Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

Education and Awareness and The Management of Extortions in Cyber Security Paper

Education and Awareness and The Management of Extortions in Cyber Security Paper

Description

Instructions

Conclusion and Abstract

Follow the directions below for the completion of the conclusion and abstract assignment for Unit VIII. If you have questions, please email your professor for assistance.

Purpose: The purpose of this assignment is to complete your academic argumentative research paper.

Description: In this assignment, you will first write your conclusion; then, you will write your abstract. The following components are requirements of the assignment:

  • Conclusion (150-200 words):
    • Revisit the controversy.
    • Emphasize the seriousness of the controversy.
    • Answer the “So what?” question.
    • Suggest a general solution (optional).
    • Call for awareness/action.
    • Leave the reader with a final thought.
  • Abstract (200 words or less): For this assignment, you may not exceed 200 words.
    • Restatement of the controversy (one to two sentences)
    • Your thesis (one sentence)
    • Reasons (three to four sentences)
    • Conclusion sentence (one sentence)
  • Add the conclusion and abstract to the rest of your paper so that you are turning in a complete research paper. The paper should include all of the following components (in order):
    • Title page
    • Abstract
    • Introduction
    • Literature review
    • Body paragraphs
    • Conclusion
    • References page
    • please use my draft introduction ,literature review to make the conclusion and abstract please use same topic Education and Awareness and The Management of Extortions in Cyber Security no plagerism copy and paste
    • Education and Awareness and The Management of Extortions in Cyber Security IntroductionMany companies shift from the analog way of operations to the use of modern technologies to boost their performance level today. However, while the course seemly highly significant, the rapid increase in computing and network applications, which forms part of the transition process exposes the majority of the companies making the shits to sophisticated cyber-attacks. The attacks hit the companies harder and harder, and interfere with their reputation and level of profitability (Fredette, 2019). For example, as the companies make the adjustments, most computer experts helping the firms in the transition process tricks the companies and organize some phishing attacks, which lures the management into clicking suspicious links, containing spyware to weak passwords and the companies ends up losing sensitive information to the dissatisfied parties. Alternatively, the experts’ may program the suspicious links within the companies’ systems and as employees work on the systems, making entries, they may click the suspicious links, with spyware and weakness the passcodes, allowing the experts to have access to the systems and organize cyber-attacks. But since the companies, does fail to recognize and correct the extortions immediately, the companies end up receiving complaints and withdrawals from the customers who find their sensitive information manipulated. However, while, it appears life-threatening, the attacks can be avoided with effective cybersecurity education and awareness training. Therefore, based on the point, the papers aim on reviewing various works of literature on the management of cyber-attacks to identify the role education and awareness play in the management of threats of cyber-attacks as discussed in the succeeding paragraphs. Literature ReviewAccording to Carlton et al. (2019), education and awareness rank as the best option for managing cyber security threats. The course helps promote knowledge and safety measures among insecure internet users. That is, a well-programmed education and awareness program design provides internet and social media users with the knowledge that helps them understand the need to obey security rules and policies, identify attack vectors, and apply all the essential physical access controls to safeguard their security while using the internet. For example, a study by Li et al. (2019) demonstrates that when an insecure internet user is browsing, the individual will not recognize or differentiate between a genuine and a suspicious link or software updates with malware and spyware. The user will demonstrate a high level of vulnerability, which the cybercriminal who programmed the suspicious link and software updates will realize and use to exploit the weakness of the insecure internet user to compromise cyber security. But education and awareness will help teach the insecure user not to turn a blind eye to suspicious links and software updates. The user will stay alert and learn to differentiate between wary and valid links, and the need to use security updates that address bugs and vulnerabilities when making software updates to protect their devices and avoid losing sensitive information to malicious cyber actors.Next, according to Zwilling et al. (2022), education proves essential in the management of cybersecurity threats as it encourages the comprehension of the importance of cybersecurity awareness. The comprehension of the importance of cybersecurity awareness, which happens through active learning helps students, organizations, and other internet users develop an awareness of cybersecurity threats such as cyberbullying, denial-of-service attacks, and the right skills, attitudes, and behaviors, which are necessary to detect and react to malicious activities, preventing them from occurring. For example, a study by Phillips & Tanner (2019), demonstrates that education and awareness help raise security consciousness among firms and internet users. Firms get a chance to learn how to emphasize and communicate the commitment to sound cyber security practices and raise the awareness of applicable cyber threats, which makes internet users aware of the security threats. Additionally, according to Carlton et al. (2019), education and awareness help firms foster a culture promoting and rewarding security-minded approaches to doing work across firms. The firms respond to circulate mock phishing emails and memos on the dangers of exploits such as phishing and social engineering and discuss how the activities compromise the businesses in meetings, which helps in finding the signs of the suspicious emails and improves personal efficacy. The more knowledgeable the firms are on the sources of the cyber threats, the more they understand security concepts and reinforce expected behavior and attitudes.Last but not least, according to Phillips & Tanner (2019), education and awareness play a vital role in the management of cybersecurity threats as it helps stakeholders recognize all their roles in cybersecurity and develop public knowledge-sharing platforms. The two events help stakeholders recognize the importance of collaboration and the need to define clear goals for the management process. Each stakeholder identifies their roles, and when it is time, every member work with increased motivation towards identifying and preventing the cybersecurity threats, which majority include malicious emails and viruses when they arise. For example, according to Li et al. (2019), the businesses that incorporate education and awareness programs in the practices understand their vulnerabilities and are always ready to share freely, their detailed information concerning the vulnerabilities with each other in all the localities. The course helps them ensure that all members become aware of the pending threats, and promote pro-activeness and a united front against cybercrimes. The education and awareness programs also help them turn human knowledge into action, which helps in the development of the basic skills necessary to protect and respond to cybersecurity incidents. As a result, the firms are always able to provide swift solutions to cyber security attacks and protect all their stakeholders, including employees and investors, vital records and procedures, and communicate a company’s dedication to being responsible for all their, vital information and systems. ReferencesCarlton, M., Levy, Y., & Ramim, M. (2019). Mitigating cyber-attacks through the measurement of non-IT professionals’ cybersecurity skills. Information & Computer Security. https://www.emerald.com/insight/content/doi/10.1108/ICS-11-2016-0088/full/htmlFredette, C (2019). Cybersecurity Education: Why Universities are Missing the Mark. Cybint Solutions. https://www.cybintsolutions.com/cybersecurity-education-why-universities-are-missing-the-mark/Li, L., He, W., Xu, L., Ash, I., Anwar, M., & Yuan, X. (2019). Investigating the impact of cybersecurity policy awareness on employees’ cybersecurity behavior. International Journal of Information Management, 45, 13-24. https://www.sciencedirect.com/science/article/pii/S0268401218302093Phillips, R., & Tanner, B. (2019). Breaking down silos between business continuity and cyber security. Journal of business continuity & emergency planning, 12(3), 224-232. https://www.ingentaconnect.com/content/hsp/jbcep/2019/00000012/00000003/art00004Zwilling, M., Klien, G., Lesjak, D., Wiechetek, ?., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge, and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. https://www.tandfonline.com/doi/abs/10.1080/088744…

Our Service Charter

1. Professional & Expert Writers: Writing Expert only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Writing Expert are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Writing Expert is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Writing Expert, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

Our Service Charter

1. Professional & Expert Writers: Writing Expert only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Writing Expert are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Writing Expert is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Writing Expert, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.