This 5-page paper focuses on how to prevent humans from compromising Internet security. Bibliography lists 7 sources.