{"id":281,"date":"2022-12-05T02:20:25","date_gmt":"2022-12-05T02:20:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/agai4\/?p=281"},"modified":"2022-12-05T02:26:26","modified_gmt":"2022-12-05T02:26:26","slug":"protecting-availability","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/agai4\/2022\/12\/05\/protecting-availability\/","title":{"rendered":"The Human Factor"},"content":{"rendered":"\n<p>Human Factor In Cyber Security<br>BLUF<br>There are many ways an individual can cause a cyber threat.<br>Involvement of society in cyber threats<br><\/p>\n\n\n\n<p>The involvement of people in cyber threats aren&#8217;t on a small scale as there are heinous<br>groups or acts that impact others through technology. Members that are involved in the Far<br>Rights use mostly mobile devices to recruit members and spread their message. The involvement<br>of White Supremacist in technology increase their ability to act or communicate to others within<br>the same interest, causing it to be an issue since they are looked down upon due to their<br>resentment of other races and religions. But since the majority of these groups are usually<br>located in rural\/low income areas it may be more difficult to adhere to cyber attacks since they<br>may lack proper equipment and knowledge. There may always be a possibility of cyber attacks,<br>but to collect data there are threads of people with the same interest in a web forum. A web<br>forum is an asynchronous way of communicating online where people may ask questions and<br>give responses; individuals with the same interest are in sub-forums.<br>Cyber stalking is the usage of technology and the internet to pursue unwanted<br>communication through technology, making the individual who&#8217;s receiving these acts feel<br>unsecure, fearful, or to feel without authority. Cyber harassment is the act of scarring, annoying,<br>and threatening an individual with unwanted messages with the intention of harming them.<br><\/p>\n\n\n\n<p>Findings<br>When it comes to the data of forums most of the individuals aren\u2019t well informed with the usage<br>of knowledge, since the majority ask questions of technology. There are disadvantages involving<br>Individuals involved in CS and CH, attackers can use third parties to contact and harm victims, the<br>attacker may use the impression of someone else&#8217;s identity, there is a lack of physical evidence.<br>Fukuchi has found \u201cburden shifting devices\u201d as a tool to help hold attackers responsible for CH.<\/p>\n\n\n\n<p>Data collection<br>There has been different forms of harassing and bullying, involving sexual harrasment, name<br>calling, purposeful embarsment, physical threats. Data collected shows 41% of Americans have<br>gone through some type of online harassment. From the data 14% of harassment is caused by<br>political views. 50% are harassed due to sexuality while there are 47% of hispanics and 54%<br>blacks being harassed for race. Data goes to show it is much accessible to harass online.<br><\/p>\n\n\n\n<p>Conclusion<br>In conclusion there should be more training on blockages for apps on harassment or tracking to<br>cancel out the attackers personal information or log into their systems of technology to permit<br>them from harassing or making a continuous number of accounts to keep harassing.<br><\/p>\n\n\n\n<p>References<br>Atske, S. (2021, May 25). The state of online harassment. Pew Research Center: Internet,<br>Science &amp; Tech. Retrieved November 21, 2022, from<br>https:\/\/www.pewresearch.org\/internet\/2021\/01\/13\/the-state-of-online-harassment\/<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Human Factor In Cyber SecurityBLUFThere are many ways an individual can cause a cyber threat.Involvement of society in cyber threats The involvement of people in cyber threats aren&#8217;t on a small scale as there are heinousgroups or acts that impact others through technology. Members that are involved in the FarRights use mostly mobile devices to&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/agai4\/2022\/12\/05\/protecting-availability\/\">Read More<\/a><\/div>\n","protected":false},"author":24904,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/agai4\/wp-json\/wp\/v2\/posts\/281"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/agai4\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/agai4\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/agai4\/wp-json\/wp\/v2\/users\/24904"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/agai4\/wp-json\/wp\/v2\/comments?post=281"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/agai4\/wp-json\/wp\/v2\/posts\/281\/revisions"}],"predecessor-version":[{"id":284,"href":"https:\/\/sites.wp.odu.edu\/agai4\/wp-json\/wp\/v2\/posts\/281\/revisions\/284"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/agai4\/wp-json\/wp\/v2\/media?parent=281"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/agai4\/wp-json\/wp\/v2\/categories?post=281"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/agai4\/wp-json\/wp\/v2\/tags?post=281"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}