{"id":276,"date":"2021-12-05T20:59:29","date_gmt":"2021-12-05T20:59:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/?p=276"},"modified":"2021-12-05T20:59:30","modified_gmt":"2021-12-05T20:59:30","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/2021\/12\/05\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The Human Factor In Cybersecurity"},"content":{"rendered":"\n<p><strong>The Human Factor In cybersecurity<br><\/strong>Jayden Maddox<br>From 10\/17\/21<\/p>\n\n\n\n<p><br>There are many different assets that go into cybersecurity. Two of those assets are the various<br>advancements of technology in the cybersecurity field and the people trained to operate behind<br>that technology. Companies also have to be very smart with their budgeting between both of<br>these assets. There can be a few different ways a company can manage a budget and balance the<br>tradeoff between training and new technology.<br>Even though it might be more expensive I would personally put more effort towards the<br>technology-based assets and not as much on training human employees but not remove them<br>from the picture entirely. I would put most of my budget toward a more automated or<br>technology-based asset because an automated system can process and hold more information<br>faster than a human can. Humans can often make mistakes and in the cybersecurity world<br>mistakes can be crucial to the security of important documents and an entire company all<br>together. On the other hand, automated technology systems can be programed to have the<br>slightest chance of ever making a mistake.<br>Now there are a few reasons I would not put all of my budget toward the technological side and<br>put some aside to train human employees. Some threats are dependent on the cooperation of<br>humans. Humans play a big role in any technology field because the systems and AI used are<br>programed by humans and machine intelligence simply cannot match up to human intelligence.<br>Cybercriminals often find ways to adapt machine learning and find ways to bypass networks<br>without being detected, which is another reason humans are important in the cybersecurity field.<br>The security monitoring systems also require human attention and human interaction. This is<br>how I would spread my budget between training human employees and enhancing technology.<br>Citations:<br>https:\/\/www.cyberbitsetc.org\/post\/cybersecurity-as-a-behavioural-science-part-1<br>https:\/\/www.csoonline.com\/article\/3275930\/the-impact-of-human-behavior-on-security.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Human Factor In cybersecurityJayden MaddoxFrom 10\/17\/21 There are many different assets that go into cybersecurity. Two of those assets are the variousadvancements of technology in the cybersecurity field and the people trained to operate behindthat technology. Companies also have to be very smart with their budgeting between both ofthese assets. There can be a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jayden-maddox\/2021\/12\/05\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":21985,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/wp-json\/wp\/v2\/posts\/276"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/wp-json\/wp\/v2\/users\/21985"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/wp-json\/wp\/v2\/comments?post=276"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/wp-json\/wp\/v2\/posts\/276\/revisions"}],"predecessor-version":[{"id":277,"href":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/wp-json\/wp\/v2\/posts\/276\/revisions\/277"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/wp-json\/wp\/v2\/media?parent=276"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/wp-json\/wp\/v2\/categories?post=276"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayden-maddox\/wp-json\/wp\/v2\/tags?post=276"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}