Cybersecurity Awareness: Training Scheme for Widget Inc Dot Com

Verified

Added on  2023/06/15

|11
|855
|364
Report
AI Summary
This report outlines a cybersecurity awareness training scheme developed for Widget Inc Dot Com, an organization specializing in Internet of Things (IoT) design, manufacturing, and distribution. With an annual turnover of 10 million pounds, Widget Inc faces increasing concerns regarding cybersecurity, prompting the need for comprehensive awareness training for its employees. The report defines cybersecurity and its importance in protecting computer systems from damage or theft, emphasizing the critical role of executive board support for funding and IT resource allocation. It highlights the necessity of cybersecurity training to educate staff members on corporate policies and procedures, thereby reducing the risk of accidental or unintentional threats. Various cyber threats, including malware, phishing, DoS attacks, and man-in-the-middle attacks, are discussed, along with steps to improve cybersecurity such as implementing antivirus software, firewalls, and risk assessment processes. The report also categorizes business risks from cyber attacks into high, moderate, and low levels, concluding that Widget Inc requires immediate awareness training to mitigate cyber threats and safeguard confidential information. References to relevant academic sources are included to support the analysis and recommendations.
Document Page
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Widget Inc Dot Com designs,
manufactures and even distributes Internet
of Things.
The annual turnover is 10 million pounds.
Widget designing, testing, architecture,
production, selling and distribution are the
main tasks (Ben-Asher and Gonzalez 2015).
The management of the organization is
tensed regarding cyber security.
they have decided for an awareness
training.
Introduction
Document Page
Cyber security is the proper protection of any computer
system from damage or theft to the information, software
or even hardware (Abawajy 2014).
Cyber security helps to secure the information and thus
the information is never lost.
The physical access is eventually controlled and
managed by securing the software and hardware.
What is Cyber Security?
Figure 1:
Cyber
Security
(Source:
Abawajy
2014 )
Document Page
The management or the executive board
is extremely important for undertaking any
important decision.
High level of support is required from the
executive board (Von Solms and Van
Niekerk 2013).
Cyber Security training requires
involvement of funds and this can be done
with the help of the executive board.
Permission of using IT resources is needed.
Level of Support Required
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cyber security training is extremely important
for the employees of this organization.
It is a specific formal procedure that helps to
educate the staff members of an organization
(Ben-Asher and Gonzalez 2015).
The corporate policies, procedures for
completing the tasks with information
technology are helped to understand in this
training.
It reduces the risk of accidental or
unintentional threats.
Requirement of Cyber Security
Awareness Training
Document Page
Malware: Malware refers to several types of harmful software
present within a computer system. Virus is the most significant type
of malware.
Phishing: In this type of attack, the intruder or the attacker sends
an email to the victim for the purpose of stealing confidential
information (Abawajy 2014).
DoS Attacks: This type of attack occurs when the intruder or
attacker makes any particular machine completely unavailable for
the access of the authorized and legitimate users.
Man-in-the-Middle Attacks: In this type of attack, the network or
the session is hijacked by any attacker. The attacker hijacks the
session by simply capturing the ID of the session and thus posing as
the authorized user.
Types of Cyber Threats
Figure 2: Cyber
Threats
(Source: Ben-Asher and
Gonzalez 2015)
Document Page
Antivirus: Antivirus is a software program that helps to prevent the
cyber attacks and also provide security to that particular system.
Firewalls: Firewalls are software programs that prevent all types of
cyber threats from entering into the system.
Proper Training: The employees or the staff members of the
organization should be trained properly so that no unintentional or
accidental threats occur within the organization (Von Solms and Van
Niekerk 2013).
Risk Assessment: There should be a proper process of risk
assessment in the organization and this will reduce the chance of risks
or threats within the company.
Steps for Improving Cyber Security
Figure 3:
Firewalls
(Source: Von Solms
and Van Niekerk
2013)
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
High Risk: This is the first and the most
dangerous level of business risk. All types of
external threats like DoS attacks, virus fall
under this category.
Moderate Risk: All types of financial risks
fall under this category (Hahn et al. 2013). The
financial data or funds are lost due to this type
of risk.
Low Risk: The user generated errors are the
best example of this type of risk. This does not
create major problem in the organization.
Levels of Business Risk from
Cyber Attacks
Document Page
Therefore, from the Power Point
Presentation, it can be concluded that
Widget Inc Dot Com requires an immediate
awareness training for cyber security. This
will reduce the risk of cyber attacks and the
confidential information will never be lost.
Conclusion
Document Page
Abawajy, J., 2014. User preference of cyber security
awareness delivery methods. Behaviour & Information
Technology, 33(3), pp.237-248.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber
security knowledge on attack detection. Computers in
Human Behavior, 48, pp.51-61.
Hahn, A., Ashok, A., Sridhar, S. and Govindarasu, M.,
2013. Cyber-physical security testbeds: Architecture,
application, and evaluation for smart grid. IEEE
Transactions on Smart Grid, 4(2), pp.847-855.
Von Solms, R. and Van Niekerk, J., 2013. From
information security to cyber security. computers &
security, 38, pp.97-102.
References
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]