{"id":123,"date":"2021-09-14T13:39:07","date_gmt":"2021-09-14T13:39:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2021-12-06T03:14:08","modified_gmt":"2021-12-06T03:14:08","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/cyse-301\/","title":{"rendered":"A Not So Unlikely Pair; The Link Between Cybersecurity and Human Behavior."},"content":{"rendered":"\n<div class=\"wp-block-file\"><a href=\"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/wp-content\/uploads\/sites\/26021\/2021\/12\/Human-Behavior-Write-Up-2.docx\">Human-Behavior-Write-Up-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/wp-content\/uploads\/sites\/26021\/2021\/12\/Human-Behavior-Write-Up-2.docx\" class=\"wp-block-file__button\" download>Download<\/a><\/div>\n\n\n<h1 style=\"text-align: center\">\u00a0<\/h1>\n<h1><span style=\"font-weight: 400\">Name: Kayla MacPherson<\/span><\/h1>\n<h1><span style=\"font-weight: 400\">Date: October 21,2021<\/span><\/h1>\n<h1><span style=\"font-weight: 400\">Details<\/span><\/h1>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><span style=\"font-weight: 400\">A square is always a rectangle, but a rectangle is not always a square. Although debatable in specific counter-cases, the motives, desires, risks and more of cybersecurity always go back to human behavior, but human behavior does not always go back to cybersecurity. The dual ends of a computer screen of the innocent old man falling for a phishing email and the hacker thousands of miles away are both controlled by their own and one another\u2019s behavior.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Cybersecurity would be nowhere as advanced as it is today if it was not for the purposeful analysis of human behavior. Enough so to wonder would there <\/span><i><span style=\"font-weight: 400\">really<\/span><\/i><span style=\"font-weight: 400\"> be cybersecurity without it. Even if we attempted not to allow it to influence either side of cybersecurity, it would still indirectly navigate the way in which we analyze the cybersecurity world. Truthfully, there\u2019s little to no point not to consider it. A Cyberbitsec article based on their work with Mark Skilton is able to state it best, behavior science allows us to understand and explain cybersecurity \u201cacross different dimensions\u201d. The complexity of our world does mark it necessary that we do not have one sound principle to follow. Understanding individualized and specific perspectives allows new developments to encompass skills and technology that is overall more accessible for all.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Why accessible though? Capone is truthful when he discusses the implications of human error within the cybersecurity world in his article, <\/span><i><span style=\"font-weight: 400\">The impact of human behavior on security<\/span><\/i><span style=\"font-weight: 400\">. The easier something is to use, the easier it is to go wrong as well. Humans are going to and do promote risks to themselves as both consumers or businesses, no matter how many skills and training courses, human error is still doomed to occur. What Capone does not take into consideration however, is that although prevalent risk, human behavior allows us to discover \u201c new risks and vulnerabilities\u201d by replacing the lens of purely technology or data based issues, as according to the Cyberbitsec article. One of the most spectacular things about humans is the pure diversity we are able to have even when raised in similar environments.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Cybersecurity is not a static field nor are people. As people continue to evolve and reach new desires and needs, cybersecurity has to be able to change with it.\u00a0 Leaving people out of running cybersecurity, if doing as Capone suggests, then we would only be hurting ourselves. The prioritization of training is what will further push success within the industry. On a smaller scale, proper training and education would give higher employee retention rates, create stronger workplace relationships, and build trust between the employer and the employee. It seems careless to focus on technology for people without guidance by the very people using it. There are numerous variables that each individual person takes into consideration when using a website, a phone, or a house safety system. Companies offering goods to charities giving services have to be able to reach the demand of their demographic, from the physically disabled mother who needs to be able to control her security cameras that sit upon the shelf, to the on the go millionaire needing to be able to protect his assets.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Moving forward, the connections made between consumers and producers will impact who they go back to, who they rely on, who they trust. This all goes the same of those who are aspiring to create, to protect, to indulge themselves in cybersecurity. Additional technologies will almost always in some sense be sought after, but to what use would they be if not both made with care and understanding of both the goals of the creative producer and the needs of the unique consumer?<\/span><\/p>\n<p class=\"p1\">\u00a0<\/p>\n<h1><span style=\"font-weight: 400\">References<\/span><\/h1>\n<p><span style=\"font-weight: 400\">Google. (n.d.). <\/span><i><span style=\"font-weight: 400\">Cyberbitsetc &#8211; why is cyber security about human behavior?<\/span><\/i><span style=\"font-weight: 400\"> Google Docs. Retrieved October 26, 2021, from https:\/\/docs.google.com\/document\/d\/1QplIrfcKlmkSOuKt9i0Kte72kYrukFeCm1wj9DxpnGU\/edit.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Google. (n.d.). <\/span><i><span style=\"font-weight: 400\">Capone &#8211; the impact of human behavior on security<\/span><\/i><span style=\"font-weight: 400\">. Google Docs. Retrieved October 26, 2021, from https:\/\/docs.google.com\/document\/d\/1J3v_V167mktbGVynbtHW8yHXW9onjaBzVASo-behDfY\/edit.\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p class=\"excerpt\">\u00a0 Name: Kayla MacPherson Date: October 21,2021 Details \u00a0A square is always a rectangle, but a rectangle is not always a square. Although debatable in specific counter-cases, the motives, desires, risks and more of cybersecurity always go back to human behavior, but human behavior does not always go back to cybersecurity. The dual ends of a computer screen of the&hellip; <a href=\"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/cyse-301\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":21855,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/wp-json\/wp\/v2\/users\/21855"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":283,"href":"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/wp-json\/wp\/v2\/pages\/123\/revisions\/283"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kaylamacpherson\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}