{"id":294,"date":"2024-04-19T01:11:12","date_gmt":"2024-04-19T01:11:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bfont002\/?p=294"},"modified":"2024-04-19T01:11:12","modified_gmt":"2024-04-19T01:11:12","slug":"write-up-the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/bfont002\/2024\/04\/19\/write-up-the-human-factor-in-cybersecurity\/","title":{"rendered":"Write Up &#8211; The Human Factor in Cybersecurity"},"content":{"rendered":"\n<p><br><strong>Introduction<\/strong><br>If I were the Chief Information Security Officer with a limited budget, I would<br>prioritize the most effective and cost-friendly options in order to combat and prevent<br>cyber attacks. Balancing the trade-off of training and implementing additional<br>cybersecurity technology in the right way is essential.<br><strong>Human Factor<\/strong><br>Firstly, I would focus on preventing cyber attacks by training. Training employees<br>in extensive, comprehensive ways, can avoid the exposure to risk factors that lead to<br>cyber attacks. Moreover, training on how to combat attacks in case they do happen is<br>also an easier way to have a safe base for any organization. This training would provide<br>information on specific situations in which there is higher vulnerability, or<br>understanding the psychology of hackers behind the screen, meaning having awareness<br>on what they are trying to get, if it is access to monetary funds or confidential<br>information; and their tendencies or common strategies to do so.<br><strong>Technology Factor<\/strong><br>On the other hand, adding cybersecurity technology can enhance the overall<br>safety and security of the organization. Human error is certainly a factor and as the<br>Chief Information Security Officer I should understand that hackers are also trained and<br>skilled, and they are high in number. This resource would be, in case the training and<br>employees\u2019 skills fail, to still have a reliable \u201cback-up\u201d wall to maintain the safety of the<br>organization. The main technologies I would implement are, in the first place, platforms<br>that inform and alert workers of the risk, such as anti-virus or intrusion detection<br>systems, in order for them to have additional trust in their skills as now they will most<br>likely not miss the risk, and encryption for confidential data (Elazari, 2014). These<br>programs are effective and not expensive, however if the demand for cybersecurity<br>continues to grow, another option would be to consider advanced technologies such as<br>endpoint detention and response solutions, or threat intelligence platforms.<br><strong>Conclusion<\/strong><br>To conclude, it is possible to maintain an overall highly effective cybersecurity<br>base with a limited budget. As long as there is a wisely balanced system of human<br>training and technological factors throughout the organization, the risks will be<br>minimized and well resolved when addressed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IntroductionIf I were the Chief Information Security Officer with a limited budget, I wouldprioritize the most effective and cost-friendly options in order to combat and preventcyber attacks. Balancing the trade-off of training and implementing additionalcybersecurity technology in the right way is essential.Human FactorFirstly, I would focus on preventing cyber attacks by training. Training employeesin extensive,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bfont002\/2024\/04\/19\/write-up-the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":28603,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/users\/28603"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/posts\/294\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bfont002\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}