Search This Blog

Sunday, March 27, 2016

Meatware (Week 3)

Threats come in different ways such as worms, viruses, and exploit code that is designed to enable malware to make use of vulnerabilities in the system. Sophisticated techniques make it difficult for anti-malware tools and researchers to find, analyze, and detect malicious code. It’s easy to see the solution to the problem only through technical means. However, information professionals must acknowledge the human aspects.

Meatware, also known as wetware and liveware, refers to the human element within a computer system. The term is conceptually used to define the human side of a computer and reflects the computer's dependence. The technical sophistication often tries to exploit human weaknesses Humans are the weakest link in any system through extensive use of social engineering, trying to trick people into doing something that undermines their security. In many cases the wrong behaviors of users; the failure to comply with security policies and lack of awareness targets the system, expose the confidentiality, integrity, and availability.

Let’s consider the attack surface for users: mobile, wireless access, cloud computing, and social media which all collude to make life more connected. The human factor is the underlying reason why many cyber attacks are successful. The most affective method are phishing scams that designed to disclose information such as usernames, passwords, personal identification numbers, and any other information. The classic phishing scam takes the form of a well crafted email. It is transmitted to millions with either a link or attachment containing malware or links that redirect to malicious sites that download malware or illicit confidential information. Social media like Facebook, MySpace, LinkedIn, Twitter and others are increasingly targeted to send out messages containing links to malicious intent. People aren’t only vulnerable due to a lack of awareness. The lure of free audio or video content, or bare pictures, can entice people into clicking on a link that should simply be ignored. However, common sense suggests not taking action because it could be harmful.

Technology is a core part of any solution for dealing with vulnerabilities. Yet, the human aspect is required and necessary. This isn’t just a home issue because the same people operate systems at the business. How individuals navigate the Internet from home, face the same issues at work. Thus, security professionals need to find ways to raise awareness of the risks associated with online activity and develop effective methods to minimize these risks. It’s important to education with training. People are the core building blocks of an effective security strategy. People need to be educated in simple language of the threat, protection measures, the why, and how these may affect them in carrying out their duties. It’s also essential to create a culture of openness to encourage reporting suspicious activity. Cybercrime is here to stay and information professionals need to find ways to mitigate the risk.

References:

What is Meatware? - Definition from Techopedia. (n.d.). Retrieved March 28, 2016, from https://www.techopedia.com/definition/8282/meatware

Paganini, P. (2012). Why humans could be the weakest link in cyber security chain? Retrieved March 28, 2016, from http://securityaffairs.co/wordpress/9076/social-networks/why-humans-could-be-the-weakest-link-in-cyber-security-chain.html


Emm, D. (2010, March 3). Patching human vulnerabilities. Retrieved March 28, 2016, from https://securelist.com/analysis/publications/36287/patching-human-vulnerabilities/

No comments:

Post a Comment