{"id":289,"date":"2025-12-08T04:41:45","date_gmt":"2025-12-08T04:41:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/antoine-smith\/?p=289"},"modified":"2025-12-08T04:41:45","modified_gmt":"2025-12-08T04:41:45","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/antoine-smith\/2025\/12\/08\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The Human Factor in Cybersecurity"},"content":{"rendered":"\n<p>Name: Antoine Smith<br>Strategic Budgeting: Balancing Training and Technology in<br>Cybersecurity<br>To maximize impact with limited resources, I would prioritize<br>employee training while maintaining core cybersecurity technologies. This<br>approach addresses the human factor in cyber threats and supports a<br>layered defense strategy.<br>Budget Allocation Strategy<br>As Chief Information Security Officer, I must make informed decisions that<br>reduce risk while staying within budget. Cyber threats frequently stem from<br>human error\u2014clicking phishing links, misconfiguring systems, or using<br>weak passwords. While technology provides automated protection, it cannot<br>fully compensate for poor user behavior. Therefore, I would allocate<br>approximately 65% of the budget to training and 35% to technology,<br>focusing on long-term behavioral change and essential technical safeguards.<br>Prioritizing Training<br>Training empowers employees to recognize and respond to threats.<br>Phishing simulations, secure password practices, and role-based awareness<br>programs help reduce the likelihood of breaches. This week\u2019s readings<br>emphasized that human error remains one of the leading causes of<br>cybersecurity incidents. By investing in training, I strengthen the<br>organization\u2019s first line of defense. However, training must be ongoing;<br>employees may forget protocols or become complacent without regular<br>reinforcement.<br>Maintaining Core Technologies<br>Cybersecurity tools like firewalls, endpoint protection, and intrusion<br>detection systems are essential for monitoring and blocking threats. These<br>technologies offer scalability and consistency, but they can be expensive and<br>require regular updates. Without trained users, even the best tools can be<br>bypassed or misused. That said, I would still invest in baseline protections<br>to ensure coverage against known vulnerabilities and compliance<br>requirements.<br>Strategic Balance<br>By investing more in training, I reduce the likelihood of human mistakes. At<br>the same time, maintaining core technologies ensures that threats are<br>detected and mitigated. This layered approach reflects the defense-in-depth<br>model discussed in the module. It\u2019s not a perfect solution, but it\u2019s practical<br>and sustainable given budget constraints.<br>Conclusion<br>In conclusion, balancing training and technology is essential to managing<br>cyber threats effectively. Training addresses the root cause\u2014human<br>behavior\u2014while technology provides automated defenses. With limited<br>funds, I would lean toward training but ensure that critical systems remain<br>protected. Cybersecurity is a shared responsibility, and both people and<br>tools must work together.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Antoine SmithStrategic Budgeting: Balancing Training and Technology inCybersecurityTo maximize impact with limited resources, I would prioritizeemployee training while maintaining core cybersecurity technologies. Thisapproach addresses the human factor in cyber threats and supports alayered defense strategy.Budget Allocation StrategyAs Chief Information Security Officer, I must make informed decisions thatreduce risk while staying within budget. Cyber threats&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/antoine-smith\/2025\/12\/08\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":31622,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/antoine-smith\/wp-json\/wp\/v2\/posts\/289"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/antoine-smith\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/antoine-smith\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/antoine-smith\/wp-json\/wp\/v2\/users\/31622"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/antoine-smith\/wp-json\/wp\/v2\/comments?post=289"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/antoine-smith\/wp-json\/wp\/v2\/posts\/289\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/sites.wp.odu.edu\/antoine-smith\/wp-json\/wp\/v2\/posts\/289\/revisions\/294"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/antoine-smith\/wp-json\/wp\/v2\/media?parent=289"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/antoine-smith\/wp-json\/wp\/v2\/categories?post=289"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/antoine-smith\/wp-json\/wp\/v2\/tags?post=289"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}