Answered step by step
Verified Expert Solution
Question
1 Approved Answer
In Tarnveer Singh's book, Cyber Security and Human Factors, Keeping Information Safe, Section 4 Human Factors, he mentions four ( 4 ) barriers or obstactles
In Tarnveer Singh's book, Cyber Security and Human Factors, Keeping Information Safe, Section Human Factors, he mentions four barriers or obstactles of the human attack surface eg individuality, organizational context, technology, and ethics. Refer to Section Pages
Why are these considered barriers? Please provide why you think it is a barrier by giving an example of each. We can deconstruct Human Factors and claim that the first barrier we must overcome is of individuality. Errors and or violations are both examples of incorrect security activities.
Only a few have malicious intent eg acts of sabotage whereas the majority are the result of improper work element configurations, resulting in unintentional and nondeliberate violations, as well as deliberate nonmalicious intent activities. Individual variability related to the likelihood of errorproducing situations and violations can be analysed using a variety of psychological frameworks. We can look into consolidated models that use the mediating impact of behavioural intention to link behaviours and attitudes. Employee attitudes toward cybersecuritycritical behaviours can be used to explain human errors and violations.
Because cybersecurity may be improved, attitudes predict actual behavioural intentions of risky behaviours in a straightforward way. Because cybersecunty can be improved by pushing a specific set of individual factors that can shape attitudes, such as subjective norms; beliefs in the percerved consequences of an action; actual knowledge of the cybersecurity topic; the preferred cognitive strategies used in a decisionmaking process, etc., attitudes represent a crucial factor in avoiding secunty breaches related to deliberate actions determining an unwanted violation of a secunty rule. Employee attitudes calalso enable the influence of more social and organisational factors such as social norms, ethical dilemmas, and different levels of behavioural control percerved by the employee e the degree of freedom perceived to enact a given behaviour and the contextual barriers enablers in place, related to such a given behaviour When it comes to defining security breaches as violations, other psychological frameworks might be used, emphasising the significance of norms and ethical principles in developing employee attitudes. The levels of moral duty and the explicit awareness of the consequences of a given behaviour can both alter attitudes. Employees who are wellinformed and trained reduce the number of unintentional and nondeliberate activities that result in a breach of cybersecurity laws, and they play an important role in reducing information security risks. Understanding the complexities of human errors and violations can assist in identifying the areas that have the most impact on overall system secunty
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started