TY - RPRT KW - constructive roles KW - cyber security KW - cyberspace KW - destructive roles KW - hackers AU - Atanas Kuzmanov AU - Venelin Georgiev AB -
The idea of developing a catalog of human roles in cyberspace comes from the understanding that in terms of security in the human-computer pair, the weak link is the human, and also from what the cliché says, namely that amateurs attack computers and professionals attack people. The creation of the catalog of roles provides a tool for achieving security in cyberspace by studying and knowing the specific characteristics of destructive roles and the respective constructive human factor roles.
BT - IT4Sec Reports DO - https://doi.org/10.11610/it4sec.0147 LA - eng M1 - 147 N2 -The idea of developing a catalog of human roles in cyberspace comes from the understanding that in terms of security in the human-computer pair, the weak link is the human, and also from what the cliché says, namely that amateurs attack computers and professionals attack people. The creation of the catalog of roles provides a tool for achieving security in cyberspace by studying and knowing the specific characteristics of destructive roles and the respective constructive human factor roles.
PY - 2022 T2 - IT4Sec Reports TI - Catalog of Human Factor Roles in Cyberspace ER -