Human-Computer Interaction and Cybersecurity Handbook
eBook - ePub

Human-Computer Interaction and Cybersecurity Handbook

  1. 422 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Human-Computer Interaction and Cybersecurity Handbook

About this book

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018

Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cybersecurity focus on, both from a human–computer interaction point of view, and that of human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices, and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.

Features



  • Covers all areas of human–computer interaction and human factors in cybersecurity
  • Includes information for IT specialists, who often desire more knowledge about the human side of cybersecurity
  • Provides a reference for other disciplines such as psychology, behavioral science, software engineering, and security management
  • Offers a source of information for cybersecurity practitioners in government agencies and private enterprises
  • Presents new areas such as smart networking and devices

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Human-Computer Interaction and Cybersecurity Handbook by Abbas Moallem in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2018
Print ISBN
9781138739161
eBook ISBN
9781351730761

Smart networks and devices

nineSmart home network and devices

Abbas Moallem
9.1Introduction
9.1.1Passwords
9.1.2Beyond passwords
9.1.3Network usability problems
9.1.3.1No professional administrators
9.2Home Networking Routes and Feature Management
9.2.1Acquiring a router
9.2.2Connecting router to network
9.2.3Managing home network
9.2.3.1Setting user name and password
9.2.3.2Home networking configuration
9.2.3.3Home networking and user mental image
9.2.3.4Home networking devices and firmware
9.2.3.5Internet of things
9.3Solutions and Challenges
9.3.1Home networking and privacy
9.4Conclusion
References

9.1Introduction

With the speedy expansion of the Internet and Internet-based technologies in homes, the connection of a household to an Internet service provider has become as common as connecting to the basic utility providers for electricity and gas. According to Internet Live Stats (2016), 88.5% of the United States, and 40% of the world population, are Internet users. Users, moreover, are not typically satisfied with having just their computer connected to the Internet. They need wireless connections at home for their computer devices, and cross access connections that allow them to view, modify, and control their computer devices. Users also need to control and monitor security and problem-solve to maintain an uninterrupted Internet connection and a secure network.
Not long ago, home Internet connections were limited to computers. Now, gradually, within a “smart home” (Cheng and Kunz 2009), a wide range of computers and computerized devices can be connected and interact globally and with each other. However, after initial configuration, users are advised to conduct frequent monitoring of the interactions of each device and to frequently check security settings of each device (updating firmware, viewing the connected devices, changing passwords, and so on). Frequent monitoring provides a method of examining the router to ensure that it has not been hacked. For instance, monitoring can display all the devices connected to the user’s network, so any unauthorized devices can be easily identified.
Today, roughly 9 in 10 American adults use the Internet (Pew Research Center 2017). It is estimated that households have 10 connected devices now, projected to rise to 50 connected devices per home by 2020 (Phadnis 2016). More devices mean a wider number of systems and accounts that require user management. For example, managing a switch box that turns one Ethernet connection into several, allowing multiple wired devices to connect to the Internet without overloading the router, or eliminating bottlenecks to make sure that the modem/router can handle the broadband speeds.
Despite the increasing value of the information stored on devices connected to a home wireless network, users are also presented with the threat of network privacy and security breaches. User habits, and knowledge of network features and safety, are thought to have a great impact on risk rates.

9.1.1Passwords

Most users are under the impression that a complex password will keep them safe from breaches. However, reports indicate that even a complex password is not necessarily a secure password (McMilllan 2014). In addition, in October 2107, new research from security researcher Mathy Vanhoef of KU Leuven, in Belgium, found that a flaw in the cryptographic protocols of Wi-Fi protected access II (WPA2) could be exploited to read and steal data that would otherwise be protected. In some situations, this vulnerability even leaves room for an attacker to manipulate data on a Wi-Fi network, or inject new data into it. In practice, that means hackers could steal users’ passwords, intercept their financial data, or even manipulate commands to, say, send their money to hackers (Newman 2017).

9.1.2Beyond passwords

Users who follow the basic device setup guides, but who want to further configure the security of their devices, are struck with two deficiencies: the lack of the knowledge of what proper preventative measures are and the lack of the skill to implement preventive actions [how to do it using device user interface (UI)]. Users with limited networking experience generally claim that managing a home network beyond the basic setup protocols of the devices is a tedious, difficult task.
People who have a home networking device have more than likely experienced a variety of home networking UI issues. They might have even asked someone with technical knowledge to help with installing, connecting, and configuring the device that they acquired or had problems with. No matter the type of device—a wireless router or an interactive TV can very quickly become complicated.

9.1.3Network usability problems

Edwards et al. (2011) concludes that “network usability problems run deep because the technology was initially developed for research labs and enterprise networks and does not account for three unique characteristics of the home: 1) lack of professional administrators, 2) deep heterogeneity, and 3) expectations of privacy.”

9.1.3.1No professional administrators

The issues that seem to be related to user difficulties with network security technology are that UIs are built for advanced users with information technology (IT) backgrounds, heterogeneity in users and home networking configurations, and the complexity of problem-solving home network issues. For example, Grinter et al. (...

Table of contents

  1. Cover
  2. Half Title Page
  3. Series Page
  4. Title Page
  5. Copyright Page
  6. Dedication
  7. Contents
  8. List of figures
  9. List of tables
  10. Preface
  11. Acknowledgments
  12. Introduction
  13. Editor
  14. Contributors
  15. Section I Authentication and access management
  16. Section II Trust and privacy
  17. Section III Threats
  18. Section IV Smart networks and devices
  19. Section V Governance
  20. Section VI Perspective
  21. Glossary
  22. Index