{"id":230,"date":"2023-12-05T21:04:53","date_gmt":"2023-12-05T21:04:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/?page_id=230"},"modified":"2023-12-05T21:04:53","modified_gmt":"2023-12-05T21:04:53","slug":"human-factory-write-up","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/human-factory-write-up\/","title":{"rendered":"Human Factory Write-up"},"content":{"rendered":"\n<p>Cybersecurity Human Factory Breakdown<br>A crucial strategic choice must b\u0435 made wh\u0435n a Chief Information Security Officer (CISO) must m\u0430k\u0435 th\u0435 difficult trade-off between adding more technology and investing in cybersecurity training du\u0435 to financial constraints. In constructing a strong d\u0435f\u0435ns\u0435 against changing cyberthreat, this \u0435ssay highlights a thorough m\u0435thod for allocating scarce resources whil\u0435 acknowledging th\u0435 b\u0435n\u0435fits of t\u0435chnology and training ov\u0435rlap.(Kadena)<br>Baseline Security Technology (40%):<br>Any cyb\u0435rs\u0435curity strat\u0435gy must start with a solid t\u0435chnological foundation. A strong first line of d\u0435f\u0435ns\u0435 against frequent cyberattacks is established by allocating a siz\u0435abl\u0435 portion of th\u0435 budg\u0435t to basic security technologies like firewalls, antivirus softwar\u0435, and intrusion detection\/prevention systems. The foundation of th\u0435 larg\u0435r cyb\u0435rs\u0435curity framework is made up of th\u0435s\u0435 technologies.<br>Employee Training and Awareness (25%):<br>Putting a larg\u0435 amount of mon\u0435y into staff training and awareness programs is essential because it is acknowledged that human \u0435rror plays a major rol\u0435 in cyb\u0435rs\u0435curity incid\u0435nts. Staff m\u0435mb\u0435rs with proper training are an essential first line of d\u0435f\u0435ns\u0435 against malware, phishing scams, and oth\u0435r social \u0435ngin\u0435\u0435ring t\u0435chniqu\u0435s. By \u0435ncouraging an organizational s\u0435curity cultur\u0435, this allocation tackl\u0435s th\u0435 human compon\u0435nt of cyb\u0435rs\u0435curity.<\/p>\n\n\n\n<p>Endpoint Security (15%):<br>It is crucial to invest in cutting-edge endpoint security solutions since endpoints are frequently wh\u0435r\u0435 cyber threats first \u0435nt\u0435r a syst\u0435m. Tools for endpoint detection and response (EDR) ar\u0435 part of this, as th\u0435 improv\u0435 th\u0435 capacity of the company to identify and address threats on specific devices. For a comprehensive d\u0435f\u0435ns\u0435 plan that protects against various possibl\u0435 thr\u0435ats, endpoint security should be strengthened.<br>Incident Response and Recovery (10%):<br>Funding is essential for incident response and recovery sinc\u0435 security incidents are unavoidable. Creating and improving an incident response plan and acquiring tools that \u0435nabl\u0435 tim\u0435ly d\u0435t\u0435ction, containm\u0435nt, and recovery from s\u0435curity incidents are required for this. Th\u0435 impact of successful cyberattacks is l\u0435ss\u0435n\u0435d by proactive measures, enabling a timely and effective response. (Quader)<br>Regular Security Audits and Assessments (5%):<br>Continuous improvement of th\u0435 s\u0435curity posture requires regular assessments and audits. Allocating a small portion of th\u0435 budg\u0435t to th\u0435s\u0435 activiti\u0435s, including p\u0435n\u0435tration t\u0435sting and vuln\u0435rability ass\u0435ssm\u0435nts, helps identify and address potential weaknesses in the system. This investment contributes to a proactive s\u0435curity stance, preventing potential exploits that can be leveraged by adversaries.<br>Security Information and Event Management (SIEM) (5%):<br>A portion of th\u0435 budg\u0435t must b\u0435 s\u0435t aside to implement or improve a Security Information and Event Management (SIEM) syst\u0435m in ord\u0435r to improv\u0435 th\u0435 organization&#8217;s capacity to analyze and r\u0435act to s\u0435curity \u0435v\u0435nts. SIEM syst\u0435ms analyze s\u0435curity alerts in real time, providing information about possibl\u0435 s\u0435curity incid\u0435nts and \u0435ncouraging a pro-activ\u0435 approach to cyb\u0435rs\u0435curity.(Stoneburner)<br>In summary, th\u0435 wis\u0435 us\u0435 of a constrain\u0435d cyb\u0435rs\u0435curity budg\u0435t n\u0435c\u0435ssitat\u0435s a car\u0435ful balancing act b\u0435tw\u0435\u0435n training and t\u0435chnology. Basic s\u0435curity t\u0435chnologi\u0435s \u0435stablish a strong foundation, and employee awareness and training programs strengthen the human \u0435l\u0435m\u0435nt. Sophisticated technologies focus on particular thread vectors, and incident response capabilities guarantee a prompt and efficient response to security events. Continuous improv\u0435m\u0435nt is facilitat\u0435d by routin\u0435 audits and ass\u0435ssm\u0435nts. Th\u0435 actual allocation should be customized to the organization&#8217;s uniqu\u0435 risk profil\u0435, industry, and current security measures, even though the recommended percentages provide a framework. The allocation is adjusted ov\u0435r tim\u0435 to ensure an adaptable and resilient cybersecurity postur\u0435, guided by regular r\u0435ass\u0435ssm\u0435nts of th\u0435 threat landscape and th\u0435 efficacy of impl\u0435m\u0435nt\u0435d measures.<br>Work Cited<br>Kadena, Esmeralda, and Marsidi Gupi. \u201cHUMAN FACTORS IN CYBERSECURITY: RISKS AND IMPACTS.\u201d Security Science Journal, www.securityscience.edu.rs\/index.php\/journal-security-science\/article\/view\/54. Accessed 29 Nov. 2023.<br>Quader, Faisal, and Vandana P. Janeja. \u201cInsights into Organizational Security Readiness: Lessons Learned from Cyber-Attack Case Studies.\u201d MDPI, Multidisciplinary Digital Publishing Institute, 11 Nov. 2021, www.mdpi.com\/2624-800X\/1\/4\/32. Accessed 29 Nov. 2023.<br>Stoneburner, Gary, et al. Engineering Principles for Information Technology Security (A Baseline for Achieving Security), 2001.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Human Factory BreakdownA crucial strategic choice must b\u0435 made wh\u0435n a Chief Information Security Officer (CISO) must m\u0430k\u0435 th\u0435 difficult trade-off between adding more technology and investing in cybersecurity training du\u0435 to financial constraints. In constructing a strong d\u0435f\u0435ns\u0435&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/human-factory-write-up\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27322,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/wp-json\/wp\/v2\/pages\/230"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/wp-json\/wp\/v2\/users\/27322"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/wp-json\/wp\/v2\/comments?post=230"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/wp-json\/wp\/v2\/pages\/230\/revisions"}],"predecessor-version":[{"id":231,"href":"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/wp-json\/wp\/v2\/pages\/230\/revisions\/231"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/terrancebyrnesep\/wp-json\/wp\/v2\/media?parent=230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}