{"id":249,"date":"2023-10-31T05:44:07","date_gmt":"2023-10-31T05:44:07","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/shanicedolson\/?p=249"},"modified":"2023-10-31T05:44:07","modified_gmt":"2023-10-31T05:44:07","slug":"cyber-security-resilience-article-review-2-cyse-201s","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/shanicedolson\/2023\/10\/31\/cyber-security-resilience-article-review-2-cyse-201s\/","title":{"rendered":"Cyber-Security Resilience (Article Review #2, CYSE 201s)"},"content":{"rendered":"\n<p>For this article review, I chose an article from the Journal of Cybersecurity. The title of the article is, <\/p>\n\n\n\n<p>\u201cDevelopment of a new \u2018human cyber-resilience scale\u2019.\u00a0<\/p>\n\n\n\n<p>In this article, the author explains what happens after an individual has been attacked by a hacker. Did the <\/p>\n\n\n\n<p>individuals have support while their cyber attack was happening? How did the attackers feel afterwards? <\/p>\n\n\n\n<p>Did it change their perspectives of what they could have done differently? Did it make the individuals <\/p>\n\n\n\n<p>aware of their surroundings? All of these questions were answered in this article.\u00a0<\/p>\n\n\n\n<p>When someone gets hacked, they are stressed out. They are trying to remain calm and positive but it is <\/p>\n\n\n\n<p>impossible when the clock is ticking and there are no results. These cyber attacks take weeks, even <\/p>\n\n\n\n<p>months to figure out. Most companies are starting to focus development on cyber-resilience frameworks <\/p>\n\n\n\n<p>(CRFs) .This framework is supposed to help an organization resist cyber attacks and recover swiftly from <\/p>\n\n\n\n<p>an incident. They call it the wave analogy. This disruption is the main focus to help identify factors before <\/p>\n\n\n\n<p>and after an event that can help mitigate or exacerbate the disruption. Some of the ways that <\/p>\n\n\n\n<p>organizations can reduce cyber attacks were situational awareness, good governance, and good security <\/p>\n\n\n\n<p>posture. The ways that they can have a swift recovery are ability to adapt, company\u2019s market strength, <\/p>\n\n\n\n<p>financial position, and social capital.\u00a0<\/p>\n\n\n\n<p>When COVID-19 happened, households and individuals became easy targets. This happened because <\/p>\n\n\n\n<p>everyone was teleworking. That means that individuals were using their home wifi or public wifi. Hackers <\/p>\n\n\n\n<p>knew that everyone became vulnerable. Most of the victims that were targeted were less than 60 years <\/p>\n\n\n\n<p>old. With individuals teleworking, they were constantly using the same password, which made them an <\/p>\n\n\n\n<p>easy target. As you would think that teleworking individuals would have good hygiene such as proper <\/p>\n\n\n\n<p>password protection, making regular updates to their networks, backup regularly, and adopt cyber <\/p>\n\n\n\n<p>insurance.\u00a0<\/p>\n\n\n\n<p>Pangallo measured individual resilience by using a number scale. There were eight core constructs, which <\/p>\n\n\n\n<p>are consistently used in measuring resilience. The six internal traits are adaptation, self-efficacy, active <\/p>\n\n\n\n<p>coping, positive emotion, hardiness, and mastery. The two external traits are supportive relationships and <\/p>\n\n\n\n<p>a structured environment.\u00a0They created a questionnaire that was completed by 151 people. There were <\/p>\n\n\n\n<p>four scales. The four scales were the human cyber-resilience scale, security behavior intentions scale, <\/p>\n\n\n\n<p>brief resilience scale, and the computer self-efficacy scale. Most individuals scored that they did not have<\/p>\n\n\n\n<p> support from family nor friends. That result turned out to be -0.632. Then some individuals said that they<\/p>\n\n\n\n<p> did not have support while dealing with the attack. That result turned out to be -0.625.\u00a0This article <\/p>\n\n\n\n<p>showed me that there is not a lot of support when someone is victimized by a cyber attack. They have to<\/p>\n\n\n\n<p>patiently wait or just give up.\u00a0<\/p>\n\n\n\n<p>While looking at the questionnaire results, the majority of the individuals did learn from a cyber attack. <\/p>\n\n\n\n<p>They started to create different passwords, and utilized the two way authentication for extra security <\/p>\n\n\n\n<p>safety. Once they received something saying that their password was compromised, they immediately <\/p>\n\n\n\n<p>started changing their passwords. The focus should be balanced between being attacked and not being <\/p>\n\n\n\n<p>attacked. Even though, policies and regulations are created to prevent cyber attacks. What are the <\/p>\n\n\n\n<p>policies and regulations after the individual has been attacked?<\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>References<\/strong><\/p>\n\n\n\n<p><strong>Joinson, A. N., Dixon, M., Coventry, L., &amp; Briggs, P. (2023). Development of a new \u2018human cyber-resilience scale.\u2019 <\/strong><strong><em>Journal of Cybersecurity<\/em><\/strong><strong>, <\/strong><strong><em>9<\/em><\/strong><strong>(1). https:\/\/doi.org\/10.1093\/cybsec\/tyad007&nbsp;<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For this article review, I chose an article from the Journal of Cybersecurity. The title of the article is, \u201cDevelopment of a new \u2018human cyber-resilience scale\u2019.\u00a0 In this article, the author explains what happens after an individual has been attacked&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/shanicedolson\/2023\/10\/31\/cyber-security-resilience-article-review-2-cyse-201s\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26289,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts\/249"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/users\/26289"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/comments?post=249"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts\/249\/revisions"}],"predecessor-version":[{"id":250,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/posts\/249\/revisions\/250"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/media?parent=249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/categories?post=249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/shanicedolson\/wp-json\/wp\/v2\/tags?post=249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}