{"id":304,"date":"2024-11-15T23:51:18","date_gmt":"2024-11-15T23:51:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/steven-sori\/?p=304"},"modified":"2024-11-15T23:51:18","modified_gmt":"2024-11-15T23:51:18","slug":"write-up-human-factor-in-cybersecurity","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/steven-sori\/2024\/11\/15\/write-up-human-factor-in-cybersecurity\/","title":{"rendered":"Write up- Human Factor in CyberSecurity"},"content":{"rendered":"\n<p>BLUF: As Chief Information Security Officer, it is important to think about the way my resources are<br>allocated. With that said, conducting a risk assessment using the NIST framework that we learned about,<br>and allocating limited resources accordingly to address higher-priority threats.<br>Using the NIST framework to conduct a risk assessment to help me assess the likelihood and<br>impact of certain risks to my company will be a great first step in how I should be allocating my<br>resources. One example of risks include employee\u2019s unknowingly opening malware or phishing by not<br>having the appropriate education on how to detect these threats to prevent them from causing harm to<br>the company\u2019s network. I could use about 15% of my budget to really hone in on training my employees<br>and ensuring they become a capable first layer of defense in recognizing suspicious online behavior or<br>actions.<br>Utilizing the NIST framework, another realized threat is unauthorized access from both within<br>and outside of the organization. Every company has sensitive information they strive to safeguard from<br>falling into the wrong hands. Whether it be a hidden formula or client information that is used to propel<br>the company, it needs to get stored somewhere. I\u2019d allocate a good amount of my resources into cloud<br>security which would provide a secure platform for businesses to store data and protect against cyber<br>threats. I\u2019d continue to invest heavily into other cyber technology such as network security to create a<br>multi-layered defense solution that is capable of detecting cyber-attacks and responding appropriately<br>so there is no interruption in service to the company\u2019s clients.<br>In conclusion, with the help of the NIST framework, as a Chief Information Security Officer, I&#8217;ve<br>assessed certain high-priority risks that would endanger the continuity and compliance requirements of<br>my business and allocated my resources accordingly. Firstly, with a properly educated first layer of<br>defense in the employees of the company, and following with a cloud security solution to safeguard<br>information along with a robust multi-layered network security defense.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>BLUF: As Chief Information Security Officer, it is important to think about the way my resources areallocated. With that said, conducting a risk assessment using the NIST framework that we learned about,and allocating limited resources accordingly to address higher-priority threats.Using the NIST framework to conduct a risk assessment to help me assess the likelihood andimpact&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/steven-sori\/2024\/11\/15\/write-up-human-factor-in-cybersecurity\/\">Read More<\/a><\/div>\n","protected":false},"author":29580,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/posts\/304"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/users\/29580"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/comments?post=304"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/posts\/304\/revisions"}],"predecessor-version":[{"id":305,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/posts\/304\/revisions\/305"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/media?parent=304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/categories?post=304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/steven-sori\/wp-json\/wp\/v2\/tags?post=304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}