{"id":285,"date":"2021-10-25T11:32:18","date_gmt":"2021-10-25T11:32:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/randibullard\/?p=285"},"modified":"2021-10-25T11:32:18","modified_gmt":"2021-10-25T11:32:18","slug":"the-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/randibullard\/2021\/10\/25\/the-human-factor-in-cybersecurity\/","title":{"rendered":"The Human Factor in Cybersecurity"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Name: Randi Bullard<\/h1>\n\n\n\n<h1 class=\"wp-block-heading\">Date: 09\/23\/2021<\/h1>\n\n\n\n<h1 class=\"wp-block-heading\">Details<\/h1>\n\n\n\n<p>It is no secret that human behavior impacts security in a major way. Human behavior has proven that we choose to take the easy road, cut corners and make mistakes. (Capone, J. 2018, May 25) So how exactly does human behavior impact cybersecurity and how can you balance the tradeoff of training and additional technology? As prefaced previously, humans like efficiency and steadfastness, this could ultimately lead to more productivity, but less efficacy, increasing the risk of vulnerability in systems.&nbsp; The human factor in cybersecurity often refers to raising awareness, training and education (Jeimy J. Cano M, 2021) Despite training, it is still possible for humans to make mistakes, violate security procedures or intentionally damage or breach systems. This could be due to a lack of care, knowledge or both. Technically sound systems are an important part of keeping systems secure, and free from breaches, but decreasing human error is a crucial part of the puzzle. The most efficient way to decrease human error is through training. To balance the trade-off, I think it is important that all standards be identical, and all training should be sustained and centralized. Meaning, taking the time out of your day to enforce policies, ethics and general standards of procedures can serve as a reminder to stay within standards and practice safe and careful practices, in dealing with security. Technology alone shouldn\u2019t be relied upon to defend a network, by training your employees and holding them to a degree of accountability, it will keep from losing people to rely on total automation of networks, by different networks. Policies are very important to have in place, but policies do not cover all risks. Even still, policies are not always followed as they should be, therefore, having employees become aware of their actions can possibly help mitigate some risks in terms of breaches, leaks or attacks. Additional technology will not always save a network or organization, sometimes it just takes humans to recognize that their mistakes, accidental or not, matters in protecting the data and lives of others.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">References<\/h1>\n\n\n\n<p>Capone, J. (2018, May 25). <em>The impact of human behavior on security<\/em>. CSO Online. <a href=\"https:\/\/www.csoonline.com\/article\/3275930\/the-impact-of-human-behavior-on-security.html\">https:\/\/www.csoonline.com\/article\/3275930\/the-impact-of-human-behavior-on-security.html<\/a><\/p>\n\n\n\n<p><em>The Human Factor in Information Security<\/em>. (n.d.). ISACA. Retrieved September 23, 2021, from https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2019\/volume-5\/the-human-factor-in-information-security<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Name: Randi Bullard Date: 09\/23\/2021 Details It is no secret that human behavior impacts security in a major way. Human behavior has proven that we choose to take the easy road, cut corners and make mistakes. (Capone, J. 2018, May 25) So how exactly does human behavior impact cybersecurity and how can you balance the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/randibullard\/2021\/10\/25\/the-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":17219,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/posts\/285"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/users\/17219"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/posts\/285\/revisions"}],"predecessor-version":[{"id":286,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/posts\/285\/revisions\/286"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/media?parent=285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/categories?post=285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/randibullard\/wp-json\/wp\/v2\/tags?post=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}