Cyb 102
Cyb 102
Outline:
1. Introduction
o What is Cyber Human Factors?
o Why is it Important?
2. Key Concepts
o Human Behaviour and Cybersecurity
o Cognitive Factors
o Psychosocial Factors
o Policy Development
o Incident Response
o System Design
o User Diversity
o Resistance to Change
5. The Future of Cyber Human Factors
o Advanced Training Techniques
o Behavioral Analytics
o Human-Centered AI
efficiency.
4. Challenges in Cyber Human Factors
While CHF offers promising solutions, there are significant challenges to
overcome:
• Balancing Security and Usability: Striking a balance between robust
security measures and user-friendly interfaces remains a challenge. Overly
complex security protocols can lead to frustration and workarounds,
ultimately weakening the security posture.
• Evolving Threat Landscape: Cybercriminals constantly develop new
consider human factors can provide more intuitive and effective security
solutions. AI could automate threat detection while keeping users informed
and involved in the security process.
• Collaboration and Interdisciplinary Research: Fostering collaboration
Best Practices:
• Role-Based Access Control (RBAC): Assign permissions based on job
roles, ensuring that employees only have access to the resources
necessary for their roles.
o Safe Browsing:
▪ Training: Instruct users on how to recognize and avoid malicious
websites, the dangers of downloading unverified software, and the
importance of HTTPS.
o Data Protection:
▪ Training: Teach users how to handle sensitive data, the importance
of data encryption, and the correct procedures for data disposal.
3. Incident Reporting:
o Procedures: Establish clear, simple procedures for reporting
suspicious activities or potential security incidents
3. Behavioural Analysis:
o Understanding User Behaviour: Analysing how users interact with
security features to identify patterns that can help improve design and
enhance security. This includes monitoring user behaviour to detect
anomalies that might indicate security threats.
o Examples:
▪ Login Monitoring: Analysing login attempts to detect unusual
patterns, such as multiple failed login attempts, which could indicate a
brute-force attack.
▪ Behavioural Biometrics: Using behavioural biometrics, such as
typing patterns and mouse movements, to enhance authentication
processes and detect potentially compromised accounts.
CHALLENGES
1. Balancing Security and Usability:
o User Compliance: Security measures that are too stringent can lead
to user frustration and non-compliance. Conversely, overly lenient
measures can compromise security. Finding the right balance is crucial.
o Example: Implementing MFA in a way that adds an extra layer of
security without making the login process overly complicated or time-
consuming for users.
2. Ensuring Consistent User Experience:
o Cross-Platform Consistency: Providing a consistent user experience
across different devices and platforms to avoid confusion and ensure
users can easily recognize and understand security features regardless
of the device they are using.
o Example: Maintaining a consistent login process across web and
mobile applications, ensuring that the steps and security prompts are
the same.
3. Reducing User Errors Through Intuitive Design:
o Minimizing Cognitive Load: Designing security features that
minimize the likelihood of user errors by making processes intuitive
and straightforward.
o Example: Providing clear and concise error messages that help users
understand what went wrong and how to fix it, rather than using
technical language that might confuse them further.
Best Practices:
1. User-Centered Design:
o Involving Users: Involve users in the design process to ensure that
security features meet their needs and are easy to use. Conduct user
research to gather insights into how users interact with security
mechanisms.
o Example: Running user surveys and interviews to gather feedback
on security features, and using this feedback to guide design decisions.
2. Regular Usability Testing:
o Continuous Improvement: Conduct regular usability tests to identify
and address issues with security features. This should include testing
with diverse user groups to ensure that the features are effective for all
users.
strong security culture. Leaders set the tone for the entire organization
by demonstrating the importance of security through their actions and
decisions.
o Communication: Leaders should regularly communicate the importance
help employees understand the need for new security measures and
how they benefit the organization and themselves.
o Example: Conducting workshops and information sessions to explain the
ensure all employees, regardless of their initial knowledge level, are up-
to-date with current security practices.
o Example: Implementing role-based training programs that cater to
premises but ensures that cameras are not placed in areas where
privacy is expected, such as restrooms or personal offices.
LEGAL FRAMEWORKS
1. Data Protection Laws:
o General Data Protection Regulation (GDPR): A regulation in the
3. Compliance Requirements:
o Industry-Specific Regulations: Various industries have specific
changes in the legal landscape and update their policies and practices
accordingly.
o Example: A multinational corporation needs a dedicated legal team to
Europe must comply with both U.S. laws and the GDPR, possibly using
mechanisms like Standard Contractual Clauses (SCCs) to ensure
compliance.
2. Deepfakes:
o Definition: Manipulated media created using deep learning techniques
3. Ransomware Evolution:
o Definition: The development of increasingly sophisticated ransomware
▪ Double Extortion: Attackers not only encrypt data but also threaten to
equipped with the skills and tools needed to handle cyber emergencies.
▪ Business Continuity Planning: Integrating cybersecurity incident