ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Cyber Security Awareness Training for Widget Inc Dot Com

Verified

Added on  2023/06/15

|11
|855
|364
AI Summary
This presentation emphasizes the need for cyber security awareness training for Widget Inc Dot Com to prevent cyber attacks and protect confidential information. It discusses the types of cyber threats, steps for improving cyber security, levels of business risk from cyber attacks, and the importance of high-level support from the executive board.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Name of the Student
Name of the University

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Widget Inc Dot Com designs,
manufactures and even distributes Internet
of Things.
The annual turnover is 10 million pounds.
Widget designing, testing, architecture,
production, selling and distribution are the
main tasks (Ben-Asher and Gonzalez 2015).
The management of the organization is
tensed regarding cyber security.
they have decided for an awareness
training.
Introduction
Document Page
Cyber security is the proper protection of any computer
system from damage or theft to the information, software
or even hardware (Abawajy 2014).
Cyber security helps to secure the information and thus
the information is never lost.
The physical access is eventually controlled and
managed by securing the software and hardware.
What is Cyber Security?
Figure 1:
Cyber
Security
(Source:
Abawajy
2014 )
Document Page
The management or the executive board
is extremely important for undertaking any
important decision.
High level of support is required from the
executive board (Von Solms and Van
Niekerk 2013).
Cyber Security training requires
involvement of funds and this can be done
with the help of the executive board.
Permission of using IT resources is needed.
Level of Support Required

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security training is extremely important
for the employees of this organization.
It is a specific formal procedure that helps to
educate the staff members of an organization
(Ben-Asher and Gonzalez 2015).
The corporate policies, procedures for
completing the tasks with information
technology are helped to understand in this
training.
It reduces the risk of accidental or
unintentional threats.
Requirement of Cyber Security
Awareness Training
Document Page
Malware: Malware refers to several types of harmful software
present within a computer system. Virus is the most significant type
of malware.
Phishing: In this type of attack, the intruder or the attacker sends
an email to the victim for the purpose of stealing confidential
information (Abawajy 2014).
DoS Attacks: This type of attack occurs when the intruder or
attacker makes any particular machine completely unavailable for
the access of the authorized and legitimate users.
Man-in-the-Middle Attacks: In this type of attack, the network or
the session is hijacked by any attacker. The attacker hijacks the
session by simply capturing the ID of the session and thus posing as
the authorized user.
Types of Cyber Threats
Figure 2: Cyber
Threats
(Source: Ben-Asher and
Gonzalez 2015)
Document Page
Antivirus: Antivirus is a software program that helps to prevent the
cyber attacks and also provide security to that particular system.
Firewalls: Firewalls are software programs that prevent all types of
cyber threats from entering into the system.
Proper Training: The employees or the staff members of the
organization should be trained properly so that no unintentional or
accidental threats occur within the organization (Von Solms and Van
Niekerk 2013).
Risk Assessment: There should be a proper process of risk
assessment in the organization and this will reduce the chance of risks
or threats within the company.
Steps for Improving Cyber Security
Figure 3:
Firewalls
(Source: Von Solms
and Van Niekerk
2013)

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
High Risk: This is the first and the most
dangerous level of business risk. All types of
external threats like DoS attacks, virus fall
under this category.
Moderate Risk: All types of financial risks
fall under this category (Hahn et al. 2013). The
financial data or funds are lost due to this type
of risk.
Low Risk: The user generated errors are the
best example of this type of risk. This does not
create major problem in the organization.
Levels of Business Risk from
Cyber Attacks
Document Page
Therefore, from the Power Point
Presentation, it can be concluded that
Widget Inc Dot Com requires an immediate
awareness training for cyber security. This
will reduce the risk of cyber attacks and the
confidential information will never be lost.
Conclusion
Document Page
Abawajy, J., 2014. User preference of cyber security
awareness delivery methods. Behaviour & Information
Technology, 33(3), pp.237-248.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber
security knowledge on attack detection. Computers in
Human Behavior, 48, pp.51-61.
Hahn, A., Ashok, A., Sridhar, S. and Govindarasu, M.,
2013. Cyber-physical security testbeds: Architecture,
application, and evaluation for smart grid. IEEE
Transactions on Smart Grid, 4(2), pp.847-855.
Von Solms, R. and Van Niekerk, J., 2013. From
information security to cyber security. computers &
security, 38, pp.97-102.
References

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1 out of 11
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]