Human Error, The Weakest Link In Cybersecurity: [Essay Example], 464 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Human Error, the Weakest Link in Cybersecurity

Download Print

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

According to IBM’s “2014 Cyber SecurityIntelligence Index” 95 percent of all securityincidents involve human error. A lot of the security incidents are dueto social engineering. Examples of this arehumans clicking on links (phishing), openingunknown attachments or entering personalor confidential information into a seeminglyfriendly and familiar account.

Background and research

Social engineering is a technique used byhackers and intruders to access data orother critical information. This techniquetakes advantage of the weakest link in theinformation security, the humans. Usingthe trusting nature of humans the hackeror intruder gain access to data or a se-cure building. Either by a phishing email ortailgating someone inside the secure building. ”Social engineering is essentially the artof gaining access to buildings, systems ordata by exploiting human psychology, ratherthan by breaking in or using normal hackingtechniques”.

Discussion

No matter how much security your organiza-tion have, social engineering will always be athreat. This is due to the human’s mind andhow we always want to trust others. Oneway to describe us would be naive, especiallyus Norwegians who in 2009 were named themost naive in Europe by a survey funded bythe European Commission. Only 10 percentare considered to be in general “skeptical” ofother people.

Chris Nickerson is a consultant who performs1red team testing for his clients using socialengineering techniques. In one of his tests hebought a Cisco shirt and tried to tailgate hisway in. When he came to the building hejust asked one of the smoking employees tohold the door for him and posed as a Ciscotechnician. He got full access to the buildingand even managed to get his team inside. This is just an example showing how easy itis to play someones naivety and willingnessto trust other people. Therefore it is important to educateyour employees on social engineering tomake sure they are aware of the differenttechniques that can be used and the dangersthese techniques can lead to. Social engi-neering will continue to grow and change upit’s approach and discover techniques thatwork better, this means that updating youremployees on the dangers and techniques ofsocial engineering regularly is essential.

Luckily there are techniques that helpmitigating the dangers of social engineeringsomewhat. To mitigate the danger we haveto eliminate the dependency on human intel-ligence. One way to do this is a technologycalled Remote Browser Isolation. Remotebrowser isolation isolates the users webbrowsing activity away from the endpointdevice, thus excluding most of the browserrelated attacks such as phishing whileensuring accessibility and productivity.

Conclusion

Humans in general are way to trusting, evenwhen they know they work at a facility wheresecurity is of the utmost importance. Consul-tants like Chris Nickerson prove how easy itis to use social engineering, and thus makingtheir clients more aware of the possible dan-gers and exploits. We have also seen that byusing Remote Browser Isolation we can avoidsome of the human error by isolating activityaway from the endpoint device.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Find Free Essays

We provide you with original essay samples, perfect formatting and styling

Cite this Essay

To export a reference to this article please select a referencing style below:

Human Error, The Weakest Link In Cybersecurity. (2020, July 14). GradesFixer. Retrieved October 27, 2020, from https://gradesfixer.com/free-essay-examples/human-error-the-weakest-link-in-cybersecurity/
“Human Error, The Weakest Link In Cybersecurity.” GradesFixer, 14 Jul. 2020, gradesfixer.com/free-essay-examples/human-error-the-weakest-link-in-cybersecurity/
Human Error, The Weakest Link In Cybersecurity. [online]. Available at: <https://gradesfixer.com/free-essay-examples/human-error-the-weakest-link-in-cybersecurity/> [Accessed 27 Oct. 2020].
Human Error, The Weakest Link In Cybersecurity [Internet]. GradesFixer. 2020 Jul 14 [cited 2020 Oct 27]. Available from: https://gradesfixer.com/free-essay-examples/human-error-the-weakest-link-in-cybersecurity/
copy to clipboard
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

    By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

    close

    Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

    Recieve 100% plagiarism-Free paper just for 4.99$ on email
    get unique paper
    *Public papers are open and may contain not unique content
    download public sample
    close

    Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you

    close

    Thanks!

    Your essay sample has been sent.

    Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

    thanks-icon Order now
    boy

    Hi there!

    Are you interested in getting a customized paper?

    Check it out!
    Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

    GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.