Cyber Security Awareness Campaign: Literature Review and Limitations
Verified
Added on 2023/06/04
|11
|2828
|400
AI Summary
This report provides a literature review on cyber security awareness campaign for home and general users, highlighting their limitations. It includes evaluation of security for various cyber networks under advanced persistence threats and defense strategies to increase network security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CYBER SECURITY AWARENESS CAMPAIGN CYBER SECURITY AWARENESS CAMPAIGN Name of the Student Name of the University Author Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CYBER SECURITY AWARENESS CAMPAIGN Table of Contents Introduction..........................................................................................................................2 Literature review..................................................................................................................2 Home users......................................................................................................................2 Limitation........................................................................................................................4 General users...................................................................................................................4 Limitation........................................................................................................................6 Conclusion...........................................................................................................................7 References............................................................................................................................8
2CYBER SECURITY AWARENESS CAMPAIGN Introduction Cyberspace is considered to be an integrated part of the society as important data is being transferred day and night (Bada and Sasse, 2014). Cyberspace is needed for vulnerability which is needed for wide range of threats. Cyber perpetrators on certain number of techniques which is needed for political and military goals (Abawajy 2014). In the domain of information technology risk and consequence of cyber-attacks helps in improving the security in cyberspace. Advanced persistence threats (APT) are considered to be new types of emerging threats of cyber-attack (Kortjan and Von Solms, 2014). With the help of clear goal any kind of APT attack is highly organized and highly targeted in nature.There are around four techniques to understand the cybersecuritytechniqueslikeauditingresults,lossofproductivity,usersatisfactionand awareness of user. Loss in productivity is one of the key measures which is needed for analyzing the effectiveness of various IT programs. The most basic function of information security programs is to understand the awareness of the user for various kind of issues related to information security. In the comingpagesof thereport,a proper literaturereviewhasbeen done on cybersecurity awareness campaign. The report comprises of two parts that are first part is all about creating awareness with respect to home user behavior and its drawbacks. The second part of the report deals with general user behavior and its limitation. Literature review Home users A program for awareness and training is considered to be important for understanding the information of various all users (employees and citizen) need (Larson 2015). In information
3CYBER SECURITY AWARENESS CAMPAIGN technology, it is needed for understanding the proper things which are needed for communication with various security needs (Topping 2017). An awareness program can be effective which is needed for current and simple thing which needs to follow. With the increased availability, there have been positive effects which aim to provide information which is needed for understanding the impact when changes in individual are seen (dos Santos Lonsdale, Lonsdale and Lim 2018). A considerable amount of information is spent by various government organization which influences the online behavior of online. In the given security domain which is known to be a triangle of security, functionality and lastly usability (Croasdell, Elste and Hill 2018). It mainly aims to describe the state which is needed for creating a proper balance between the given three parameters by making use of usability conflict goals. Perceived goals can be seen as a core construct which is needed for understanding the various aspect of empowerment. It generally highlights the amount of control which can oppose in the given situation (Le Compte, Elizondo and Watson, 2015). It positive control can easily lead to control of given situation which can easily improve their own situation. It is seen that home computer users encounter high level of control which takes place due to exposure to risk (Kritzinger, Bada and Nurse, 2017). It is seen that they can easily choose to visit website which comes up with small attachment which are applied to system updates. According to van Schaik et al. (2017), Getafe online campaign is known to be a joint venture initiative between various government departments along with private sectors. The campaign highlights on the various user at home and business. The positive message of getting safe online is intriguing one which highlights the core emphasizes to various individual who focuses on the responsibility of having it in the online mode (Shafqat and Masood, 2016). The campaign tends to offer some kind of theory which highlights the information on the given
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4CYBER SECURITY AWARENESS CAMPAIGN threats. The campaign focus on the theory of advice which is needed for protecting an individual budget on threats and methods of protecting the individual and the enterprise. The charge mainly highlights the various individual who can make use of information in much proper way. According to Gaza, von Solms and van Vuuren (2015), the cyber-wise street campaign highlights on various kind of user who tends to be at home and work. This new office cyber site emphasizes on certain number of users which is needed for adopting five most basic measures which are needed for boosting the overall security. It is mainly inclusive of the strong and memorable password which is needed for installing the antivirus program which tends to work with devices. It aims in checking the various kind of privacy setting which is needed on social media. It will help in analyzing the security of the various online retailer which is done for loading various card details (Howard and Arimatéia da Cruz, 2017). It is seen that the given patching system aims to change the behavior. This particular campaign tends to highlight the behavior changes which is needed for providing the system updates. Limitation There are large number of limitation of cybersecurity for various home-based user like Lack of support and Time:Various kind of social awareness program are used by professionals so that understand the ability of its execution. Three limitations are lack of support for leadership, limitation of budget and no proper time. Failing to create impact on users:The second thing which is taken into account is all about the ability to engage various employees and change their behavior. It highlights the various programs are not sticking with the leaders.
5CYBER SECURITY AWARENESS CAMPAIGN General users Awareness and training programs are considered to be crucial which is needed for dissemination from all users like employee and citizen (Kim et al. 2018). In the matter of information technology program which is needed for communicating with the given security requirements. A proper awareness and training program should be there which is considered to be effective in nature. In the domain of public, government aim to encourage the fact that how citizen can easily transact the various online and dispense the various kinds of advice of processing with the thing (Sherif, Furnell and Clarke, 2015). However, in many cases, the cybersecurity needs to attack on continue on regular basis. The fact should be taken into account that cybersecurity attacks tend to continue. With the passage of time, the attackers tend to become skilled. They are increasing the security interface due to which the attackers are becoming very skilled (Skinner et al. 2018). The fact has been proposed that proper security and practices of privacy are designed in the given system from the beginning. A system which is too difficult will easily lead to various users for many types of mistakes. The fact should be taken into account that various individual encounters any kinds of warning which is needed for the protection of vital information. AccordingtoBulléeetal.,(2015),theincreasingavailabilityofvariouskindof information has led to various kinds of positive effect. It aims to provide information which is modest and creates impact on the life of various people. A proper amount of investment should be there by various government bodies and organization which tend to influence the online behavior. The fact should be taken into account that individual knowledge and skills are needed for having a proper understanding of cybersecurity (Yunos, Ab Hamid and Ahmad, 2016). Apart from this, it aims in influencing the experience, attitudes and lastly beliefs of various influencers.
6CYBER SECURITY AWARENESS CAMPAIGN Both personal motivation and personal ability are considered to be two most powerful kind of resources. It is needed for addressing for understanding the difference between what people can say and people can do. In some of the situation, it is seen that people need to overcome the current pattern or thoughts which is gathered from the habits. According to Alshaikh et al. (2018), cultural or individual is also an important factor whichcanhavepositiveandnegativeeffectonthelifeofpeople.Bothmessageand advertisement are considered to be an important parameter which is needed for designing the education along with awareness messages. The current cultural system of the society aims to shape the society for various kind of psychological behaviors. There is large number of attempts for changing the behavior of various users. It can be easily bombarded by various types of messages on the given issues. However, in some of the instances it can be seen that the design message should be taken into account (Gratian et al. 2018). There comes up a big amount of gap which is there between understanding the threat and understanding the behavior at given intervals. For various security awareness program, the behavior of the user should be taken into account. Various user need to adopt which is considered to be simple and easy for highlight the various advantages. According to Yunos, Ab Hamid and Ahmad, (2016), perceived control and its ability control provides a proper kind of sense which is needed for driving specific behavior. It has been analyzed that the specific behavior of the people can easily affect the real behavior. The security awareness campaign should come up with consistent rules of behavior of the people (Alshaikh et al. 2018). The perception of control will ultimately lead to better acceptance of suggestion behavior. In some of the cases, it is seen that the effect of information security awareness in the public can be very much complicated in nature.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7CYBER SECURITY AWARENESS CAMPAIGN Limitation There is large number of limitation of cyber security awareness program for general user like: In some of the cases, the awareness program is not unique in nature. Improper engaging of materials. Improper collection of metrics Unreasonable expectation Depending on single training exercise. Conclusion From the above pages of the report a proper literature review on cybersecurity awareness. The literature review comprises two section that is home users and their limitation and secondly general users and its limitation. The report highlights the evaluation of security for various cyber networks which is under advanced persistence threats. The effect of various factors on the equilibrium security on the cyber network has been discussed in details. The equilibrium security is almost applicable to various methods for evaluation for real-world networks under APT. There is large number of issues with respect to security evaluation of the cyber network under APT. The defense strategy helps in increasing the security of the network. When the attack strategy is not unknown, there are mainly two steps for solving the organization issues. For each of the defense strategy, a possible attack strategy is needed for reducing the security of the given network among all the possibilities of attack. It helps in determining a possible defense strategy which aims in maximizing and minimizing strategy of the network.
8CYBER SECURITY AWARENESS CAMPAIGN References Abawajy, J., 2014. User preference of cyber security awareness delivery methods.Behaviour & Information Technology,33(3), pp.237-248. Alshaikh, M., Maynard, S.B., Ahmad, A. and Chang, S., 2018. An Exploratory Study of Current Information Security Training and Awareness Practices in Organizations. Bada, M. and Sasse, A., 2014. Cyber security awareness campaigns: Why do they fail to change behaviour?. Bullée, J.W.H., Montoya, L., Pieters, W., Junger, M. and Hartel, P.H., 2015. The persuasion and security awareness experiment: reducing the success of social engineering attacks.Journal of experimental criminology,11(1), pp.97-115. Croasdell,D., Elste,J.andHill,A.,2018. CyberClinics:Re-imaginingCyberSecurity Awareness. dos Santos Lonsdale, M., Lonsdale, D. and Lim, H.W., 2018. The impact of delivering online information neglecting user-centered information design principles. Cyber security awareness websites as a case study.Information Design Journal. Gcaza, N., von Solms, R. and van Vuuren, J.J., 2015. An Ontology for a National Cyber-Security Culture Environment. InHAISA(pp. 1-10). Gratian, M., Bandi, S., Cukier, M., Dykstra, J. and Ginther, A., 2018. Correlating human traits and cyber security behavior intentions.computers & security,73, pp.345-358.
9CYBER SECURITY AWARENESS CAMPAIGN Howard, T.D. and Arimatéia da Cruz, J.D., 2017. Stay the course: Why trump must build on obama’scybersecuritypolicy.InformationSecurityJournal:AGlobalPerspective,26(6), pp.276-286. Kim, E., Jensen, M.B., Poreh, D. and Agogino, A.M., 2018. NOVICE DESIGNER'S LACK OF AWARENESS TO CYBERSECURITY AND DATA VULNERABILITY IN NEW CONCEPT DEVELOPMENT OF MOBILE SENSING DEVICES. InDS92: Proceedings of the DESIGN 2018 15th International Design Conference(pp. 2035-2044). Kortjan, N. and Von Solms, R., 2014. A conceptual framework for cyber-security awareness and education in SA.South African Computer Journal,52(1), pp.29-41. Kritzinger, E., Bada, M. and Nurse, J.R., 2017, May. A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK. InIFIP World Conference on Information Security Education(pp. 110-120). Springer, Cham. Larson, S., 2015. The cyber security fair: An effective method for training users to improve their cyber security behaviors.Information Security Education Journal,2(1), pp.11-19. Le Compte, A., Elizondo, D. and Watson, T., 2015, May. A renewed approach to serious games forcybersecurity.InCyberconflict:Architecturesincyberspace(CyCon),20157th international conference on(pp. 203-216). IEEE. Shafqat, N. and Masood, A., 2016. Comparative analysis of various national cyber security strategies.International Journal of Computer Science and Information Security,14(1), p.129.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10CYBER SECURITY AWARENESS CAMPAIGN Sherif, E., Furnell, S. and Clarke, N., 2015, December. Awareness, behaviour and culture: The ABC in cultivating security compliance. InInternet Technology and Secured Transactions (ICITST), 2015 10th International Conference for(pp. 90-94). IEEE. Skinner, T., Taylor, J., Dale, J. and McAlaney, J., 2018, April. The Development of Intervention E-Learning Materials and Implementation Techniques For Cyber-Security Behaviour Change. ACM SIG CHI. Topping, C., 2017. The role of awareness in adoption of government cyber security initiatives: A study of SMEs in the UK. van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J. and Kusev, P., 2017. Risk perceptions of cyber-security and precautionary behaviour.Computers in Human Behavior,75, pp.547-559. Yunos, Z., Ab Hamid, R.S. and Ahmad, M., 2016, July. Development of a cyber security awareness strategy using focus group discussion. InSAI Computing Conference (SAI), 2016(pp. 1063-1067). IEEE.