It’s recommended that organizations have their staff take part in annual human factors trainingto reduce the risks of human-centered issues. Information security risk assessments are usually incomplete without human factors riskassessments too. One of the biggest cybersecurity issues isn’t people, but the lack of useful training.
Author: ostew003
Journal Entry #12
An economic theory that could be related to this letter is rational choice. The company that experienced the breach may have made the choice to spend less money on a cheaper antimalware program that was unable to detect the malware that was responsible for the breach. Another economic theory that could be related to this…
Journal Entry #6
The differences between real websites and scam websites can be difficult to notice for some people, but after looking at them for a long time, I am able to notice the differences. For example, in scam emails about my Apple account, the URLs usually look like “www.appple.com”, Apple is spelled wrong in the url. Also,…
Journal Entry #4
The levels of Maslow’s Hierarchy of Needs are psychological, safety, belonging/love, esteem, and self-actualization. There are connections between this hierarchy and the ways people use and think about technology. Technology can be a psychological need, sometimes when I lose my phone or don’t have internet access I feel a little bit anxious. Keeping my technology…
Journal Entry #3
Researchers could use the information from PrivacyRights.org to learn more about data breaches. Using the info that’s available on the site, they can see what countries have the most breaches, what companies have the most breaches, what type of data is most commonly breached, what times of the year most data breaches occur, and other…
Journal Entry #2
The main principles of science are relativism, objectivity, parsimony, empiricism, ethical neutrality, determinism, and skepticism. In regards to relativism, cybersecurity is almost everywhere today. Everything around us is run by computers and connected to networks, like payment systems, cars, phones, street lights, and banks. All of these things need to stay secure to reliably operate…