• About
  • Privacy Policy
  • Terms and Conditions
  • Contact
Thursday, September 28, 2023
  • Login
Best Technologies
  • Home
  • News
  • Tech
  • Spotlight

    The Security Hole at the Heart of ChatGPT and Bing

    Revenant Hill is the latest game from Night in the Woods developer

    NSW gov quietly consulting on bug bounty program

    Themis Ecosystem is Moving Strategic Operations to Switzerland

    You can finally view all your saved Wi-Fi passwords in the latest Windows 11 preview

    The surgeon general’s wake-up call for social networks

    Can a camera company make an app that doesn’t suck? Fujifilm tries again

    In Ukraine, Crypto Finds a Purpose

    Why Spotify wants to look like TikTok, with co-president Gustav Söderström

  • Business
  • Space
  • Videos
  • More
    • Mobile
    • Windows
    • Energy
    • Security
    • Health
    • Entertainment
No Result
View All Result
  • Home
  • News
  • Tech
  • Spotlight

    The Security Hole at the Heart of ChatGPT and Bing

    Revenant Hill is the latest game from Night in the Woods developer

    NSW gov quietly consulting on bug bounty program

    Themis Ecosystem is Moving Strategic Operations to Switzerland

    You can finally view all your saved Wi-Fi passwords in the latest Windows 11 preview

    The surgeon general’s wake-up call for social networks

    Can a camera company make an app that doesn’t suck? Fujifilm tries again

    In Ukraine, Crypto Finds a Purpose

    Why Spotify wants to look like TikTok, with co-president Gustav Söderström

  • Business
  • Space
  • Videos
  • More
    • Mobile
    • Windows
    • Energy
    • Security
    • Health
    • Entertainment
No Result
View All Result
Best Technologies
No Result
View All Result
Home News

Why Is Computer Security Advice So Confusing?

by News Room
September 17, 2023
in News
Share on FacebookShare on Twitter

If you’ve ever felt baffled by the computer security instructions provided at your workplace, you’re not alone. A recent study underscores a fundamental issue in the crafting of these guidelines and suggests straightforward measures to enhance them – likely leading to better computer safety.

The concern revolves around the computer security protocols given by institutions, including businesses and government bodies, to their staff. These protocols aim to guide employees in safeguarding both personal and organizational data against dangers like malware and phishing attacks.

“As a computer security researcher, I’ve noticed that some of the computer security advice I read online is confusing, misleading, or just plain wrong,” says Brad Reaves, corresponding author of the new study and an assistant professor of computer science at North Carolina State University. “In some cases, I don’t know where the advice is coming from or what it’s based on. That was the impetus for this research. Who’s writing these guidelines? What are they basing their advice on? What’s their process? Is there any way we could do better?”

For the study, researchers conducted 21 in-depth interviews with professionals who are responsible for writing computer security guidelines for organizations including large corporations, universities, and government agencies.

“The key takeaway here is that the people writing these guidelines try to give as much information as possible,” Reaves says. “That’s great, in theory. But the writers don’t prioritize the advice that’s most important. Or, more specifically, they don’t deprioritize the points that are significantly less important. And because there is so much security advice to include, the guidelines can be overwhelming – and the most important points get lost in the shuffle.”

The researchers found that one reason security guidelines can be so overwhelming is that guideline writers tend to incorporate every possible item from a wide variety of authoritative sources.

“In other words, the guideline writers are compiling security information, rather than curating security information for their readers,” Reaves says.

Drawing on what they learned from the interviews, the researchers developed two recommendations for improving future security guidelines.

First, guideline writers need a clear set of best practices on how to curate information so that security guidelines tell users both what they need to know and how to prioritize that information.

Second, writers – and the computer security community as a whole – need key messages that will make sense to audiences with varying levels of technical competence.

“Look, computer security is complicated,” Reaves says. “But medicine is even more complicated. Yet during the pandemic, public health experts were able to give the public fairly simple, concise guidelines on how to reduce our risk of contracting COVID. We need to be able to do the same thing for computer security.”

Ultimately, the researchers find that security advice writers need help.

“We need research, guidelines, and communities of practice that can support these writers, because they play a key role in turning computer security discoveries into practical advice for real-world application,” Reaves says.

“I also want to stress that when there’s a computer security incident, we shouldn’t blame an employee because they didn’t comply with one of a thousand security rules we expected them to follow. We need to do a better job of creating guidelines that are easy to understand and implement.”

Reference: “Who Comes Up with this Stuff? Interviewing Authors to Understand How They Produce Security Advice” by Lorenzo Neil, Harshini Sri Ramulu, Yasemin Acar and Bradley Reaves, 6 August 2023, USENIX Symposium on Usable Privacy and Security.

Source: Sci Tech Daily

Related Posts

News

What is an ‘AI prompt engineer’ and does every company need one?

September 28, 2023
News

Virus ‘nanobots’ can make harmful bacteria in food and drink glow

September 28, 2023
News

Exoskeleton suit boosts your legs to help you run faster

September 28, 2023
News

Having books in your Zoom background makes you seem more trustworthy

September 27, 2023
News

Unveiling Nanoscale Wonders: Carbon-Based Quantum Technology

September 27, 2023
News

Reflected Wi-Fi signals allow snoopers to read text through walls

September 26, 2023

Trending Now

  • Themis Ecosystem is Moving Strategic Operations to Switzerland

    0 shares
    Share 0 Tweet 0
  • No Qualcomm for the Galaxy A55, rumor has it

    0 shares
    Share 0 Tweet 0
  • Israel’s Tech Companies Are Fighting Netanyahu—or Leaving the Startup Nation

    0 shares
    Share 0 Tweet 0
  • The premium and durable Garmin Fenix 6X Sapphire with up to 21 days of battery life can now be yours for 39% off

    0 shares
    Share 0 Tweet 0
  • The Apple iPad (2022) is once again available at its lowest price on Amazon

    0 shares
    Share 0 Tweet 0

Latest News

News

What is an ‘AI prompt engineer’ and does every company need one?

September 28, 2023
Mobile

Yet another leak reveals Google’s sweet pre-order gift for the non-Pro Pixel 8

September 28, 2023
Entertainment

Xbox will let you automatically back up your game captures on OneDrive

September 28, 2023
Tech

Apple will have to face an antitrust lawsuit alleging iOS Apple Pay dominance

September 28, 2023
Security

CISA warns China’s BlackTech had control of routers

September 28, 2023
News

Virus ‘nanobots’ can make harmful bacteria in food and drink glow

September 28, 2023
Best Technologies

Best Technologies™ is an online tech news portal. It started as an honest effort to provide unbiased and well-suited information on the latest and trending tech news.

Sections

  • Business
  • Energy
  • Entertainment
  • Health
  • Mobile
  • News
  • Security
  • Space
  • Spotlight
  • Tech
  • Windows

Browse by Topic

AI artificial intelligence crime cryptocurrencies data privacy regulation robots security social networks technology ukraine

Recent Posts

  • What is an ‘AI prompt engineer’ and does every company need one?
  • Yet another leak reveals Google’s sweet pre-order gift for the non-Pro Pixel 8
  • Xbox will let you automatically back up your game captures on OneDrive
  • About
  • Privacy Policy
  • Terms and Conditions
  • Contact

© 2022 All Right Reserved - Blue Planet Global Media Network

No Result
View All Result
  • Home
  • News
  • Tech
  • Spotlight
  • Business
  • Space
  • Videos
  • More
    • Mobile
    • Windows
    • Energy
    • Security
    • Health
    • Entertainment

© 2022 All Right Reserved - Blue Planet Global Media Network

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website, you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.