Abstract

Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data encryption. Because technology increases convenience to the human experience; there will always be a point where the fine line between the two poses a significant risk to providing adequate cybersecurity.

Humanity's emotional involvement in this complex process leads to outcomes that do not reflect the need for optimized data encryption. Thus there is an inherent need to practice logic and pragmatism in decision making regarding when to protect it and ultimately how to protect one's data. Having total protection along with overall security is deemed impractical due. The dilemma is always how much security is too much and how much opened data is too much. This is an individual question that most of us struggle with in today's environment. The most secure storage device is a rock, but it does not share data very efficiently.

That does not mean that optimal data protection (freedom of use and encrypted use) cannot be achieved; without regard to emotive decision making. The objective of this paper is to identify how human behavior is one of the greatest contributing factors is human behavior contributing to the lack of security. My focus will be narrowed down to weaknesses that occur due to inadequate cell phone data encryption methods being used. The lapse in data security lends the wireless community vulnerable to critical data breaches. These breaches permit threats that affect corporations, communities, and end users on a global scale. Where there is a lapse in data encryption there is also an exploitable loophole for malware and hackers.

Document Type

Paper

Disciplines

Communication Technology and New Media | Digital Communications and Networking | Information Security

DOI

10.25776/gwxd-1j67

Publication Date

7-2020

Upload File

wf_yes

Share

COinS
 

Human Behavior Is a Significant Flaw in Maintaining Cyber Security

Human behavior and data security utilization must be intertwined; in order to mitigate the negative effects of cyber attacks. No consumer wants their data hacked, breached, stolen, shared or wiped out. It is imperative to survey the type of education is needed to keep users safe and interested in securing their data. This can be done by simply seeking out the consumer's view of data security. The information obtained would allow the cybersecurity community to offer a simple way for consumers to protect their mobile data. There is a constant interaction between human behavior and the need for increased data encryption. Because technology increases convenience to the human experience; there will always be a point where the fine line between the two poses a significant risk to providing adequate cybersecurity.

Humanity's emotional involvement in this complex process leads to outcomes that do not reflect the need for optimized data encryption. Thus there is an inherent need to practice logic and pragmatism in decision making regarding when to protect it and ultimately how to protect one's data. Having total protection along with overall security is deemed impractical due. The dilemma is always how much security is too much and how much opened data is too much. This is an individual question that most of us struggle with in today's environment. The most secure storage device is a rock, but it does not share data very efficiently.

That does not mean that optimal data protection (freedom of use and encrypted use) cannot be achieved; without regard to emotive decision making. The objective of this paper is to identify how human behavior is one of the greatest contributing factors is human behavior contributing to the lack of security. My focus will be narrowed down to weaknesses that occur due to inadequate cell phone data encryption methods being used. The lapse in data security lends the wireless community vulnerable to critical data breaches. These breaches permit threats that affect corporations, communities, and end users on a global scale. Where there is a lapse in data encryption there is also an exploitable loophole for malware and hackers.