Author
Abstract
Human error plays a significant role in cyber security breaches. In fact, according to a study by IBM, human error is responsible for 95% of all cybersecurity breaches. This can include unintentional actions or even lack of action by employees that cause, spread, or allow a security breach to occur. While software can sometimes be responsible for cybersecurity, human error still remains the leading cause of cybersecurity breaches. Intended actions, such as deliberate actions taken by individuals or groups to compromise security, are another type of cybernetic security threat. These actions can include hacking, insider threats, information sabotage and cyber espionage. This symbiotic threat between human error and cybernetic security highlights the crucial need to understand the relationship between the two in order to develop stronger cybersecurity behaviors and reduce cyber risk. Training and technology can help reduce the likelihood of human error by increasing awareness and knowledge of cyber security best practices. Additionally, cybersecurity awareness training is predicted to be worth $10 billion by 2027, further emphasizing the importance of addressing human factors in cyber security. By understanding the different types of cybersecurity threats, organizations can better prepare and protect themselves against potential breaches. We will present a real case example of human deliberate act - cybernetic attack of compromising an important architectural project designing process that took place in Athens in 2003, the repercussions of this act and what could be done today in order to avoid a similar situation.
Suggested Citation
Dragos Cosmin Lucian PREDA & Monica Mihaela FRANGULEA, 2022.
"The Symbiotic Threat of Human Error, Intended Action and Cybernetic Security System,"
Smart Cities International Conference (SCIC) Proceedings, Smart-EDU Hub, Faculty of Public Administration, National University of Political Studies & Public Administration, vol. 10, pages 407-416, November.
Handle:
RePEc:pop:procee:v:10:y:2022:p:407-416
Download full text from publisher
More about this item
Keywords
;
;
;
;
;
JEL classification:
- O35 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Social Innovation
Statistics
Access and download statistics
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:pop:procee:v:10:y:2022:p:407-416. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Professor Catalin Vrabie (email available below). General contact details of provider: https://edirc.repec.org/data/fasnsro.html .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.