{"id":309,"date":"2025-04-28T22:06:45","date_gmt":"2025-04-28T22:06:45","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/josephdiep\/?p=309"},"modified":"2025-04-28T22:25:41","modified_gmt":"2025-04-28T22:25:41","slug":"human-error-and-corrective-protocols-as-a-chief-information-security-officer","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/josephdiep\/2025\/04\/28\/human-error-and-corrective-protocols-as-a-chief-information-security-officer\/","title":{"rendered":"Human Error and Corrective Protocols as a Chief Information Security Officer"},"content":{"rendered":"\n<p>Humans are the root cause of a majority of cybersecurity risks and threats. Computers are controlled by an authorized user or an individual with access to a system.<br>\u2756 Human error plays a role in vulnerability along with social engineering manipulating the human thought process.<br>\u2756 Simple and easy to learn training regimen to understand social engineering tactics and steps to secure a workstation.<br>\u2756 Optimize expenses for system log data monitoring technology.<br>Humans can be a major liability in cyber security for companies. Simple training and device monitoring technology could better manage users on an interface.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Human Error and Social Engineering<br><\/h2>\n\n\n\n<p>People are susceptible to making mistakes. In a corporal institute people are root users in direct control of computers. Many times people lack the sufficient means to harden or secure their devices. Here are the many ways a user would fail to reach proper security measures in a work setting, failure to close their devices when unattended, inability to create a complex passphrase, improper data storage, and improper configuration of computers. These are the many ways people fail to properly manage their work station.<br>The main insecurity for humans are social engineered attacks which target the human ability to distinguish from fraudulent or real entities. There are many various ways social engineering can manipulate people into disclosing sensitive information. \u201cSuch as, Phishing, vishing, smishing, whaling and many others.\u201d(Cyberbitsetc) Phishing utilities emails to trick users into believing information that is false. Smishing uses text messaging to trick users, and vishing uses telecommunication to trick people. Phishing is extremely severe as stated in the quote,\u201d over 90% of successful breaches worldwide starting with a phishing email.\u201d(Cyberbitsetc) All of these forms of social engineering seek to fear monger or other manipulations to make users send attackers sensitive data.<\/p>\n\n\n\n<p> <\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Annual Training Regimen<\/h2>\n\n\n\n<p>Many people aren\u2019t formally trained in a work setting to properly work securely online. A simple annual training regimen can be used to train employees the proper ways to manage online use and safely traverse the malicious activity that happens online and in a workplace. Simple training programs can be developed on slide shows to easily demonstrate the ways to identify malicious activity and demonstrate an understanding of company policies when faced with suspicious activity. A simple understanding of the framework can be met to optimize company security. There are other online training websites that aim to train users to identify different phishing scams like https:\/\/phishingquiz.withgoogle.com\/. This will prove useful for training employees to safely use their devices and be cost effective because of its free access online.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">SIEM system<\/h2>\n\n\n\n<p class=\"has-text-align-left\"><br>Since\u201d we live in a \u201czero trust world\u201d(Capone, 1) it is crucial to properly monitor activity in a workplace This is done through technology of the SIEM system this system monitors activity on devices across a network and stores logs on information. The data collected can later be analysed to identify any malicious activity or abnormal activity within a server. This can be crucial because humans can become insider threats and in a world with zero trust it is important to invest in technology that can see any activity done on the network. This will ensure the security of the company remains high.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Sources<\/h2>\n\n\n\n<ul>\n<li>Home | Cyberbitsetc, www.cyberbitsetc.org\/. Accessed 3 Apr. 2025.<\/li>\n\n\n\n<li>Capone, Jeff , et al. \u201cThe Impact of Human Behavior on Security.\u201d CSO Online, 3 Apr.<br>2025,<br>www.csoonline.com\/article\/565488\/the-impact-of-human-behavior-on-security.html.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Humans are the root cause of a majority of cybersecurity risks and threats. Computers are controlled by an authorized user or an individual with access to a system.\u2756 Human error plays a role in vulnerability along with social engineering manipulating the human thought process.\u2756 Simple and easy to learn training regimen to understand social engineering&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/josephdiep\/2025\/04\/28\/human-error-and-corrective-protocols-as-a-chief-information-security-officer\/\">Read More<\/a><\/div>\n","protected":false},"author":30277,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/josephdiep\/wp-json\/wp\/v2\/posts\/309"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/josephdiep\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/josephdiep\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josephdiep\/wp-json\/wp\/v2\/users\/30277"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josephdiep\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/josephdiep\/wp-json\/wp\/v2\/posts\/309\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/sites.wp.odu.edu\/josephdiep\/wp-json\/wp\/v2\/posts\/309\/revisions\/317"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/josephdiep\/wp-json\/wp\/v2\/media?parent=309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josephdiep\/wp-json\/wp\/v2\/categories?post=309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josephdiep\/wp-json\/wp\/v2\/tags?post=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}