I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.
DECLARATION
I, [type your full first names and surname here], declare that the contents of this dissertation/thesis represent my own unaided work, and that the dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of the University.
Signed __________________ Date _________________
Abstract
This paper examines "accidental" determinants (i.e., altering role of network administrators) and "deliberate" determinants (i.e. violations) in CIS. According to conceive conference macroergonomic work evolved by Smith and Carayon, the conceive work can be conceptualized as having five elements: one by one, task, gear and technologies, natural natural environment and organization. interaction of these constituents can be considered of location that assists change role of network administrator and violations. These mistakes can deduct deduction of security vulnerabilities and seldom breaks up, if vulnerability is exploited. Design work we have utilised conference as the direct differentiate undoubted class of constituents that can assist change role of network administrators and violations. Issue of human mistake and violation of computer security and data was discovered through the sequence of 16 meetings with network administrators and security specialists. Interviews were strip noted, transcribed and investigated by cipher of exact pieces in the structure of nodes. Result is an amplified structure that classifies kinds of human mistakes and recognises human and organizational components that assist to computer security and information. Network administrators are inclined to glimpse mistakes conceived by end users as more intentional and unintentional, while mistakes conceived by network administrators as more unintentional than intentional. Organizational components, for example connection, security heritage, government and organizational structure were most often cited components associated to computer security and information.
Table of Contents
ABSTRACT1
CHAPTER I: INTRODUCTION4
Introduction4
Aims6
Objectives6
CHAPTER II: LITERATURE REVIEW8
Conceptual framework8
Analysis of system administrator practices12
Collaboration and coordination12
Testing and planning17
Situation Awareness21
Multitasking, interruptions, deviations23
WAS administrative console27
WAS autonomic capabilities29
Strategies for resource acquisition and exchange34
Resource Types36
CHAPTER III: METHODOLOGY38
Shows38
Data Collection39
Data analysis39
CHAPTER IV: RESULTS43
Errors contributing to vulnerabilities and security breaches43
Work system elements that contribute to errors46
Individual elements48
Task and environmental elements49
Technology elements51
Organizational elements52
CHAPTER V: DISCUSSION55
CHAPTER VI: CONCLUSION64
References66
Notes70
Appendix A. Interview guide82
The Changing Role of Network Administrators
Chapter I: Introduction
Introduction
National Research Council Computer Science and Telecommunications (2002) has differentiated between unintentional and premeditated determinants of poor equipment and facts and numbers security (CIS): "accidental determinants are natural (eg, an increase of the beam that decimates the source of feeding the network that determinants part of network to fail) or, for demonstration humans, but unintentional (accidental programming error that determinants the computer to shatter into in certain attenuating constituents, or unintentional chopping of the communications rotated cord all through excavation .) Accidental determinants number prominently in many facets of reliability to for demonstration of security, for demonstration security or reliability. intentional determinants are conclusion of attentive human choice. "(National Research Council Computer Science and Telecommunications, 2002, pp 3-4). In publications of CIS, on cause determinants cited to ...