{"id":405,"date":"2024-10-11T16:30:56","date_gmt":"2024-10-11T20:30:56","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaroncominio\/?p=405"},"modified":"2024-11-05T11:12:09","modified_gmt":"2024-11-05T16:12:09","slug":"week-7-journal-entry","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/10\/11\/week-7-journal-entry\/","title":{"rendered":"Week 7: Journal Entry 7"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Strengthening the Weakest Link: The Importance of a Human-Centered Cybersecurity Model<\/h2>\n\n\n\n<p>The human-centered cybersecurity model prioritizes human behaviors and interactions with technology to complement technical solutions like firewalls and encryption. Noble (2018) research shows that human cyber errors are responsible for 80-90% of security breaches in the U.S. and the U.K. <a href=\"https:\/\/doi.org\/10.2478\/hjbpa-2018-0024\" data-type=\"link\" data-id=\"https:\/\/doi.org\/10.2478\/hjbpa-2018-0024\" target=\"_blank\" rel=\"noreferrer noopener\">(p. 74)<\/a>. These mistakes can be intentional or unintentional; humans are most often the weakest link in cybersecurity. Organizations can mitigate these human errors by incorporating psychology-based cybersecurity professionals into their cyber teams. This interdisciplinary lens will help highlight costly human-enabled errors like phishing prevention, password management, and security fatigue. Including psychology-focused cybersecurity teams will also ensure human factor assessments are conducted and cyber training is current and relative. A human-centered cybersecurity model will enhance an organization&#8217;s cyber posture by hardening the weakest link: humans.<\/p>\n\n\n\n<p>Below are three memes that demonstrate the importance of human-centered cybersecurity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Human-centered Cybersecurity Memes<\/h3>\n\n\n\n<div class=\"wp-block-cover aligncenter\" style=\"font-size:41px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-40 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" class=\"wp-block-cover__image-background wp-image-406\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-768x1024.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-768x1024.jpg 768w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-225x300.jpg 225w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-1152x1536.jpg 1152w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-1536x2048.jpg 1536w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-630x840.jpg 630w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1-960x1280.jpg 960w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/ghen-mar-cuano-R6dSBkz32B8-unsplash-1.jpg 1920w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p>Thinks cybersecurity training is boring&#8230;.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-left has-large-font-size\">Congrats! You won $1M! Click here to claim your prize!<\/p>\n<\/div><\/div>\n\n\n\n<p>In this meme, we have an employee who completely zones out during human-centered cybersecurity training. She thinks she just won a million dollars from an email received on the company phone. Excited, she will undoubtedly click on the link installing malware that will make its way throughout the organization.<\/p>\n\n\n\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-30 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" class=\"wp-block-cover__image-background wp-image-407\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/cookie-the-pom-gySMaocSdqs-unsplash-1024x683.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/cookie-the-pom-gySMaocSdqs-unsplash-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/cookie-the-pom-gySMaocSdqs-unsplash-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/cookie-the-pom-gySMaocSdqs-unsplash-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/cookie-the-pom-gySMaocSdqs-unsplash-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/cookie-the-pom-gySMaocSdqs-unsplash-960x640.jpg 960w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/cookie-the-pom-gySMaocSdqs-unsplash-450x300.jpg 450w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/cookie-the-pom-gySMaocSdqs-unsplash.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p>Knowing you need to create a strong password&#8230;..<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-left has-large-font-size\">Adding a &#8220;!&#8221; at the end of the same password you have used for years.<\/p>\n<\/div><\/div>\n\n\n\n<p>This meme demonstrates how many employees view password management. This employee is unaware of the importance of changing passwords. They also do not understand the characteristics of a &#8220;strong&#8221; password. This individual keeps a password they have used for years because it is easier than creating a new one.<\/p>\n\n\n\n<div class=\"wp-block-cover\" style=\"min-height:463px\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-30 has-background-dim\"><\/span><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" class=\"wp-block-cover__image-background wp-image-408\" alt=\"\" src=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/brooke-cagle-ICTKcvnXx_8-unsplash-1-1024x683.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/brooke-cagle-ICTKcvnXx_8-unsplash-1-1024x683.jpg 1024w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/brooke-cagle-ICTKcvnXx_8-unsplash-1-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/brooke-cagle-ICTKcvnXx_8-unsplash-1-768x512.jpg 768w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/brooke-cagle-ICTKcvnXx_8-unsplash-1-1536x1024.jpg 1536w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/brooke-cagle-ICTKcvnXx_8-unsplash-1-960x640.jpg 960w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/brooke-cagle-ICTKcvnXx_8-unsplash-1-450x300.jpg 450w, https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-content\/uploads\/sites\/36931\/2024\/10\/brooke-cagle-ICTKcvnXx_8-unsplash-1.jpg 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p>Company spends millions on cybersecurity&#8230;.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-left has-large-font-size\">Still gets hacked because Todd let his new friend borrow his company laptop.<\/p>\n<\/div><\/div>\n\n\n\n<p>Here is a meme displaying how a multimillion-dollar cybersecurity program can be hacked because of human error. Todd is unaware that his new friend is a cybercriminal who has targeted him to hack into his company.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Strengthening the Weakest Link: The Importance of a Human-Centered Cybersecurity Model The human-centered cybersecurity model prioritizes human behaviors and interactions with technology to complement technical solutions like firewalls and encryption. Noble (2018) research shows that human cyber errors are responsible for 80-90% of security breaches in the U.S. and the U.K. (p. 74). These mistakes&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aaroncominio\/2024\/10\/11\/week-7-journal-entry\/\">Read More<\/a><\/div>\n","protected":false},"author":29612,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"[]","wds_primary_category":3},"categories":[3],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/405"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/users\/29612"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/comments?post=405"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/405\/revisions"}],"predecessor-version":[{"id":445,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/posts\/405\/revisions\/445"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/media?parent=405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/categories?post=405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaroncominio\/wp-json\/wp\/v2\/tags?post=405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}