Human-Computer Interaction and Cybersecurity Handbook
eBook - ePub

Human-Computer Interaction and Cybersecurity Handbook

Abbas Moallem, Abbas Moallem

Share book
  1. 422 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Human-Computer Interaction and Cybersecurity Handbook

Abbas Moallem, Abbas Moallem

Book details
Book preview
Table of contents
Citations

About This Book

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018

Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cybersecurity focus on, both from a humanā€“computer interaction point of view, and that of human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices, and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.

Features



  • Covers all areas of humanā€“computer interaction and human factors in cybersecurity
  • Includes information for IT specialists, who often desire more knowledge about the human side of cybersecurity
  • Provides a reference for other disciplines such as psychology, behavioral science, software engineering, and security management
  • Offers a source of information for cybersecurity practitioners in government agencies and private enterprises
  • Presents new areas such as smart networking and devices

Frequently asked questions

How do I cancel my subscription?
Simply head over to the account section in settings and click on ā€œCancel Subscriptionā€ - itā€™s as simple as that. After you cancel, your membership will stay active for the remainder of the time youā€™ve paid for. Learn more here.
Can/how do I download books?
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
What is the difference between the pricing plans?
Both plans give you full access to the library and all of Perlegoā€™s features. The only differences are the price and subscription period: With the annual plan youā€™ll save around 30% compared to 12 months on the monthly plan.
What is Perlego?
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weā€™ve got you covered! Learn more here.
Do you support text-to-speech?
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Is Human-Computer Interaction and Cybersecurity Handbook an online PDF/ePUB?
Yes, you can access Human-Computer Interaction and Cybersecurity Handbook by Abbas Moallem, Abbas Moallem in PDF and/or ePUB format, as well as other popular books in Informatica & Sicurezza informatica. We have over one million books available in our catalogue for you to explore.

Information

Publisher
CRC Press
Year
2018
ISBN
9781351730761

Smart networks and devices

nineSmart home network and devices

Abbas Moallem
9.1Introduction
9.1.1Passwords
9.1.2Beyond passwords
9.1.3Network usability problems
9.1.3.1No professional administrators
9.2Home Networking Routes and Feature Management
9.2.1Acquiring a router
9.2.2Connecting router to network
9.2.3Managing home network
9.2.3.1Setting user name and password
9.2.3.2Home networking configuration
9.2.3.3Home networking and user mental image
9.2.3.4Home networking devices and firmware
9.2.3.5Internet of things
9.3Solutions and Challenges
9.3.1Home networking and privacy
9.4Conclusion
References

9.1Introduction

With the speedy expansion of the Internet and Internet-based technologies in homes, the connection of a household to an Internet service provider has become as common as connecting to the basic utility providers for electricity and gas. According to Internet Live Stats (2016), 88.5% of the United States, and 40% of the world population, are Internet users. Users, moreover, are not typically satisfied with having just their computer connected to the Internet. They need wireless connections at home for their computer devices, and cross access connections that allow them to view, modify, and control their computer devices. Users also need to control and monitor security and problem-solve to maintain an uninterrupted Internet connection and a secure network.
Not long ago, home Internet connections were limited to computers. Now, gradually, within a ā€œsmart homeā€ (Cheng and Kunz 2009), a wide range of computers and computerized devices can be connected and interact globally and with each other. However, after initial configuration, users are advised to conduct frequent monitoring of the interactions of each device and to frequently check security settings of each device (updating firmware, viewing the connected devices, changing passwords, and so on). Frequent monitoring provides a method of examining the router to ensure that it has not been hacked. For instance, monitoring can display all the devices connected to the userā€™s network, so any unauthorized devices can be easily identified.
Today, roughly 9 in 10 American adults use the Internet (Pew Research Center 2017). It is estimated that households have 10 connected devices now, projected to rise to 50 connected devices per home by 2020 (Phadnis 2016). More devices mean a wider number of systems and accounts that require user management. For example, managing a switch box that turns one Ethernet connection into several, allowing multiple wired devices to connect to the Internet without overloading the router, or eliminating bottlenecks to make sure that the modem/router can handle the broadband speeds.
Despite the increasing value of the information stored on devices connected to a home wireless network, users are also presented with the threat of network privacy and security breaches. User habits, and knowledge of network features and safety, are thought to have a great impact on risk rates.

9.1.1Passwords

Most users are under the impression that a complex password will keep them safe from breaches. However, reports indicate that even a complex password is not necessarily a secure password (McMilllan 2014). In addition, in October 2107, new research from security researcher Mathy Vanhoef of KU Leuven, in Belgium, found that a flaw in the cryptographic protocols of Wi-Fi protected access II (WPA2) could be exploited to read and steal data that would otherwise be protected. In some situations, this vulnerability even leaves room for an attacker to manipulate data on a Wi-Fi network, or inject new data into it. In practice, that means hackers could steal usersā€™ passwords, intercept their financial data, or even manipulate commands to, say, send their money to hackers (Newman 2017).

9.1.2Beyond passwords

Users who follow the basic device setup guides, but who want to further configure the security of their devices, are struck with two deficiencies: the lack of the knowledge of what proper preventative measures are and the lack of the skill to implement preventive actions [how to do it using device user interface (UI)]. Users with limited networking experience generally claim that managing a home network beyond the basic setup protocols of the devices is a tedious, difficult task.
People who have a home networking device have more than likely experienced a variety of home networking UI issues. They might have even asked someone with technical knowledge to help with installing, connecting, and configuring the device that they acquired or had problems with. No matter the type of deviceā€”a wireless router or an interactive TV can very quickly become complicated.

9.1.3Network usability problems

Edwards et al. (2011) concludes that ā€œnetwork usability problems run deep because the technology was initially developed for research labs and enterprise networks and does not account for three unique characteristics of the home: 1) lack of professional administrators, 2) deep heterogeneity, and 3) expectations of privacy.ā€

9.1.3.1No professional administrators

The issues that seem to be related to user difficulties with network security technology are that UIs are built for advanced users with information technology (IT) backgrounds, heterogeneity in users and home networking configurations, and the complexity of problem-solving home network issues. For example, Grinter et al. (...

Table of contents