Order for this Paper or Similar Assignment Writing Help

Fill a form in 3 easy steps - less than 5 mins.

Posted: August 22nd, 2022

Cyber Threat

Cyber Threat
For this assignment, you are requested to search in the Saudi Digital Library the following paper:
Breaking down silos between business continuity and cyber security in Journal of Business Continuity & Emergency Planning Volume 12 Number 3
Authors: Rick Phillips and Brandon Tanner
Your essay must include the following:
– Describe in details the different steps that you have followed to download this paper from Saudi Digital Library.
– Based on this paper and other related references, write with your own words how to minimize cyber threats through education and awareness.

Directions:

Your well-written paper should meet the following requirements:

– Be 2 to 3 pages in length, which does not include the title page, abstract or required reference page, which are never a part of the content minimum requirements.
– Use Saudi Electronic University academic writing standards and APA style guidelines.
– Include at least one scholarly reference in addition to the above reference. The Saudi Digital Library is a good source for resources.

Cyber threat is a malicious act which its main intention is to steal data, damage information or send a signal that is meant to disrupt digital activities. Some of the common threats are such as phishing; attackers harvest data through social media and use it to impersonate or trick people to get what they want. Ransomware; attackers hold a device or a system of an institution hostage until they are paid a certain amount. Cryptojacking; attackers use a link to manipulate users of a computer to click on the link or visit an infected website. They then mine cryptocurrency. (Smart, W. 2018).
When downloading this paper, I clicked on the sign-in link which directed me to the SDL site. I then selected the SDL icon to enter the library. I put my username and password in the required slots then searched by the name of the paper. I got several other related topics to what I was looking for but finally settled on this one. Finally, I downloaded the paper as a pdf after finding the exact information I needed.
Education refers to the general understanding of cybersecurity concepts. Being taught how the process works and understanding what it entails. On the other hand, awareness training should be done separately and continually. The program is designed to keep employees up to date with information on the latest tools and techniques cybercriminals are using every day. Awareness training is more specific and timely than education.
The executives, board members, and the employees should be educated on how to minimize cyber threats. Education should cover everything from basic company policies to on-the-job training. This will also help to minimize the budget used up in buying and installation of the modest software that curbs cyber threats. Cybersecurity awareness is brought about through education. Once a staff member learns how to minimize cyber threats, he will be able to identify the dos and don’ts and make them known. That is creating awareness.
Through education, businesses and institutions can identify the type of cyber threat used. If it is phishing; one will be able to spot the emails mimicking original ones to avoid theft. for ransomware, one can be able to spot the malware used to hold systems hostage and for cryptojacking, one will be able to spot the email or online advertisement used to lure victims into visiting the website.
There are ever emerging ways used to attack victims. Through awareness training, the employee gets to learn new forms of attack and is also able to continue thinking of cybersecurity as a never-ending process. Implementing a phishing training program alone will not help to address education and awareness. It only covers a small area of education so a comprehensive education and awareness program is important.
Education also helps those in leadership positions to be able to keep contents of the information safe; for instance, pins, passwords or security codes. The executives have access to personnel records containing names, social security numbers and other personal information which attackers use to fraud victims. If the executives are educated on how to keep that information safe and secure then cases of cyber threats will minimize. (Tanner, B. (2019).
In conclusion, any organization, despite the size is a target. Funds that can be used to buy new and up to date software to curb cyber threats should be allocated to the education and awareness program. This will help prevent an organization or a business from becoming a victim of fraud or rather cyber threat. As we all know prevention is better than cure.
References
Phillips, R., & Tanner, B. (2019). Breaking down silos between business continuity and cybersecurity. Journal of business continuity & emergency planning, 12(3), 224-232. Ponemon Institute (2018)
Smart, W. (2018). Lessons learned review of the WannaCry ransomware cyber-attack. London: Skipton House.

Tags:

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

Our writing team is assembled through a rigorous selection process, where we handpick accomplished writers with specialized expertise in distinct subject areas and a proven track record in academic writing. Each writer brings a unique blend of knowledge and skills to the table, ensuring that our content is not only informative but also engaging and accessible to a general college student audience

Discounted Prices

Competitive pricing is a cornerstone of our service, where we balance affordability with exceptional quality. In offering the best writers at rates that rival other writing services, we ensure that students can access top-notch content without breaking the bank unnecessarily. Our fair and transparent pricing structure is designed to provide value for money, making us a go-to choice for students seeking high-quality writing services at an affordable price.

100% Plagiarism-Free

Academic integrity is paramount to our writing service, which is why we produce original research and writing content for every paper. Each piece of work is carefully written from scratch, ensuring that every sentence, paragraph, and page is authentic and free from plagiarism. Our rigorous quality control process involves thorough scanning of every final draft, guaranteeing that the content meets the highest standards of originality and academic integrity. With keen attention to citation and referencing, we ensure that every source is properly credited, giving you complete peace of mind. We also have the best plagiarism checkers like safeassign and turnitin thus providing similarity score for each paper.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.