CYBERSECURITY AWARENESS

CYBERSECURITY AWARENESS DEFINE CYBERSECURITY WHAT IS CYBERSECURITY? • Cybersecurity is a complete approach • Builds a strong barrier against illegal access, exploitation • The goal is to create a robust barrier • Safeguards digital information IMPORTANCE OF CYBERSECURITY WHY IS CYBER SECURITY IMPORTANT IN TODAY’S LINKED WORLD? • Data is becoming more accessible • Cybersecurity measures are crucial. • Cyber attacks have a negative impact • To guarantee integrity WHAT ARE THE KEY CONCEPTS IN CYBERSECURITY? • Cybersecurity fundamentals encompass availability, integrity, and confidentiality of data. • Confidentiality restricts data access to authorized users • Integrity guarantees data accuracy and prevents unauthorized alterations • Availability ensures data is accessible when required TYPES OF CYBER THREATS TYPES OF CYBER THREATS • Phishing • Spear phishing attack • Malware • Ransomware • Trojans horse • Spyware PHISHING AWARENESS (VIDEO 1:34 MINS) SPEAR PHISHING ISN’T JUST EMAIL (VIDEO 1:30 MINS) EXAMPLES OF CYBER ATTACKS EXAMPLES OF CYBER ATTACKS • Data breaches and denial-of-service assaults are examples of cyberattacks. • The goal of these attacks is to interfere with operations and weaken digital systems. • Some examples include,The WannaCry ransomware in 2017 disrupted systems across the world. • In 2017, millions of people’s personal information was stolen by Equifax. CYBER ATTACK EXAMPLE IN TEXAS DALLAS COUNTY • An international cyber hacker group targeted the Dallas County computer system, threatening to publish sensitive information unless a ransom is paid by Friday. • The cyber incident was detected on Oct. 19, with outside cybersecurity experts brought in to contain the threat and prevent file encryption. • While the county’s computer systems remain operational, concerns arise about potentially extracted data during the attack. • Hackers likely infiltrated the system through a phishing email, highlighting the risks of social engineering tactics in cyber attacks. • https://www.youtube.com/watch?v=zb38kIr5eu0 CYBER ATTACK EXAMPLES IN TEXAS – HOUSTON METHODIST HOSPITAL HEALTH SYSTEM • In 2018, Houston Methodist Hospital, a leading healthcare provider in Texas, experienced a ransomware attack that encrypted patient records and disrupted medical services. • The cybercriminals demanded a substantial ransom for the decryption key, impacting patient care and hospital operations. • The incident raised concerns about the vulnerability of healthcare institutions to cyber threats and the importance of robust cybersecurity defenses. • https://www.youtube.com/watch?v=i899TfS-P_M CYBER ATTACK EXAMPLES IN TEXAS – AUSTIN POLICE DEPARTMENT • In 2017, the Austin Police Department in Texas fell victim to a sophisticated cyber attack that compromised confidential case files and sensitive law enforcement data. • The breach, believed to be a targeted hacking incident, exposed operational vulnerabilities within the police department’s digital infrastructure. • The cybercriminals exploited weaknesses in the department’s network security, highlighting the critical need for enhanced cybersecurity measures in law enforcement agencies. • https://www.youtube.com/watch?v=lir36v3H5kU FIREWALLS • firewalls monitor and control network traffic • They filter out unsolicited connections and undesirable traffic • Firewalls stop unwanted users from accessing company networks • Ncessary to preserve the integrity and security of networks ANTIVIRUS SOFTWARE • Set up endpoints and servers using antivirus software • To minimize infection and data loss, identify and eliminate malware • Trojan horses, worms, and viruses are the objectives of antivirus software • Critical for eradicating and halting harmful malware ACCESS CONTROLS • Access controls limit user access based on roles and permissions. • They use login information to manage data and system access. • This minimizes the risk of insider attacks. • Limits access to private data effectively. SECURITY AWARENESS TRAINING • Security awareness training • Encourages a security culture • Reduces risk • Active involvement REFERENCES Equifax(2024). Unpacking the 2023 Equifax Security Annual Report.[YouTube]. https://www.youtube.com/watch?v=fPOqNOYuVk8&list=PPSV Herrmann, D., & Pridöhl, H. (2020). Basic concepts and models of cybersecurity. The ethics of cybersecurity, 11-44. Hussain, A., Mohamed, A., & Razali, S. (2020, March). A review on cybersecurity: Challenges & emerging threats. In Proceedings of the 3rd International Conference on Networking, Information Systems & Security (pp. 1-7). Kaur, G., Habibi Lashkari, Z., Habibi Lashkari, A., Kaur, G., Habibi Lashkari, Z., & Habibi Lashkari, A. (2021). Introduction to Cybersecurity. Understanding Cybersecurity Management in FinTech: Challenges, Strategies, and Trends, 17-34 REFERENCES PcMag (2019).What Is Two-Factor Authentication?[YouTube]. https://www.youtube.com/watch?v=AMOtB7XkTT4&t=23s Priyadarshini, I. (2019). Introduction on cybersecurity. Cyber security in parallel and distributed computing: Concepts, techniques, applications and case studies, 1-37. Simplilearn (2021).Top 10 Cyber Attacks In History | Biggest Cyber Attacks Of All Time | Cyber Security | Simplilearn.[YouTube]. https://www.youtube.com/watch?v=fUeJtM1bgGo&t=45s Zwilling, M., Klien, G., Lesjak, D., Wiechetek, Ł., Cetin, F., & Basim, H. N. (2022). Cyber security awareness, knowledge and behavior: A comparative study. Journal of Computer Information Systems, 62(1), 82-97. Kowalick, C. (2020). Study:Texas second for ransomware attacks on health care centers. Times Record News. https://www.timesrecordnews.com/story/news/local/2020/02/11/study-texas-second-ransomware-attacks-health-carecenters/4722638002/ Sangfor Technologies. (2021). Dallas Ransomware Attack Affects 30,253 People. Sangfor Technologies. https://www.sangfor.com/blog/cybersecurity/dallas-ransomware-attack-affects-30253-people

CYBERSECURITY AWARENESS

We offer the best custom writing paper services. We have answered this question before and we can also do it for you.

GET STARTED TODAY AND GET A 20% DISCOUNT coupon code DISC20

We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.

Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.