Abstract
Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data encryption. Because technology increases convenience to the human experience; there will always be a point where the fine line between the two poses a significant risk to providing adequate cybersecurity.
Humanity's emotional involvement in this complex process leads to outcomes that do not reflect the need for optimized data encryption. Thus there is an inherent need to practice logic and pragmatism in decision making regarding when to protect it and ultimately how to protect one's data. Having total protection along with overall security is deemed impractical due. The dilemma is always how much security is too much and how much opened data is too much. This is an individual question that most of us struggle with in today's environment. The most secure storage device is a rock, but it does not share data very efficiently.
That does not mean that optimal data protection (freedom of use and encrypted use) cannot be achieved; without regard to emotive decision making. The objective of this paper is to identify how human behavior is one of the greatest contributing factors is human behavior contributing to the lack of security. My focus will be narrowed down to weaknesses that occur due to inadequate cell phone data encryption methods being used. The lapse in data security lends the wireless community vulnerable to critical data breaches. These breaches permit threats that affect corporations, communities, and end users on a global scale. Where there is a lapse in data encryption there is also an exploitable loophole for malware and hackers.
Document Type
Paper
Disciplines
Communication Technology and New Media | Digital Communications and Networking | Information Security
DOI
10.25776/gwxd-1j67
Publication Date
7-2020
Upload File
wf_yes
Included in
Communication Technology and New Media Commons, Digital Communications and Networking Commons, Information Security Commons
Human Behavior Is a Significant Flaw in Maintaining Cyber Security
Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data encryption. Because technology increases convenience to the human experience; there will always be a point where the fine line between the two poses a significant risk to providing adequate cybersecurity.
Humanity's emotional involvement in this complex process leads to outcomes that do not reflect the need for optimized data encryption. Thus there is an inherent need to practice logic and pragmatism in decision making regarding when to protect it and ultimately how to protect one's data. Having total protection along with overall security is deemed impractical due. The dilemma is always how much security is too much and how much opened data is too much. This is an individual question that most of us struggle with in today's environment. The most secure storage device is a rock, but it does not share data very efficiently.
That does not mean that optimal data protection (freedom of use and encrypted use) cannot be achieved; without regard to emotive decision making. The objective of this paper is to identify how human behavior is one of the greatest contributing factors is human behavior contributing to the lack of security. My focus will be narrowed down to weaknesses that occur due to inadequate cell phone data encryption methods being used. The lapse in data security lends the wireless community vulnerable to critical data breaches. These breaches permit threats that affect corporations, communities, and end users on a global scale. Where there is a lapse in data encryption there is also an exploitable loophole for malware and hackers.