Cyber security Awareness Campaign Assignment
Order ID# 45178248544XXTG457 Plagiarism Level: 0-0.5% Writer Classification: PhD competent Style: APA/MLA/Harvard/Chicago Delivery: Minimum 3 Hours Revision: Permitted Sources: 4-6 Course Level: Masters/University College Guarantee Status: 96-99%
Running Head: CYBER AWARENESS 5
Title: Cyber Security Awareness
Cyber security Awareness Campaign
One thing to note is that cybercrimes has been on rise more so in the recent years due to increase in technological advancement. One of the major target for cybercrimes are government agencies and performing organizations who have a great sales turn over. The cybercrimes in most of the cases demands for a ransom for those organization in order to allow them get an access to the computer resources. For the case of business organization, cyber criminals are more likely to get into an organization system and steal critical information for their own personal gain or monetary gains (Simoes, 2019).
For the case of large organizations, it is observed that they are more likely to target key organizations such as schools and hospitals since they are accessed by a large number of individuals. One of the target areas for cyber criminals is the IT systems for such organization since they have a better understanding that those systems plays a critical role in running almost all the key operations of the organizations. Upon getting an access to such systems, they are more likely to ask for a ransom or even use key information such as credit card information for monetary gains (Blakemore, 2016). Besides monetary gains and ransom, the other thing that these criminals are also bound to release a threat of leaking confidential information on an organization. Tracking these attackers can be a hectic move and this simply means that there is need for organizations to ensure that they have updated system to countercheck on such form of risks.
With the advancement of new technology, people now have a better advantage when it comes to easy communication. Business and companies are also considered as a major beneficiary due to the fact they are able do online market and also use the internet in order to learn new set of technique in order to compete with their rivals in the market or learn new technique to carry out their business operations. For instance, also through the use of social media platforms, it is key to note that it plays a critical role in reaching customers. Social media also act as a good of addressing the concerns of the customers in a faster manner (Simoes, 2019).
For instance, Education sector has been in a place to use the new technology in order to ensure that it can easily the online users by offering them online classes regardless of their locality. Besides offering a platform for online classes, we are in a place to note that it has generally increased quality of education since one is a place to get easy access to new information and ideas from a great number of scholars globally (Lewis,2006). Cyber-attacks are more likely to be attracted to a school system since they have knowledge that they are going to affect a large number of individual who are dependent on this system. As stated early on, businesses are also hardly hit when it comes to giving ransoms in the case their systems become hacked
Before organizations enact training program, there is need for them to start on the baseline which involves highlighting the need to have the right knowledge set to deal with information threats. The next step would entail coming up with the right set of training which is aimed at highlighting essential of cyber security. Research conducted in the market shows that most of organization contains a training program which has got standardized requirements. One of the best way to pre-test the employees is to ensure that one runs a survey which contains any form of concerns which affects an organization(Lewis,2006).
The most important development and innovation that has been made by humankind is technology. It has been very essential in various. However, as technology develops. There is a breed of dangerous entities which make the technology get into a very dangerous angle by compromising the security of cyber technology (Lewis & Pickavance, 2006). The cyber experts are working round the clock to ensure that there is total cyber protection. Countless undertakings have been made to ensure that cyber security is ensured. The most important development that has been made in cyber security is the VPN which is known as a virtual private network.
VPN is where a private network is connected across a public network and it allows the users to use the network in such a way that it resembles the private network. This is a very critical cyber security innovation and it has been widely used in various parts of the world. The core reason why VPN cyber security is an ideal solution is the fact that the users secretive or confidential credentials are encrypted thus making it hard for cybercriminals to easily access their databases (Lewis, & Pickavance, 2006). These credentials include the users’ names, age, passwords as well as their certificates. Besides, the users’ location identity is concealed thus making it hard for hackers or another malicious individual to know the users’ whereabouts.
Cameron, R., & Wyler, N. R. (2011). Juniper(r) Networks Secure Access SSL VPN Configuration Guide. Syngress.
Lewis, C., & Pickavance, S. (2006). Selecting MPLS VPN Services. Cisco Press.
Stiefel, B. J., & Desmeules, S. (2005). Configuring Check Point NGX VPN-1/Firewall-1. Elsevier.
Onwubiko, C. (2012). Situational Awareness in Computer Network Defense: Principles, Methods, and Applications: Principles, Methods, and Applications. Hershey, PA: IGI Global.
Clarke, N., & Furnell, S. (2014). Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2014). Morrisville, NC: Lulu.com.
T C., & Simoes, P. (2019). ECCWS 2019 18th European Conference on Cyber Warfare and Security. Academic Conferences and publishing limited.