• ISSN: 2010-3646
    • Abbreviated Title: Int. J. Social. Scienc. Humanit.
    • Frequency: Bimonthly (2011-2014); Monthly (2015-2018); Quarterly (Since 2019)
    • DOI: 10.18178/IJSSH
    • Editor-in-Chief: Prof. Aurica Briscaru
    • Executive Editor: Mr. Ron C. Wu
    • Abstracting/ Indexing: Google Scholar, Index Copernicus, Crossref, Electronic Journals Library
    • E-mail: ijssh@ejournal.net
IJSSH 2016 Vol.6(11): 852-858 ISSN: 2010-3646
doi: 10.18178/ijssh.2016.V6.761

IT Security Trust Model - Securing the Human Perimeter

Ileen E. Van Vuuren
Abstract—There are numerous technical advances in the field of Information Security (IS). Despite the application of these IS technological controls, it is often not enough to address security issues due to the vulnerable human component. With a considerable amount of support in literature, there is no doubt that the human factor is a major weakness in preventing IS breaches. The true level of security in technology and process relies on the people involved in its use and implementation. Thus, human factors play an increasing role in securing computer information assets and therefore are detrimental to the security of an organization. One of the most prominent aspects of security, which is linked to humans, is trust. It is safe to presume that trust will play an important role in any IS environment and may influence security behavior significantly. In this paper the findings of a prior study, which focused on identifying human security elements, their relationship with, and consequently their influence on trust, are explored further. This paper builds upon the prior study of identified human security elements, which spawns IS trust factor elements of a previously proposed IT Security Trust (ITST) Model. Furthermore, the paper adapts and expands the original ITST Model, renamed to Information Security DNA Model, providing insight into and recommendations on how the trust factor elements may be utilized in an attempt to manipulate human behavior in such a manner to equip employees with the necessary behavioral attributes for combatting social engineering related attacks within organizations which choose to follow an IS model built on the foundation of trust.

Index Terms—Information security, social engineering, human factor, trust factors, trust, smart trust, information security DNA model, IT security trust model.

Ileen E. Van Vuuren is with the Science, Engineering and Technology Department, School of Computing, University of South Africa, South Africa (e-mail: ileenvv@gmail.com).


Cite: Ileen E. Van Vuuren, "IT Security Trust Model - Securing the Human Perimeter," International Journal of Social Science and Humanity vol. 6, no. 11, pp. 852-858, 2016.

Copyright © 2008-2020. International Journal of Social Science and Humanity. All rights reserved.
E-mail: ijssh@ejournal.net