if there were none. The job of the security professional is to change this behavior. It involves using a combination of technology and education to help users understand and follow security requirements. Everyone needs to understand why we need to have security policies and why they need to be followed.

People a The Weak Link in Security

The weakest link in any security plan or implementation is a human. The weak links include everyone from the hourly paid end user to the owner of the company. Even many of today’s security professionals may not have the time or ability to perform their current duties and keep up with an ever-growing number of threats. If someone is not aware of a threat then they are going to behave as if there were none. The job of the security professional is to change this behavior. It involves using a combination of technology and education to help users understand and follow security requirements. Everyone needs to understand why we need to have security policies and why they need to be followed.

Steven Thomason
Steven Thomason

No Figures found in article.

Dr. Steven Thomason. 2013. “. Global Journal of Computer Science and Technology – E: Network, Web & Security GJCST-E Volume 13 (GJCST Volume 13 Issue E11): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Issue Cover
GJCST Volume 13 Issue E11
Pg. 7- 11
Classification
Not Found
Keywords
Article Matrices
Total Views: 9229
Total Downloads: 2413
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

People a The Weak Link in Security

Steven Thomason
Steven Thomason

Research Journals