Feeds

Humans, not tech, are the greatest security risk

You are the weakest link

Next gen security for virtualised datacentres

The Department of Trade and Industry has made £4m available for four research projects aimed at reducing the IT risk created by human error.

The programme, which is part of its Network Security Innovation Platform, reflects the fact that human error is by far the biggest risk to network security, the DTI said.

It cited the results of a survey it conducted, involving over 1,800 people, on the use of passwords. It found that:

  • Just over one third recorded their password or security information by either writing it down or storing it somewhere on their computer
  • Nearly two thirds never changed their password
  • One in five people used the same password for non-banking websites as well as their online bank

The projects will use behavioural science in a bid to tackle the human risk element in network security.

Four projects will receive funding under the programme. The first, to be carried out by BAE Systems and Loughborough University, involves developing a risk assessment package focused on organisational and human factors.

The second, named Trust Economics, is aimed at developing a predictive modelling framework that assesses security policies that regulate the interaction between humans and information systems. Hewlett-Packard, Merrill Lynch, University of Bath, University of Newcastle, and University College London are partners in the project.

The third is aimed at developing a solution for the analysis of digital communications to identify threats introduced by humans. Chronicle Solutions and the University of Plymouth will run the project.

Finally, the National Computing Centre and the University of Manchester will work on CatalysIS, a tool to improve risk culture and identify human vulnerabilities in network security.

Minister for science and innovation Malcolm Wicks said: "Unfortunately, the weakest link in network security is not usually with the technology, but with the staff and system users. A DTI survey found that a shocking number of people were careless with passwords, unwittingly exposing themselves and their company to fraud and theft.

"Network security is also a major growth area where the UK has a good opportunity to become a global leader if we develop new technology to give us a competitive edge."

This article was originally published at Kablenet.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

The essential guide to IT transformation

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Backing up distributed data
Eliminating the redundant use of bandwidth and storage capacity and application consolidation in the modern data center.
The essential guide to IT transformation
ServiceNow discusses three IT transformations that can help CIOs automate IT services to transform IT and the enterprise
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.