{"id":301,"date":"2025-04-24T21:19:40","date_gmt":"2025-04-24T21:19:40","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/isaac-huston\/?p=301"},"modified":"2025-04-24T21:19:40","modified_gmt":"2025-04-24T21:19:40","slug":"computers-humans-cybersecurity-requires-both","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/isaac-huston\/2025\/04\/24\/computers-humans-cybersecurity-requires-both\/","title":{"rendered":"Computers &amp; Humans: Cybersecurity Requires both."},"content":{"rendered":"\n<p><strong>Name:<\/strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Isaac Huston<\/p>\n\n\n\n<p><strong>Date:<\/strong> April 1, 2025<\/p>\n\n\n\n<p><a><\/a>Computers &amp; Humans: Cybersecurity Requires both.<\/p>\n\n\n\n<p><em>Information security requires defense in depth. As computer systems become more advanced and secure, the ability to breach a system which stores sensitive data begins to rely more heavily on the human component of which most systems require. Having properly trained humans and adequately secured systems are both critical and has importance of which cannot be ignored. The budget within an organization should reflect this.<\/em><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Computers<\/h1>\n\n\n\n<p>Computers are integral to how the world works and have been evolving to become more secure year over year. They are not secure by default, though. They require proper configuration based on the environment they are deployed in. If that configuration is off, the entire system can be vulnerable even if the technology supports strong security frameworks. Relying on manual setup or inconsistent practices opens the door to mistakes, which attackers are looking to exploit. This is why automation and default protections are critical for reducing risk, especially when users are left to decide what needs protection and what doesn\u2019t (Capone, 2018).<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Humans<\/h1>\n\n\n\n<p>The human element in information security can be fragile. Most systems rely on people to function, and every person is a potential point of failure. A single mistake like clicking a phishing link can bring down an entire organization. Security training is a necessity. People need to be trained, shown how to interact with systems securely, and made aware of how their behavior impacts risk. In a way, users have to be configured just like the systems they use. Over 90% of breaches start with phishing, which proves attackers are relying more on human behavior than technical flaws (Cyberbitsetc.org, n.d.)<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><a><\/a>Conclusion<\/h1>\n\n\n\n<p>Defense in depth works best when both people and technology are part of the strategy. No single solution is enough by itself. The right balance between tech investment and user training depends on the business, what kind of data it handles, what risks are acceptable, and how operations run. Proper information security involves knowing where your weak points are and spending where it counts. The spending can lean heavily toward computers or people.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><a><\/a>References<\/h1>\n\n\n\n<p>Capone, J. (2018, May 25). The impact of human behavior on security. Retrieved from https:\/\/www.helpnetsecurity.com\/2018\/05\/25\/human-behavior-cybersecurity\/<\/p>\n\n\n\n<p>Cyberbitsetc.org. (n.d.). Why is Cyber Security About Human Behavior? Retrieved from https:\/\/www.cyberbitsetc.org\/why-is-cyber-security-about-human-behavior<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Isaac Huston Date: April 1, 2025 Computers &amp; Humans: Cybersecurity Requires both. Information security requires defense in depth. As computer systems become more advanced and secure, the ability to breach a system which stores sensitive data begins to rely more heavily on the human component of which most systems require. Having properly trained humans&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/2025\/04\/24\/computers-humans-cybersecurity-requires-both\/\">Read More<\/a><\/div>\n","protected":false},"author":30346,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/posts\/301"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/users\/30346"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/comments?post=301"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/posts\/301\/revisions"}],"predecessor-version":[{"id":302,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/posts\/301\/revisions\/302"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/media?parent=301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/categories?post=301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/tags?post=301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}