Cyber Security and Cyber Awareness

Cyber Security and Cyber Awareness

I. Introduction

Cybersecurity can be described as the techniques that are used to protect the information,
programs, computers, and networks from unauthorized access or attack with the aim of
manipulation. Major areas that are covered by cybersecurity include application, information,
disaster, and network security (Patel, 2020) . The main objective of cybersecurity is to ensure that
and also prevent harm to and even destruction of computers and other applications. For the
strategy of cybersecurity to be successful, it has to continually evolve so as to keep with the pace
of the shifting strategies and also technologies that are used by hackers (Namara, 2020) . Cyber-
attacks are a threat to national security since they can cause electric failures, failure of military
equipment, and also a breach of national security threats (Jingyao, 2019) . As such, it can result in
the theft of relevant and too valuable data like medical records. It is therefore imperative to
understand how the modern-day fireworks and VPNs work so as to mitigate against cyber-
attacks conducted by hackers for malicious purposes.

II. Body
A. Impact of Cyber Attacks
i) Extent of Cyber-attacks

It is essential to understand the importance of VPNs. They protect millions of people across
the globe with the ability to access the internet safely on a daily basis. Many of the internet
connections are now being used with VPNs, which have made it useful. Cyber-attacks have
continued to be a threat to the security of information for many people as hackers always try to
access the information which can be later used for malicious activity (Bendovschi, 2015) . A

CYBER SECURITY AND CYBER AWARENESS 3
single successful cyberattack can have an impact on humans more than what most people think.
The effect may include, but not limited to, financial losses, theft of intellectual property, and also
the loss of consumer trust and confidence.

ii) Identity theft

Over the past few years, people have fallen victims of identity theft and can behave adverse
effects on a person and their families for a very long time. Every person can be a victim of the
activity and can quickly bring about an emotional toll on the people (Kahn, 2016) . The crime can
easily trigger emotional tolls and also emotional reactions. Some of the emotions that the victim
might experience are anger and depression.

B. Causes and Effects of Cyber Attacks
i) Demographic characteristics of the population
ii) Causes of cybersecurity
iii) Other relevant data
iv) Related information
v) Analysis of trends
C. Availability of VPNs
i) Discuss, provide data regarding basic organization/description of the information
which can be used to stop cyberattacks
ii) Issues related to access to VPNs
iii) Utilization of VPN services
D. Effectiveness of VPNs against the external hacking threat
i) The role of VPNs against hacking and malware threat

CYBER SECURITY AND CYBER AWARENESS 4
ii) Expenditure on VPNs and firewalls.
E. Cyber awareness
i) Role of VPNs in cyber awareness

III) Conclusion

Cyber threats and attacks have been on a new level with the improvement in technology over
the past few years. This has caused an uproar in different sectors as it can result in different kinds
of losses, which include, but not limited to, military and financial losses. VPNs and firewalls
have been implemented in the recent past to act as protection against such acts. However, it is
essential to understand that VPNs do not protect computers and programs against malware or
viruses. As such, one has to understand that they do not protect against physical harm in
networks. However, they protect against external hacking as they give a hard time to hackers
who are trying to get information while not authorized.

CYBER SECURITY AND CYBER AWARENESS 5

References

Bendovschi, A. (2015). Cyber-attacks–trends, patterns and security countermeasures. Procedia
Economics and Finance, 28, 24-31.

Jingyao, S. C. (2019, March). Securing a Network: How Effective Using Firewalls and VPNs
Are? In Future of Information and Communication Conference, 1050-1068.

Kahn, C. M.-Z. (2016). Identity theft and consumer payment choice: Does security really matter?
. Journal of Financial Services Research, 50(1), 121-159.

Namara, M. W. (2020). Emotional and Practical Considerations Towards the Adoption and
Abandonment of VPNs as a Privacy-Enhancing Technology. Proceedings on Privacy
Enhancing Technologies, 2020(1), 83-102.

Patel, M. (2020, January 09). Will a VPN Protect You Against Cyber Attacks? Retrieved July 31,
2020, from the Fintech Times: https://thefintechtimes.com/will-a-vpn-protect-you-
against-cyber-attacks/