Rebooting IT Security Awareness - How Organisations Can Encourage and Sustain Secure Behaviours.
M. Angela SasseJonas HielscherJennifer FriedauerAnnalina BuckmannPublished in: CyberICPS/SECPRE/SPOSE/CPS4CIP/CDT&SECOMAN/EIS/SecAssure@ESORICS (2022)
Keyphrases
- security requirements
- security issues
- security measures
- security level
- security mechanisms
- key management
- security management
- security services
- data encryption
- security architecture
- key agreement protocol
- security analysis
- stream cipher
- security protocols
- integrity verification
- security model
- security properties
- authentication mechanism
- private key
- diffie hellman
- trusted computing
- sensitive data
- information security
- mobile agent system
- access control
- data security
- key exchange
- key exchange protocol
- secure communication
- electronic voting
- public key encryption
- public key
- cryptographic protocols
- user authentication
- authentication protocol
- identity management
- security patterns
- high security
- situation awareness
- key distribution
- secret key
- digital signature scheme
- secure routing
- security policies
- encryption scheme
- authentication scheme
- mutual authentication
- key management scheme
- secure multiparty computation
- rfid systems
- previously mentioned
- factor authentication
- public key cryptosystem
- single point of failure
- smart card
- countermeasures
- covert channel
- key establishment
- privacy preserving
- intrusion detection
- rfid tags
- information leakage
- unauthorized access
- cloud computing