{"id":304,"date":"2024-12-02T04:47:59","date_gmt":"2024-12-02T04:47:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jayceclancey\/?p=304"},"modified":"2024-12-02T04:47:59","modified_gmt":"2024-12-02T04:47:59","slug":"the-human-factor-in-cyberseccurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jayceclancey\/2024\/12\/02\/the-human-factor-in-cyberseccurity\/","title":{"rendered":"The Human Factor in Cyberseccurity"},"content":{"rendered":"\n<p>Jayce Clancey<br>CYSE 200T<br>Professor Duvall<br>11\/10\/24<br>BLUF: With a limited budget prioritizing these three key factors will highly reduce cyber<br>threats. Risk Assessment First, Prioritize Training, and Implement Secure Technology.<br>In a limited budget you want to do the best you can to keep the cybersecurity department<br>up and running. Not only just running, but efficient and protective. As a Chief<br>Information Security Officer this is how I will approach having a budgeted department.<br><\/p>\n\n\n\n<p>1. Risk Assessment First<br>\u25cf I would start with this first to identify high value assets and the threats that<br>are most likely to happen, making sure that we are spending our money on<br>the most vulnerable systems.<br>2. Prioritize Training<br>\u25cf Human error is a big reason as to why cyber attacks happen. Due to this<br>reasoning I will put as much money as I can into training employees to<br>make it less likely that they perform an error.<br>3. Implement Secure Technology<br>\u25cf I would implement Firewalls, MFA, Email filtering, amd basic monitoring<br><\/p>\n\n\n\n<p>In conclusion, having a balanced approach with this budget will provide a strong and safe<br>cyber department. This will better the chances of a cyber threat being contained or not<br>happening at all.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jayce ClanceyCYSE 200TProfessor Duvall11\/10\/24BLUF: With a limited budget prioritizing these three key factors will highly reduce cyberthreats. Risk Assessment First, Prioritize Training, and Implement Secure Technology.In a limited budget you want to do the best you can to keep the cybersecurity departmentup and running. Not only just running, but efficient and protective. As a ChiefInformation&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jayceclancey\/2024\/12\/02\/the-human-factor-in-cyberseccurity\/\">Read More<\/a><\/div>\n","protected":false},"author":29530,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/posts\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/users\/29530"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/posts\/304\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/posts\/304\/revisions\/305"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/media?parent=304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/categories?post=304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/tags?post=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}