{"id":308,"date":"2023-12-01T19:08:36","date_gmt":"2023-12-01T19:08:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/?p=308"},"modified":"2023-12-01T19:16:51","modified_gmt":"2023-12-01T19:16:51","slug":"the-human-factor-write-up","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/2023\/12\/01\/the-human-factor-write-up\/","title":{"rendered":"The Human Factor Write-Up"},"content":{"rendered":"\n<p><strong>Balancing Trade-Off<\/strong><\/p>\n\n\n\n<p><br>The human factors of cybersecurity, being how people interact with and effect cybersecurity<br>(potentially causing errors), creates a weak point in any company&#8217;s security and opens them up to<br>potential breaches (Human Factors 2023). On one side of cybersecurity people use instances of breeches<br>and issues to come up with solutions and protocols to mitigate those. On the other hand people with<br>similar knowledge of cybersecurity can also use it negatively and in criminal ways which are traditional<br>crimes, white-collar crimes, international crimes and more (Payne et.al 2018). In cybersecurity, knowing<br>what specific attack risks your company has a more likely chance of experiencing would greatly help in<br>your defenses in mitigating the damage of these attacks or even preventing them, \u201c\u2026know the attacker to<br>protect yourself effectively\u201d (Human Factors 2023).<\/p>\n\n\n\n<p><br><strong>Allocating Funds<\/strong><\/p>\n\n\n\n<p><br>Based on the reading on examining patterns and characteristics of cybercrimes, in the U.S the<br>highest amount of cybercrime comes from hacking attacks and fraud (Payne et.al 2018). I would ensure<br>that a large amount of training goes towards mitigating those higher crimes, especially ones that are more<br>likely for certain types of companies, but also maintaining the standard training for all possible<br>cybercrimes. Assessing where breaches or system weaknesses due to human factors have happened in the<br>past and determining where the issue occurred would be the most efficient way to learn what needs to be<br>included in the standard training. The limited funds of the budget should be divided by training expenses,<br>equipment updates (both hardware and software), any other necessary services or resources, any funds<br>necessary for everyday work and a \u2018rainy day\u2019 fund in the case of any breaches or incidents.<\/p>\n\n\n\n<p><br><strong>References<\/strong><\/p>\n\n\n\n<p><strong><br><\/strong>\u201cHuman Factors in Cybersecurity: Protect Yourself.\u201d Telef\u00f3nica Tech, Telef\u00f3nica Tech S.L.U., 11 July<br>2023,<br>telefonicatech.com\/en\/blog\/human-factors-in-cybersecurity#:~:text=The%20human%20factors%<br>20in%20Cybersecurity,for%20a%20company%20or%20organization.<br>Payne, Brian K, et al. Using Labeling Theory as a Guide to Examine the Patterns \u2026 &#8211; Researchgate, Nov.<br>2018,<br>www.researchgate.net\/publication\/328725154_Using_Labeling_Theory_as_a_Guide_to_Examine<br>_the_Patterns_Characteristics_and_Sanctions_Given_to_Cybercrimes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Balancing Trade-Off The human factors of cybersecurity, being how people interact with and effect cybersecurity(potentially causing errors), creates a weak point in any company&#8217;s security and opens them up topotential breaches (Human Factors 2023). On one side of cybersecurity people use instances of breechesand issues to come up with solutions and protocols to mitigate those&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/aurorafrancis\/2023\/12\/01\/the-human-factor-write-up\/\">Read More<\/a><\/div>\n","protected":false},"author":27605,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[4],"tags":[3],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/308"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/users\/27605"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/comments?post=308"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/308\/revisions"}],"predecessor-version":[{"id":312,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/posts\/308\/revisions\/312"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/media?parent=308"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/categories?post=308"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aurorafrancis\/wp-json\/wp\/v2\/tags?post=308"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}