logo

Cyber Security Awareness Campaign: Literature Review and Limitations

   

Added on  2023-06-04

11 Pages2828 Words400 Views
Running head: CYBER SECURITY AWARENESS CAMPAIGN
CYBER SECURITY AWARENESS CAMPAIGN
Name of the Student
Name of the University
Author Note:

1CYBER SECURITY AWARENESS CAMPAIGN
Table of Contents
Introduction..........................................................................................................................2
Literature review..................................................................................................................2
Home users......................................................................................................................2
Limitation........................................................................................................................4
General users...................................................................................................................4
Limitation........................................................................................................................6
Conclusion...........................................................................................................................7
References............................................................................................................................8

2CYBER SECURITY AWARENESS CAMPAIGN
Introduction
Cyberspace is considered to be an integrated part of the society as important data is being
transferred day and night (Bada and Sasse, 2014). Cyberspace is needed for vulnerability which
is needed for wide range of threats. Cyber perpetrators on certain number of techniques which is
needed for political and military goals (Abawajy 2014). In the domain of information technology
risk and consequence of cyber-attacks helps in improving the security in cyberspace. Advanced
persistence threats (APT) are considered to be new types of emerging threats of cyber-attack
(Kortjan and Von Solms, 2014). With the help of clear goal any kind of APT attack is highly
organized and highly targeted in nature. There are around four techniques to understand the
cybersecurity techniques like auditing results, loss of productivity, user satisfaction and
awareness of user. Loss in productivity is one of the key measures which is needed for analyzing
the effectiveness of various IT programs. The most basic function of information security
programs is to understand the awareness of the user for various kind of issues related to
information security.
In the coming pages of the report, a proper literature review has been done on
cybersecurity awareness campaign. The report comprises of two parts that are first part is all
about creating awareness with respect to home user behavior and its drawbacks. The second part
of the report deals with general user behavior and its limitation.
Literature review
Home users
A program for awareness and training is considered to be important for understanding the
information of various all users (employees and citizen) need (Larson 2015). In information

3CYBER SECURITY AWARENESS CAMPAIGN
technology, it is needed for understanding the proper things which are needed for communication
with various security needs (Topping 2017). An awareness program can be effective which is
needed for current and simple thing which needs to follow. With the increased availability, there
have been positive effects which aim to provide information which is needed for understanding
the impact when changes in individual are seen (dos Santos Lonsdale, Lonsdale and Lim 2018).
A considerable amount of information is spent by various government organization which
influences the online behavior of online. In the given security domain which is known to be a
triangle of security, functionality and lastly usability (Croasdell, Elste and Hill 2018). It mainly
aims to describe the state which is needed for creating a proper balance between the given three
parameters by making use of usability conflict goals. Perceived goals can be seen as a core
construct which is needed for understanding the various aspect of empowerment. It generally
highlights the amount of control which can oppose in the given situation (Le Compte, Elizondo
and Watson, 2015). It positive control can easily lead to control of given situation which can
easily improve their own situation. It is seen that home computer users encounter high level of
control which takes place due to exposure to risk (Kritzinger, Bada and Nurse, 2017). It is seen
that they can easily choose to visit website which comes up with small attachment which are
applied to system updates.
According to van Schaik et al. (2017), Getafe online campaign is known to be a joint
venture initiative between various government departments along with private sectors. The
campaign highlights on the various user at home and business. The positive message of getting
safe online is intriguing one which highlights the core emphasizes to various individual who
focuses on the responsibility of having it in the online mode (Shafqat and Masood, 2016). The
campaign tends to offer some kind of theory which highlights the information on the given

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Framework and Capacity Building for Cyber Security Acculturation
|18
|4434
|292

HI6008 - Business Research - Challenges in Cyber Security in Business
|10
|2609
|313

Importance of Cybersecurity
|9
|1925
|214

The Offense Defense Balance in Cyberspace Assignment
|20
|4185
|257

Law Enforcement - Cyber Security | Paper
|12
|2145
|20

Social Engineering
|6
|1031
|21