Publication Type: Report
Source: IT4Sec Reports, Number 147 (2022)
Keywords: constructive roles
, cyber security
, destructive roles
The idea of developing a catalog of human roles in cyberspace comes from the understanding that in terms of security in the human-computer pair, the weak link is the human, and also from what the cliché says, namely that amateurs attack computers and professionals attack people. The creation of the catalog of roles provides a tool for achieving security in cyberspace by studying and knowing the specific characteristics of destructive roles and the respective constructive human factor roles.