Article: The human factor and information security
Computer Security involves a two-part process of protecting resources. The first component is adding security software and fortifying defenses so that most attacks from the outside can be blocked. The second step is making certain folks follow the best practices in security, so that they resist traps and social engineering schemes.
You can think of step one as placing a fence around the chicken coup to keep the fox out. But if chicken opens the door and lets a disguised fox in, then they've lost the battle. Thus users should always protect their systems with anti-virus, anti-spyware, and firewall software. Secondly, they need to "think before they click" and suspect that any email or instant message could pose harm for their systems.
Key Topics in the article
Computer security as a system
People are part of the system
Security vulnerabilities and some examples