About Engo Fernand

Engo Fernand is a 18 year old boy from Fairfax County aspiring to become a cybersecurity expert  who majors in Cybersecurity at Old Dominion University in Norfolk, Virginia. Engo Fernand enjoys playing football and spending time with his friends sometimes.


 

The Human Factor in Cybersecurity

Cyberthreats, data breaches, and system assaults may all have a significant impact on human factors. I would simply ensure that people’s data is safe and secure, which is a must for any business or system, given the little resources I have. Increase the number of firewalls and other top-tier security instruments in that area of defense. ensuring that all employees have access to a secure connection and that they can log into your accounts without being concerned that outsiders could try to access their data and get personal information. Physical security will also receive some of the funding as there may be workers who are uneasy at work or even intruders who wish to introduce malware or hardware into the system.data theft from users To protect themselves, other people, and the system from cyberattacks as well as physical attacks by irate employees or even intruders, businesses and networks must invest heavily in security.

CIA Triad

Information security is sometimes exemplified by the CIA triad. There was neither a single author nor is it a single doctrine. The CIA triad is critical to information security because it improves overall security, aids firms in remaining compliant with complicated requirements, and guarantees continuity of operations. In order to prevent an unauthorized person from accessing data that may not be theirs, authentication verifies that the user is who they say they are. Authentication may come in a variety of shapes and sizes. Users commonly receive a user ID for identification purposes. When a user provides credentials, such as a password that exactly matches their user ID, authentication takes place. Only a user is required for single-factor authentication.

All that is required is a user ID and password. Businesses have recently reinforced authentication by requesting additional authentication factors. These elements include biometric signatures like a thumbprint or face scan as well as a unique code that is provided to a user’s mobile device during an attempt to sign on. Two-factor authentication is used in this situation.

Authorization is the act of giving someone permission to carry out an action or access a specific resource after the authentication step has been completed and after assessing a person’s level of access. This authorization may be given by a human being or a machine. Authorization is usually used to stop unauthorized access to resources. The majority of internet security tools operate in two stages. First, the user’s identity is confirmed through authentication. Then, based on their identification, the user is granted access to various resources during authorization. The deployment and upkeep of apps rely on the well-designed authorization mechanisms of modern operating systems. Important things to think about. the kind of user, the number of users, the credentials that must be checked, and any associated duties and tasks.

Opportunities for Workplace Deviance

Employees may now act unethically at work quite easily because to cyber technologies. Instead of dealing with staff in person, it may take place online. Due to the difficulty in tracking deviation, organizations find it difficult to manage it, and over time, it may have more negative effects than positive ones. These are only a few examples of workplace misconduct, such as a former employee who could transfer private information onto a computer and sell it to a powerful competitor. There is also the possibility that a worker will decide to disable the organization’s security measures. Therefore, the company can become a target for hackers looking to steal personal information.