USC
About this Article
Written by: Austin Bowie
Written on: April 12th, 2016
Tags: computer science, security & defense, communication
Thumbnail by:
About the Author
Austin Bowie is a student at the University of Southern California.
Stay Connected

Volume XVIII Issue I > Are You a Human? Exploring What Web Security Means to You

Conclusion

The gap between the abilities of humans and computers is both tremendous and useful. By creatively leveraging these inherent traits, much more secure environments can be created with little to no noticeable difference to users. However, these examples are just a few in a sea of possibilities. There can be malicious code embedded in emails, malicious code embedded in a web page, and simply browsing the internet over an unsecured connection can allow a malicious third party to see anything and everything a user does. As computers become more and more advanced and humans become more wary and tech-savvy, the environment must change and adapt. However, any security professional will say that the greatest threat to security is not web browsers, web sites, emails or extremely complex programs. By far, the greatest threat to security are humans themselves [5]. Whether it is writing down passwords on a sticky note as a reminder that the rest of the world can also see, or a receptionist simply lets someone in because they are dressed like a technician, time and time again, despite efforts in digital security, it is humans that have to be educated to truly protect what we want protected.

References

    • [1] "Officials warn 500 million financial records hacked", USA TODAY, 2016. [Online]. Available: http://www.usatoday.​com/story/news/polit​ics/2014/10/20/secre​t-service-fbi-hack-c​ybersecuurity/176150​29/. [Accessed: 13- Apr- 2016].
    • [2] "Edward Snowden: Leaks that exposed US spy programme - BBC News", BBC News, 2016. [Online]. Available: http://www.bbc.com/n​ews/world-us-canada-​23123964. [Accessed: 13- Apr- 2016].
    • [3] "The Official CAPTCHA Site", Captcha.net, 2016. [Online]. Available: http://www.captcha.n​et/. [Accessed: 13- Apr- 2016].
    • [4] "Are you a robot? Introducing “No CAPTCHA reCAPTCHA”", Google Online Security Blog, 2016. [Online]. Available: https://security.goo​gleblog.com/2014/12/​are-you-robot-introd​ucing-no-captcha.htm​l. [Accessed: 13- Apr- 2016].
    • [5] M. Smith, "The Human Factor: The hidden cyber security vulnerability inside every business - Business Reporter", Business Reporter, 2016. [Online]. Available: http://business-repo​rter.co.uk/2016/03/1​0/human-factor-hidde​n-cyber-security-vul​nerability-every-bus​iness/. [Accessed: 13- Apr- 2016].
    • [6] "10 Important Differences Between Brains and Computers", Developing Intelligence, 2016. [Online]. Available: http://scienceblogs.​com/developingintell​igence/2007/03/27/wh​y-the-brain-is-not-l​ike-a-co/. [Accessed: 13- Apr- 2016].
    • [7] K. LLC, "How to Unlock iPhone with Forgotten Passcode @ EveryiPhone.com", Everymac.com, 2016. [Online]. Available: http://www.everymac.​com/systems/apple/ip​hone/iphone-troubles​hooting-repair-faq/i​phone-how-to-unlock-​open-forgot-code-pas​scode-password-login​.html. [Accessed: 13- Apr- 2016].