IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Understanding and Addressing Human Factors in Cybersecurity Vulnerabilities

Understanding and Addressing Human Factors in Cybersecurity Vulnerabilities
View Sample PDF
Author(s): Lingala Thirupathi (Sreenidhi Institute of Science and Technology, India), B. Vasundara (Sreenidhi Institute of Science and Technology, India), Dheeraj Sundaragiri (Sreenidhi Institute of Science and Technology, India), Vijaya Bhaskar Ch (Sreenidhi Institute of Science and Technology, India), Ravi Gugulothu (Sreenidhi Institute of Science and Technology, India)and Radhika Pulyala (Sreenidhi Institute of Science and Technology, India)
Copyright: 2025
Pages: 26
Source title: Human Impact on Security and Privacy: Network and Human Security, Social Media, and Devices
Source Author(s)/Editor(s): Rajeev Kumar (Moradabad Institute of Technology, India), Saurabh Srivastava (Moradabad Institute of Technology, India)and Ahmed A. Elngar (Beni-Suef University, Egypt)
DOI: 10.4018/979-8-3693-9235-5.ch002

Purchase

View Understanding and Addressing Human Factors in Cybersecurity Vulnerabilities on the publisher's website for pricing and purchasing information.

Abstract

Addressing human factors in cybersecurity is essential due to the prevalent exploitation of human errors and behaviors by attackers. This approach involves continuous education and engaging training programs tailored to various roles, emphasizing interactive and personalized learning. Implementing strong security policies with clear guidelines and simplified procedures, backed by regular audits and enforcement, enhances compliance. Technological solutions such as automation, user-friendly security tools, and behavioral analytics play a critical role in reducing human errors and detecting anomalies. Cultivating a security-conscious culture, with leadership commitment and encouraging non-punitive incident reporting, fosters proactive security practices. Limiting the attack surface through different principles minimizes vulnerabilities. Enhancing incident response capabilities ensures effective handling and mitigation of security breaches. This holistic approach integrates education, policy, technology, and culture to strengthen organizational resilience against cybersecurity threats.

Related Content

Harish Chandra Verma, Saurabh Srivastava. © 2025. 12 pages.
Lingala Thirupathi, B. Vasundara, Dheeraj Sundaragiri, Vijaya Bhaskar Ch, Ravi Gugulothu, Radhika Pulyala. © 2025. 26 pages.
Mohd Saleem, Rajeev Kumar, Chanchal Chawla, Mahendra Singh. © 2025. 14 pages.
Nobhonil Roy Choudhury, Shyamalendu Paul. © 2025. 22 pages.
Abhay Bhatia, Anil Kumar, Devendra Sood. © 2025. 32 pages.
Aparna Datta, Akash Mondal, Arunima Sarkar. © 2025. 16 pages.
Adrija Das, Pratyasha Nanda, Ritika Jain, Tanisha Saini, Sneha Bhaskar, Hitesh Mohapatra. © 2025. 18 pages.
Body Bottom