Human-Computer Interaction and Cybersecurity Handbook
eBook - ePub

Human-Computer Interaction and Cybersecurity Handbook

Abbas Moallem, Abbas Moallem

  1. 422 páginas
  2. English
  3. ePUB (apto para móviles)
  4. Disponible en iOS y Android
eBook - ePub

Human-Computer Interaction and Cybersecurity Handbook

Abbas Moallem, Abbas Moallem

Detalles del libro
Vista previa del libro
Índice
Citas

Información del libro

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2019

Recipient of the SJSU San Jose State University Annual Author & Artist Awards 2018

Cybersecurity, or information technology security, focuses on protecting computers and data from criminal behavior. The understanding of human performance, capability, and behavior is one of the main areas that experts in cybersecurity focus on, both from a human–computer interaction point of view, and that of human factors. This handbook is a unique source of information from the human factors perspective that covers all topics related to the discipline. It includes new areas such as smart networking and devices, and will be a source of information for IT specialists, as well as other disciplines such as psychology, behavioral science, software engineering, and security management.

Features



  • Covers all areas of human–computer interaction and human factors in cybersecurity
  • Includes information for IT specialists, who often desire more knowledge about the human side of cybersecurity
  • Provides a reference for other disciplines such as psychology, behavioral science, software engineering, and security management
  • Offers a source of information for cybersecurity practitioners in government agencies and private enterprises
  • Presents new areas such as smart networking and devices

Preguntas frecuentes

¿Cómo cancelo mi suscripción?
Simplemente, dirígete a la sección ajustes de la cuenta y haz clic en «Cancelar suscripción». Así de sencillo. Después de cancelar tu suscripción, esta permanecerá activa el tiempo restante que hayas pagado. Obtén más información aquí.
¿Cómo descargo los libros?
Por el momento, todos nuestros libros ePub adaptables a dispositivos móviles se pueden descargar a través de la aplicación. La mayor parte de nuestros PDF también se puede descargar y ya estamos trabajando para que el resto también sea descargable. Obtén más información aquí.
¿En qué se diferencian los planes de precios?
Ambos planes te permiten acceder por completo a la biblioteca y a todas las funciones de Perlego. Las únicas diferencias son el precio y el período de suscripción: con el plan anual ahorrarás en torno a un 30 % en comparación con 12 meses de un plan mensual.
¿Qué es Perlego?
Somos un servicio de suscripción de libros de texto en línea que te permite acceder a toda una biblioteca en línea por menos de lo que cuesta un libro al mes. Con más de un millón de libros sobre más de 1000 categorías, ¡tenemos todo lo que necesitas! Obtén más información aquí.
¿Perlego ofrece la función de texto a voz?
Busca el símbolo de lectura en voz alta en tu próximo libro para ver si puedes escucharlo. La herramienta de lectura en voz alta lee el texto en voz alta por ti, resaltando el texto a medida que se lee. Puedes pausarla, acelerarla y ralentizarla. Obtén más información aquí.
¿Es Human-Computer Interaction and Cybersecurity Handbook un PDF/ePUB en línea?
Sí, puedes acceder a Human-Computer Interaction and Cybersecurity Handbook de Abbas Moallem, Abbas Moallem en formato PDF o ePUB, así como a otros libros populares de Computer Science y Cyber Security. Tenemos más de un millón de libros disponibles en nuestro catálogo para que explores.

Información

Editorial
CRC Press
Año
2018
ISBN
9781351730761
Edición
1
Categoría
Computer Science
Categoría
Cyber Security

Smart networks and devices

nineSmart home network and devices

Abbas Moallem
9.1Introduction
9.1.1Passwords
9.1.2Beyond passwords
9.1.3Network usability problems
9.1.3.1No professional administrators
9.2Home Networking Routes and Feature Management
9.2.1Acquiring a router
9.2.2Connecting router to network
9.2.3Managing home network
9.2.3.1Setting user name and password
9.2.3.2Home networking configuration
9.2.3.3Home networking and user mental image
9.2.3.4Home networking devices and firmware
9.2.3.5Internet of things
9.3Solutions and Challenges
9.3.1Home networking and privacy
9.4Conclusion
References

9.1Introduction

With the speedy expansion of the Internet and Internet-based technologies in homes, the connection of a household to an Internet service provider has become as common as connecting to the basic utility providers for electricity and gas. According to Internet Live Stats (2016), 88.5% of the United States, and 40% of the world population, are Internet users. Users, moreover, are not typically satisfied with having just their computer connected to the Internet. They need wireless connections at home for their computer devices, and cross access connections that allow them to view, modify, and control their computer devices. Users also need to control and monitor security and problem-solve to maintain an uninterrupted Internet connection and a secure network.
Not long ago, home Internet connections were limited to computers. Now, gradually, within a “smart home” (Cheng and Kunz 2009), a wide range of computers and computerized devices can be connected and interact globally and with each other. However, after initial configuration, users are advised to conduct frequent monitoring of the interactions of each device and to frequently check security settings of each device (updating firmware, viewing the connected devices, changing passwords, and so on). Frequent monitoring provides a method of examining the router to ensure that it has not been hacked. For instance, monitoring can display all the devices connected to the user’s network, so any unauthorized devices can be easily identified.
Today, roughly 9 in 10 American adults use the Internet (Pew Research Center 2017). It is estimated that households have 10 connected devices now, projected to rise to 50 connected devices per home by 2020 (Phadnis 2016). More devices mean a wider number of systems and accounts that require user management. For example, managing a switch box that turns one Ethernet connection into several, allowing multiple wired devices to connect to the Internet without overloading the router, or eliminating bottlenecks to make sure that the modem/router can handle the broadband speeds.
Despite the increasing value of the information stored on devices connected to a home wireless network, users are also presented with the threat of network privacy and security breaches. User habits, and knowledge of network features and safety, are thought to have a great impact on risk rates.

9.1.1Passwords

Most users are under the impression that a complex password will keep them safe from breaches. However, reports indicate that even a complex password is not necessarily a secure password (McMilllan 2014). In addition, in October 2107, new research from security researcher Mathy Vanhoef of KU Leuven, in Belgium, found that a flaw in the cryptographic protocols of Wi-Fi protected access II (WPA2) could be exploited to read and steal data that would otherwise be protected. In some situations, this vulnerability even leaves room for an attacker to manipulate data on a Wi-Fi network, or inject new data into it. In practice, that means hackers could steal users’ passwords, intercept their financial data, or even manipulate commands to, say, send their money to hackers (Newman 2017).

9.1.2Beyond passwords

Users who follow the basic device setup guides, but who want to further configure the security of their devices, are struck with two deficiencies: the lack of the knowledge of what proper preventative measures are and the lack of the skill to implement preventive actions [how to do it using device user interface (UI)]. Users with limited networking experience generally claim that managing a home network beyond the basic setup protocols of the devices is a tedious, difficult task.
People who have a home networking device have more than likely experienced a variety of home networking UI issues. They might have even asked someone with technical knowledge to help with installing, connecting, and configuring the device that they acquired or had problems with. No matter the type of device—a wireless router or an interactive TV can very quickly become complicated.

9.1.3Network usability problems

Edwards et al. (2011) concludes that “network usability problems run deep because the technology was initially developed for research labs and enterprise networks and does not account for three unique characteristics of the home: 1) lack of professional administrators, 2) deep heterogeneity, and 3) expectations of privacy.”

9.1.3.1No professional administrators

The issues that seem to be related to user difficulties with network security technology are that UIs are built for advanced users with information technology (IT) backgrounds, heterogeneity in users and home networking configurations, and the complexity of problem-solving home network issues. For example, Grinter et al. (...

Índice

Estilos de citas para Human-Computer Interaction and Cybersecurity Handbook

APA 6 Citation

Moallem, A. (2018). Human-Computer Interaction and Cybersecurity Handbook (1st ed.). CRC Press. Retrieved from https://www.perlego.com/book/1507191/humancomputer-interaction-and-cybersecurity-handbook-pdf (Original work published 2018)

Chicago Citation

Moallem, Abbas. (2018) 2018. Human-Computer Interaction and Cybersecurity Handbook. 1st ed. CRC Press. https://www.perlego.com/book/1507191/humancomputer-interaction-and-cybersecurity-handbook-pdf.

Harvard Citation

Moallem, A. (2018) Human-Computer Interaction and Cybersecurity Handbook. 1st edn. CRC Press. Available at: https://www.perlego.com/book/1507191/humancomputer-interaction-and-cybersecurity-handbook-pdf (Accessed: 14 October 2022).

MLA 7 Citation

Moallem, Abbas. Human-Computer Interaction and Cybersecurity Handbook. 1st ed. CRC Press, 2018. Web. 14 Oct. 2022.