The Human Factor Write-Up

Balancing Trade-Off


The human factors of cybersecurity, being how people interact with and effect cybersecurity
(potentially causing errors), creates a weak point in any company’s security and opens them up to
potential breaches (Human Factors 2023). On one side of cybersecurity people use instances of breeches
and issues to come up with solutions and protocols to mitigate those. On the other hand people with
similar knowledge of cybersecurity can also use it negatively and in criminal ways which are traditional
crimes, white-collar crimes, international crimes and more (Payne et.al 2018). In cybersecurity, knowing
what specific attack risks your company has a more likely chance of experiencing would greatly help in
your defenses in mitigating the damage of these attacks or even preventing them, “…know the attacker to
protect yourself effectively” (Human Factors 2023).


Allocating Funds


Based on the reading on examining patterns and characteristics of cybercrimes, in the U.S the
highest amount of cybercrime comes from hacking attacks and fraud (Payne et.al 2018). I would ensure
that a large amount of training goes towards mitigating those higher crimes, especially ones that are more
likely for certain types of companies, but also maintaining the standard training for all possible
cybercrimes. Assessing where breaches or system weaknesses due to human factors have happened in the
past and determining where the issue occurred would be the most efficient way to learn what needs to be
included in the standard training. The limited funds of the budget should be divided by training expenses,
equipment updates (both hardware and software), any other necessary services or resources, any funds
necessary for everyday work and a ‘rainy day’ fund in the case of any breaches or incidents.


References


“Human Factors in Cybersecurity: Protect Yourself.” Telefónica Tech, Telefónica Tech S.L.U., 11 July
2023,
telefonicatech.com/en/blog/human-factors-in-cybersecurity#:~:text=The%20human%20factors%
20in%20Cybersecurity,for%20a%20company%20or%20organization.
Payne, Brian K, et al. Using Labeling Theory as a Guide to Examine the Patterns … – Researchgate, Nov.
2018,
www.researchgate.net/publication/328725154_Using_Labeling_Theory_as_a_Guide_to_Examine
_the_Patterns_Characteristics_and_Sanctions_Given_to_Cybercrimes.

Leave a Reply

Your email address will not be published. Required fields are marked *