Sunday, August 11, 2019

Human Factors and the Insider Threat Research Paper

Human Factors and the Insider Threat - Research Paper Example The cyber security is a framework which enables the users to protect their cyber assets through preventing, detecting, countering and recovering the cyber incidents (Mehan, 2008). Although many practitioners assess the cyber security as a technical approach, there are many human aspects of acquiring cyber security. It is important to understand the significance of human contribution in the cyber security processes. Incorporating human behavior into the process can lead to a more efficient use of cyber space and reduction in cybercrime. Cyber security is dealt with not only access to technology but also to the understanding of the human user. There are many aspects of human behavior that make the cyber security processes effective in which education and training play an important role. It has been a long debate that technology advanced and gives the humans a better way of living but due to the human behavior, most of the times the technologies are exploited, wasted and misused. It is important to use the cyberspace without interfering and annoying other users. This will reduce the amount of cybercrimes which includes hacking, transferring the data and others. With effective human factors, a cyber environment can be created which provides the users with all the functions along with personal and national security (Shinder &Â  Cross, 2008). There are many challenges in managing the human aspects of cyber security. Cybercrimes take place at a high rate including personal information being leaked, invasion in the data of national concern, hacking accounts etc. The reasons for the cybercrimes may be many from personal to professional. Any person who has the expertise in computers and cyberspace can hack or access any user’s information. Many times it is unknown to the user that who committed the action. However, managing the cybercrimes can be very challenging as recently seen it has become a challenge

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.