Difference between revisions of "The Human Element"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
(Created page with "{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" |- | '''1.''' Human beings play a significant r...")
 
 
(10 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
| '''1.''' Human beings play a significant role in data breaches and cybersecurity incidents. This should come as no surprise – after all, we are the ones who produce, consume, use, depend on, and as a result, have to secure and protect digital data. Because of this, humans fulfill the roles of threat actors, targeted victims, cybersecurity defenders and incident response stakeholders. <br>
+
| '''1.''' The human element of an organisation (Employees) produce and use data during daily operations, hence, they are also responsible for securing and protecting it.  
'''Source:''' (Verizon, 2017)
+
[[File:The Human Element v2.png|thumb|right|300px|'''Types of Cyber Security Threats from 'The Human Element'''']]
  
|}
+
'''Notes (1)''': Being a form of defense within organizations, they are either the cyber criminals themselves or are being targeted by cyber criminals. Organizations should develop measures to prevent their employees from harboring malicious intent against them and procedures on how employees can respond appropriately should they be targeted.
  
{{Attend Course: BCMi Right}} {{BCM Institute A Manager's Guide to Business Continuity Management for Cyber Security Incident Response}}
+
'''Related terms''': [[Cyber_Security_Threats|Cyber Security Threats]]
  
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
+
Examples of human element cyber security threats:
  
 +
*[[Social_Engineering|Social Engineering]]
 +
*[[Financial_Pretexting|Financial Pretexting]]
 +
*[[Digital_Extortion|Digital Extortion]]
 +
*[[Insider_Threat|Insider Threat]]
 +
*[[Partner_Misuse|Partner Misuse]]
 +
*[[Hacktivist_Attack|Hacktivist Attack]]
 +
*[[Disgruntled_Employees|Disgruntled Employees]]
 +
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/>
 +
{{Template:BLCoursesBanner}}
 +
{{Bcm Institute Source}}
  
 +
|}
 +
&nbsp;
 +
{{Template: BookMGBCMResponse}}
 +
'''2.''' Human beings play a significant role in data breaches and cybersecurity incidents. This should come as no surprise – after all, we are the ones who produce, consume, use, depend on, and as a result, have to secure and protect digital data. Because of this, humans fulfill the roles of threat actors, targeted victims, cybersecurity defenders and incident response stakeholders.<br/> '''Source:''' (Verizon, 2017)<br/> &nbsp;
  
 
[[Category:BCM Institute Cyber Security Glossary]]
 
[[Category:BCM Institute Cyber Security Glossary]]

Latest revision as of 02:58, 3 November 2020

1. The human element of an organisation (Employees) produce and use data during daily operations, hence, they are also responsible for securing and protecting it.
Types of Cyber Security Threats from 'The Human Element'

Notes (1): Being a form of defense within organizations, they are either the cyber criminals themselves or are being targeted by cyber criminals. Organizations should develop measures to prevent their employees from harboring malicious intent against them and procedures on how employees can respond appropriately should they be targeted.

Related terms: Cyber Security Threats

Examples of human element cyber security threats:









(Source: Business Continuity Management Institute - BCM Institute)

 

2. Human beings play a significant role in data breaches and cybersecurity incidents. This should come as no surprise – after all, we are the ones who produce, consume, use, depend on, and as a result, have to secure and protect digital data. Because of this, humans fulfill the roles of threat actors, targeted victims, cybersecurity defenders and incident response stakeholders.
Source: (Verizon, 2017)