Difference between revisions of "The Human Element"

From BCMpedia. A Wiki Glossary for Business Continuity Management (BCM) and Disaster Recovery (DR).
Jump to navigation Jump to search
 
(4 intermediate revisions by 2 users not shown)
Line 1: Line 1:
 
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px"
 
|-
 
|-
| '''1.''' Employees produce and use data during daily operations, hence, they are also responsible for securing and protecting it.  
+
| '''1.''' The human element of an organisation (Employees) produce and use data during daily operations, hence, they are also responsible for securing and protecting it.
 +
[[File:The Human Element v2.png|thumb|right|300px|'''Types of Cyber Security Threats from 'The Human Element'''']]
 +
 
 +
'''Notes (1)''': Being a form of defense within organizations, they are either the cyber criminals themselves or are being targeted by cyber criminals. Organizations should develop measures to prevent their employees from harboring malicious intent against them and procedures on how employees can respond appropriately should they be targeted.
  
'''Notes (1)''': Being a form of defense within organizations, they are either the cyber criminals themselves or are being targeted by cyber criminals. Organizations should develop measures to prevent their employees from harboring malicious intent against them and procedures on how employees can respond appropriately should they be targeted.
+
'''Related terms''': [[Cyber_Security_Threats|Cyber Security Threats]]
  
 
Examples of human element cyber security threats:
 
Examples of human element cyber security threats:
 +
 
*[[Social_Engineering|Social Engineering]]  
 
*[[Social_Engineering|Social Engineering]]  
 
*[[Financial_Pretexting|Financial Pretexting]]  
 
*[[Financial_Pretexting|Financial Pretexting]]  
Line 13: Line 16:
 
*[[Partner_Misuse|Partner Misuse]]  
 
*[[Partner_Misuse|Partner Misuse]]  
 
*[[Hacktivist_Attack|Hacktivist Attack]]  
 
*[[Hacktivist_Attack|Hacktivist Attack]]  
*[[Disgruntled_Employees|Disgruntled Employees]]
+
*[[Disgruntled_Employees|Disgruntled Employees]]  
 
+
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/>
[[File:The Human Element v2.png|thumb|right|400px|'''Types of Cyber Security Threats from 'The Human Element'''']] {{Bcm Institute Source}}
+
{{Template:BLCoursesBanner}}
 +
{{Bcm Institute Source}}
  
 
|}
 
|}
 
+
&nbsp;
{{Attend Course: BCMi Right}} {{BCM Institute A Manager's Guide to Business Continuity Management for Cyber Security Incident Response}}
+
{{Template: BookMGBCMResponse}}
 
 
<br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> <br/> &nbsp;
 
 
 
 
'''2.''' Human beings play a significant role in data breaches and cybersecurity incidents. This should come as no surprise – after all, we are the ones who produce, consume, use, depend on, and as a result, have to secure and protect digital data. Because of this, humans fulfill the roles of threat actors, targeted victims, cybersecurity defenders and incident response stakeholders.<br/> '''Source:''' (Verizon, 2017)<br/> &nbsp;
 
'''2.''' Human beings play a significant role in data breaches and cybersecurity incidents. This should come as no surprise – after all, we are the ones who produce, consume, use, depend on, and as a result, have to secure and protect digital data. Because of this, humans fulfill the roles of threat actors, targeted victims, cybersecurity defenders and incident response stakeholders.<br/> '''Source:''' (Verizon, 2017)<br/> &nbsp;
  
 
[[Category:BCM Institute Cyber Security Glossary]]
 
[[Category:BCM Institute Cyber Security Glossary]]

Latest revision as of 02:58, 3 November 2020

1. The human element of an organisation (Employees) produce and use data during daily operations, hence, they are also responsible for securing and protecting it.
Types of Cyber Security Threats from 'The Human Element'

Notes (1): Being a form of defense within organizations, they are either the cyber criminals themselves or are being targeted by cyber criminals. Organizations should develop measures to prevent their employees from harboring malicious intent against them and procedures on how employees can respond appropriately should they be targeted.

Related terms: Cyber Security Threats

Examples of human element cyber security threats:









(Source: Business Continuity Management Institute - BCM Institute)

 

2. Human beings play a significant role in data breaches and cybersecurity incidents. This should come as no surprise – after all, we are the ones who produce, consume, use, depend on, and as a result, have to secure and protect digital data. Because of this, humans fulfill the roles of threat actors, targeted victims, cybersecurity defenders and incident response stakeholders.
Source: (Verizon, 2017)