{"id":300,"date":"2024-04-08T01:34:14","date_gmt":"2024-04-08T01:34:14","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/?p=300"},"modified":"2024-04-08T02:01:59","modified_gmt":"2024-04-08T02:01:59","slug":"essential-requirements-for-cybersecurity-technology-and-training","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/2024\/04\/08\/essential-requirements-for-cybersecurity-technology-and-training\/","title":{"rendered":"Essential Requirements for Cybersecurity: Technology and Training"},"content":{"rendered":"\n<p><strong>BLUF<\/strong><\/p>\n\n\n\n<p>Cyber threats are constantly evolving, and the safeguarding of important assets require<br>adequate cybersecurity technology and training. Not only do we have to consider outside<br>threats, but we also must acknowledge that a poorly trained staff\/team contributes to<br>exploitations of vulnerabilities in a cyber infrastructure. Allocation of funds needs to be<br>set for appropriate cybersecurity technology and training to significantly decrease<br>breaches and cyber violation<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"410\" src=\"http:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-content\/uploads\/sites\/35754\/2017\/11\/cropped-pace-oregon-state-php-mysql-programming-code-web-design-1-1024x410.jpg\" alt=\"\" class=\"wp-image-86\" style=\"width:842px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-content\/uploads\/sites\/35754\/2017\/11\/cropped-pace-oregon-state-php-mysql-programming-code-web-design-1-1024x410.jpg 1024w, https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-content\/uploads\/sites\/35754\/2017\/11\/cropped-pace-oregon-state-php-mysql-programming-code-web-design-1-300x120.jpg 300w, https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-content\/uploads\/sites\/35754\/2017\/11\/cropped-pace-oregon-state-php-mysql-programming-code-web-design-1-768x307.jpg 768w, https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-content\/uploads\/sites\/35754\/2017\/11\/cropped-pace-oregon-state-php-mysql-programming-code-web-design-1.jpg 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<p><strong>Technology Invites Cyber Threats<\/strong><\/p>\n\n\n\n<p>It is common knowledge that with technological advances, cybersecurity risks and<br>threats also advance and evolve. With the expanse in cybersecurity fields, it is<br>simply supply meeting demand. The more technology and computers needed to<br>maintain an organization, the more cyber threats and crimes will increase. As<br>mentioned before, we do not only have to consider outside threats but also the<br>insider ones. According to Collins et. al., a way to deter crimes within organizations<br>is by exercising crime scripts (2011). These scripts \u201coutline the various steps<br>potential offenders would need to execute in order to circumvent security<br>measures\u2026these scripts allow security officers to devise countermeasures\u2026 (Collins<br>et. al., 2017, p. 795). Knowing the who and why a person would commit an attack<br>can be beneficial in identifying your own vulnerabilities and ensuring gaps are<br>corrected. Collins et. al. also provides data that reflect millions of record breaches<br>due to hacking, insider threats, misuse\/mishandling devices across sectors like<br>healthcare or education (2017). Companies and organizations need to make<br>appropriate investments in their cybersecurity programs.<\/p>\n\n\n\n<p><strong>Comprehensive Budget \u2013 Cyber Tech and Training<\/strong><\/p>\n\n\n\n<p>When it comes to an efficient cybersecurity infrastructure, a cost-benefit analysis<br>would be necessary to see what is appropriate for implementation. Documents like<br>the NIST are effective guidelines and standards that are tailorable protocols and<br>recommendations given depending on the companies\u2019 risks (Nieles et. al., 2017).<br>\u201cBy using these standards, organizations can reduce costs and protect their<br>investments in technology\u201d (Nieles et. al., 2017, p. 55). Using recommendations\/standards                                                          like the NIST, it can assist with meeting the necessary technology without shaving off                                                              cost with critical components. Some components that the NIST suggests are electronic                                                   signatures to limit alterations of files, physical security to monitor and protect assets                                                                    and audits to identify vulnerabilities (Nieles et. al., 2017). Also recommended by NIST,                                            training is a crucial element for a cyber staff to ensure that the scope of their job is fully                                                    understood (Nieles et. al., 2017). \u201cInitial and ongoing training is a cost of successfully                                     incorporating security measures into support and operations activities\u201d (Neiles et. al., 2017, p. 51).                                          We can have all the fancy gadgets to support our cyber infrastructure but without the<br>appropriate training to complement, it can be an unsuccessful endeavor.<\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p>A failsafe cybersecurity program can be attained with reasonable cost that still<br>protect our companies. By understanding the ins and out of identified threats,<br>staying up to date with information on cybersecurity and implementing an<br>appropriate dedicated budget to enhance our cyber programs, we can surely aim at<br>minimizing costly damage control. Overall, we can save money by implementing<br>measure to stave security breaches as much as possible. Without effective<br>cybersecurity, the cost to repair, retrain, or reorganize will cost more in the end.<br>Cyber threats happen in all types of institution or organization, but resources and<br>cost-effective materials can still add adequate protection and ultimately protect<br>company assets.<\/p>\n\n\n\n<p><strong>References<\/strong><\/p>\n\n\n\n<p>Collins, J., Sainato, V.A., &amp; Khey, D.N. (2011). Organizational data breaches 2005-2010:<br>Applying SCP to the healthcare and education sectors [Modules]. Canvas@ODU.<br>https:\/\/portal.odu.edu\/<\/p>\n\n\n\n<p>Nieles, M., Dempsey, K., &amp; Pillitteri, V.Y. (2017). An introduction to information<br>security. [Google Docs]. Canvas@ODU. https:\/\/portal.odu.edu\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF Cyber threats are constantly evolving, and the safeguarding of important assets requireadequate cybersecurity technology and training. Not only do we have to consider outsidethreats, but we also must acknowledge that a poorly trained staff\/team contributes toexploitations of vulnerabilities in a cyber infrastructure. Allocation of funds needs to beset for appropriate cybersecurity technology and training&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/2024\/04\/08\/essential-requirements-for-cybersecurity-technology-and-training\/\">Read More<\/a><\/div>\n","protected":false},"author":28602,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":true,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[8],"tags":[4,3],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-json\/wp\/v2\/posts\/300"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-json\/wp\/v2\/users\/28602"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-json\/wp\/v2\/comments?post=300"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-json\/wp\/v2\/posts\/300\/revisions"}],"predecessor-version":[{"id":307,"href":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-json\/wp\/v2\/posts\/300\/revisions\/307"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-json\/wp\/v2\/media?parent=300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-json\/wp\/v2\/categories?post=300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/elsiegonzalez\/wp-json\/wp\/v2\/tags?post=300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}