Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

In Tarnveer Singh's book, Cyber Security and Human Factors, Keeping Information Safe, Section 4 Human Factors, he mentions four ( 4 ) barriers or obstactles

In Tarnveer Singh's book, Cyber Security and Human Factors, Keeping Information Safe, Section 4 Human Factors, he mentions four (4) barriers or obstactles of the human attack surface e.g. individuality, organizational context, technology, and ethics. Refer to Section 4, Pages 109-117.
Why are these considered barriers? Please provide why you think it is a barrier by giving an example of each. We can deconstruct Human Factors and claim that the first barrier we must overcome is of individuality. Errors and/ or violations are both examples of incorrect security activities.
Only a few have malicious intent (eg, acts of sabotage), whereas the majority are the result of improper work element configurations, resulting in unintentional and non-deliberate violations, as well as deliberate non-malicious intent activities. Individual variability related to the likelihood of error-producing situations and violations can be analysed using a variety of psychological frameworks. We can look into consolidated models that use the mediating impact of behavioural intention to link behaviours and attitudes. Employee attitudes toward cybersecurity-critical behaviours can be used to explain human errors and violations.
Because cybersecurity may be improved, attitudes predict actual behavioural intentions of risky behaviours in a straightforward way. Because cybersecunty can be improved by pushing a specific set of individual factors that can shape attitudes, such as subjective norms; beliefs in the percerved consequences of an action; actual knowledge of the cybersecurity topic; the preferred cognitive strategies used in a decision-making process, etc., attitudes represent a crucial factor in avoiding secunty breaches related to deliberate actions determining an unwanted violation of a secunty rule. Employee attitudes calalso enable the influence of more social and organisational factors such as social norms, ethical dilemmas, and different levels of behavioural control percerved by the employee 1e., the degree of freedom perceived to enact a given behaviour and the contextual barriers/ enablers in place, related to such a given behaviour). When it comes to defining security breaches as violations, other psychological frameworks might be used, emphasising the significance of norms and ethical principles in developing employee attitudes. The levels of moral duty and the explicit awareness of the consequences of a given behaviour can both alter attitudes. Employees who are well-informed and trained reduce the number of unintentional and non-deliberate activities that result in a breach of cybersecurity laws, and they play an important role in reducing information security risks. Understanding the complexities of human errors and violations can assist in identifying the areas that have the most impact on overall system secunty.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Managing Supply Chain and Operations An Integrative Approach

Authors: Thomas Foster, Scott E. Sampson, Cynthia Wallin, Scott W Webb

1st edition

132832402, 978-0132832403

More Books

Students also viewed these General Management questions