{"id":380,"date":"2024-12-07T20:26:25","date_gmt":"2024-12-07T20:26:25","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/?p=380"},"modified":"2024-12-07T20:49:43","modified_gmt":"2024-12-07T20:49:43","slug":"week-7-journal-entry-7","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/2024\/12\/07\/week-7-journal-entry-7\/","title":{"rendered":"Week 7 &#8211; Journal Entry 7"},"content":{"rendered":"\n<p>Humans are irrational thinkers and are a part of cybersecurity systems. Humans must be understood like any other form of technology used in any computer system. We must understand the development of the human mind. In other words, what are the strengths and weaknesses of the human mind? Humans differ from technology in that humans are unlikely to change much. We design machines to have new features and architecture constantly, which isn\u2019t possible for the human brain. Thus, technologies must change to be like the brain to make computer systems more effective and not the other way around. Cybersecurity professionals should consider the psychology of error and manipulation to create technology that complements the human brain. Unfortunately, this is an incredibly challenging feat to accomplish as we still don\u2019t understand the complexities of the human mind. These memes that I have created relate to human-centered cybersecurity in which computer systems should be created with humans in mind. However, creating psychology-aware systems is a major challenge for security technology and will be an existing issue for a long time. Thus, effective cybersecurity systems will depend on humans making good decisions or else, the humans that made the mistake get blamed, which indicates the human needs to be fixed. An issue with blaming humans is that they\u2019re not part of the system, and the failures happen within the technology. Overall, understanding human errors and why they occur can lead to better design of security systems and allow humans to better engage with cybersecurity.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"751\" height=\"476\" src=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image.png\" alt=\"\" class=\"wp-image-420\" srcset=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image.png 751w, https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image-300x190.png 300w, https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image-473x300.png 473w\" sizes=\"(max-width: 751px) 100vw, 751px\" \/><\/figure>\n\n\n\n<p>Cybersecurity awareness training: \u201cWhen you see a suspicious email in your inbox, do not open its attachments or links.\u201d&nbsp;<\/p>\n\n\n\n<p>One person: Accidentally opens link of suspicious email to have login credentials stolen.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"484\" height=\"582\" src=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image.jpeg\" alt=\"\" class=\"wp-image-418\" srcset=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image.jpeg 484w, https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image-249x300.jpeg 249w\" sizes=\"(max-width: 484px) 100vw, 484px\" \/><\/figure>\n\n\n\n<p>Scrolling mindlessly for hours through someone\u2019s social media page to learn about that person in greater detail.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"876\" height=\"657\" src=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image-1.jpeg\" alt=\"\" class=\"wp-image-419\" srcset=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image-1.jpeg 876w, https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image-1-300x225.jpeg 300w, https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image-1-768x576.jpeg 768w, https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-content\/uploads\/sites\/37108\/2024\/12\/image-1-400x300.jpeg 400w\" sizes=\"(max-width: 876px) 100vw, 876px\" \/><\/figure>\n\n\n\n<p>The face after wiring money to a friend after learning it\u2019s a scam.&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Humans are irrational thinkers and are a part of cybersecurity systems. Humans must be understood like any other form of technology used in any computer system. We must understand the development of the human mind. In other words, what are the strengths and weaknesses of the human mind? Humans differ from technology in that humans&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bach-niendoan\/2024\/12\/07\/week-7-journal-entry-7\/\">Read More<\/a><\/div>\n","protected":false},"author":29388,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/380"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/users\/29388"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/comments?post=380"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/380\/revisions"}],"predecessor-version":[{"id":421,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/posts\/380\/revisions\/421"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/media?parent=380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/categories?post=380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bach-niendoan\/wp-json\/wp\/v2\/tags?post=380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}