HUMAN FACTORS AFFECTING DIGITAL SECURITY
Keywords:Certifying Authority (Ca), Cryptography, Collective Intelligence, Digital Signature Certificate (Dsc), Encryption, Pki, Steganography
World is getting digital at an exponential rate. Commonplace activities are accomplished increasingly over digital platform to bring in requirement of digital security in place of only physical security. Security (physical or digital or both) is essential for safe storage, retrieval and exchange of physical or digital data and documents. As data/information/knowledge leading to wisdom are increasingly getting endowed with economic values the risk for such assets being pilfered are also increasing. This requires methods for their security being augmented continuously. Society from past to present days are putting their best efforts in this end. Generally, it is achieved through hiding the message from predator’s greedy glare and ensuring its temper-free safe passage to desired destination with deception in various forms. Associated processes are complex and during initial days were executed with various forms of arts and riddles. Over years technology driven solutions were evolved to ensure today’s digital security requirements ,.
Motivation/Background: Presently occurrence of digital security disasters is not few and far between, instead they are alarmingly many, though technology for digital security is improving by leaps and bounds. More often than not, in case of a digital catastrophe dominant foot prints of human involvement are found along with technical snags. It may be noted that technical failure can be assessed and rectified in an organized way though causes of human involvement are difficult to judge as they are much abstract in nature and difficult to measure. Thus, this effort to explore human role in digital disaster.
Method: In present text traditional to most current practices of securing data storage, retrieval and disbursal are touched upon. During earlier days data hiding technique from predator’s glare had been more of an artistic than scientific form. Over years mathematical and statistical approach were induced to make the system more robust though secrets are exposed even today at an alarming rate and at times by their own creators to usher security disasters. As the discussion progressed results from secondary sources are presented to make a broad statement on current scenario. Finally, indicators like NCSI (National Cyber Security Index) and DDL (Digital Development Level) from NCSI site and HDI (Human Development Index) from Human Development Report of 2019, produced by UNDP, are considered for analysis to have better insight. These figures are available on public domain for general referral ,.
Results: It has been observed that beyond technical complications, human factors play a dominant role in ensuring security.
Angsuman Das, Avishek Adhikari, On Constructions and Security Notions of Public-key Cryptosystems; Book Chapter, Contemporary Topics in Mathematics and Statistics with Applications, Volume-I, Asian Books Pvt Ltd., 2012; academia.edu/2904162
B. Preneel et al, New Trends in Cryptology, Document Reference ENS-D4-1.1, Version 1.1, February 21, 2003
Benjamin A. Saltzman Early Medieval Cryptography, Textual Errors, and Scribal Agency; SPECULUM; A journal of Medieval Studies
Cortada J. W, Gupta A.M. Le Noir Marc; How Nations thrive in the Information Age, IBM Institute for Business Value, IBM Global Business Services,
Cyber Threats Report, Netwrix; 2020;
DELL, “Evolving Security to Accommodate the Modern Worker” Statistics based on a study conducted by Forrester Consulting commissioned by Dell, ",” October 2017.
Dutta Avijit, Digital Security: An Enigma, Springer Nature Singapore Pte Ltd. 2018, M. U. Bokhari et al. (eds.), Cyber Security, Advances in Intelligent Systems and Computing 729, https://doi.org/10.1007/978-981-10-8536-9_25. DOI: https://doi.org/10.1007/978-981-10-8536-9_25
Dutta Avijit; Digital Security: A Moving Target, International Journal of Electrical Electronics & Computer Science Engineering Special Issue - TeLMISR 2015, ISSN, ISSN: 2348-2273,
Jonathan Katz and Yehuda Lindell; Introduction to Modern Cryptography; Book; 2007 DOI: https://doi.org/10.1201/9781420010756
Karlene C.Cousinsa, DanielRobeyb; Human agency in a wireless world: Patterns of technology use in nomadic computing environments; Information and Organization; Volume 15, Issue 2, April 2005, Pages 151-180 DOI: https://doi.org/10.1016/j.infoandorg.2005.02.008
Matthew K. Franklin, Lucas Chi Kwong Hui, Duncan S.Wong (Eds.), Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008, Proceedings DOI: https://doi.org/10.1007/978-3-540-89641-8
Ruth M Davis, Evolution of Computers and Computing, Science Vol. 195; Science 18 Mar 1977:
Vol. 195, Issue 4283, pp. 1096-1102; DOI: 10.1126/science.195.4283.1096 DOI: https://doi.org/10.1126/science.195.4283.1096
The Role of Access Control in Information Security - Hashed Out by The SSL Store; 11/14/2020
Tim O’Reilly and John Battelle; Web Squared: Web 2.0 Five Years On; Special Report
Weiser, M.; The Computer for the 21st Century, Scientific American, September 1991, Pages 94-104 DOI: https://doi.org/10.1038/scientificamerican0991-94
Weiser Mark and John Seely Brown; THE COMING AGE OF CALM TECHNOLOGY; Xerox PARC, October 5, 1996 DOI: https://doi.org/10.1007/978-1-4612-0685-9_6
How to Cite
With the licence CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.
It is not necessary to ask for further permission from the author or journal board.
This journal provides immediate open access to its content on the principle that making research freely available to the public supports a greater global exchange of knowledge.