The human factor in Cyber security

Realizing that I have a limited budget, I would balance the tradeoff of training and additional technology by firstly checking the risk it poses. This will help in characterizing the system’s process functions and knowing if the business poses’ high risk or low risk. If its poses’ high risk in aspects like training, cost and safety, I would prepare for more usage of data in terms of the tradeoff. But, if the risk is low, data would not be needed as compared to high risk and due to that, experience would be found. Cyber-attack can have a significant impact on businesses financially and when it come to the business’s reputation. This would save some money. Risk is good when it comes to this because it knows decisions to take and since it’s a limited budget, assessing the risk in the business would help know what and how to spend the money. Proper asset management to help know how to really handle the software and data which will help know exactly what to keep secure. When potential changes are being considered, it may affect human factored by eliminating it which is not beneficial because humans may still be in the new operation. It is best to consider all impacted assists in a tradeoff area. Lastly, business alignment. This would help the business to stay on ahead of any other or any cyber attracts. Security measures should always be taken as it is very important when it came to cyber-attack. This would also when the tradeoff comes up unclear. If the weaknesses are addressed, it would prepare the company for any future or reputation destruction or damage in the business. These three would help a lot because when it comes to decision making, it has both advantages and disadvantages so basically the good part and the bad parts must be weighed to be aware and ready for any hits or kickbacks.


Work cited page
Capone, J. (n.d.). Capone – the impact of human behavior on security. Google Docs. Retrieved February 25, 2022, from https://docs.google.com/document/d/1J3v_V167mktbGVynbtHW8yHXW9onjaBzVASo-behDfY/edit Giordani, J. (2021, June 3).

Council post: How to balance trade-offs between security and privacy in it. Forbes. Retrieved February 28, 2022, from https://www.forbes.com/sites/forbestechcouncil/2021/06/03/how-to-balance-trade-offs-between-security-and-privacy-in-it/?sh=6ada633e66a6 Capone, J. (n.d.). Cyberbitsetc – why is cyber security about human behavior? Google Docs. Retrieved February 28, 2022, from https://docs.google.com/document/d/1QplIrfcKlmkSOuKt9i0Kte72kYrukFeCm1wj9DxpnGU/edit

Leave a Reply

Your email address will not be published. Required fields are marked *