{"id":8120,"date":"2020-08-04T18:49:19","date_gmt":"2020-08-04T18:49:19","guid":{"rendered":"https:\/\/papersspot.com\/blog\/?p=8120"},"modified":"2020-08-04T18:49:26","modified_gmt":"2020-08-04T18:49:26","slug":"cyber-security-and-cyber-awareness","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2020\/08\/04\/cyber-security-and-cyber-awareness\/","title":{"rendered":"Cyber Security and Cyber Awareness"},"content":{"rendered":"\n<p>Cyber Security and Cyber Awareness<\/p>\n\n\n\n<p>I. Introduction<\/p>\n\n\n\n<p>Cybersecurity can be described as the techniques that are used to protect the information,<br>programs, computers, and networks from unauthorized access or attack with the aim of<br>manipulation. Major areas that are covered by cybersecurity include application, information,<br>disaster, and network security (Patel, 2020) . The main objective of cybersecurity is to ensure that<br>and also prevent harm to and even destruction of computers and other applications. For the<br>strategy of cybersecurity to be successful, it has to continually evolve so as to keep with the pace<br>of the shifting strategies and also technologies that are used by hackers (Namara, 2020) . Cyber-<br>attacks are a threat to national security since they can cause electric failures, failure of military<br>equipment, and also a breach of national security threats (Jingyao, 2019) . As such, it can result in<br>the theft of relevant and too valuable data like medical records. It is therefore imperative to<br>understand how the modern-day fireworks and VPNs work so as to mitigate against cyber-<br>attacks conducted by hackers for malicious purposes.<\/p>\n\n\n\n<p>II. Body<br>A. Impact of Cyber Attacks<br>i) Extent of Cyber-attacks<\/p>\n\n\n\n<p>It is essential to understand the importance of VPNs. They protect millions of people across<br>the globe with the ability to access the internet safely on a daily basis. Many of the internet<br>connections are now being used with VPNs, which have made it useful. Cyber-attacks have<br>continued to be a threat to the security of information for many people as hackers always try to<br>access the information which can be later used for malicious activity (Bendovschi, 2015) . A<\/p>\n\n\n\n<p>CYBER SECURITY AND CYBER AWARENESS 3<br>single successful cyberattack can have an impact on humans more than what most people think.<br>The effect may include, but not limited to, financial losses, theft of intellectual property, and also<br>the loss of consumer trust and confidence.<\/p>\n\n\n\n<p>ii) Identity theft<\/p>\n\n\n\n<p>Over the past few years, people have fallen victims of identity theft and can behave adverse<br>effects on a person and their families for a very long time. Every person can be a victim of the<br>activity and can quickly bring about an emotional toll on the people (Kahn, 2016) . The crime can<br>easily trigger emotional tolls and also emotional reactions. Some of the emotions that the victim<br>might experience are anger and depression.<\/p>\n\n\n\n<p>B. Causes and Effects of Cyber Attacks<br>i) Demographic characteristics of the population<br>ii) Causes of cybersecurity<br>iii) Other relevant data<br>iv) Related information<br>v) Analysis of trends<br>C. Availability of VPNs<br>i) Discuss, provide data regarding basic organization\/description of the information<br>which can be used to stop cyberattacks<br>ii) Issues related to access to VPNs<br>iii) Utilization of VPN services<br>D. Effectiveness of VPNs against the external hacking threat<br>i) The role of VPNs against hacking and malware threat<\/p>\n\n\n\n<p>CYBER SECURITY AND CYBER AWARENESS 4<br>ii) Expenditure on VPNs and firewalls.<br>E. Cyber awareness<br>i) Role of VPNs in cyber awareness<\/p>\n\n\n\n<p>III) Conclusion<\/p>\n\n\n\n<p>Cyber threats and attacks have been on a new level with the improvement in technology over<br>the past few years. This has caused an uproar in different sectors as it can result in different kinds<br>of losses, which include, but not limited to, military and financial losses. VPNs and firewalls<br>have been implemented in the recent past to act as protection against such acts. However, it is<br>essential to understand that VPNs do not protect computers and programs against malware or<br>viruses. As such, one has to understand that they do not protect against physical harm in<br>networks. However, they protect against external hacking as they give a hard time to hackers<br>who are trying to get information while not authorized.<\/p>\n\n\n\n<p>CYBER SECURITY AND CYBER AWARENESS 5<\/p>\n\n\n\n<p>References<\/p>\n\n\n\n<p>Bendovschi, A. (2015). Cyber-attacks\u2013trends, patterns and security countermeasures. Procedia<br>Economics and Finance, 28, 24-31.<\/p>\n\n\n\n<p>Jingyao, S. C. (2019, March). Securing a Network: How Effective Using Firewalls and VPNs<br>Are? In Future of Information and Communication Conference, 1050-1068.<\/p>\n\n\n\n<p>Kahn, C. M.-Z. (2016). Identity theft and consumer payment choice: Does security really matter?<br>. Journal of Financial Services Research, 50(1), 121-159.<\/p>\n\n\n\n<p>Namara, M. W. (2020). Emotional and Practical Considerations Towards the Adoption and<br>Abandonment of VPNs as a Privacy-Enhancing Technology. Proceedings on Privacy<br>Enhancing Technologies, 2020(1), 83-102.<\/p>\n\n\n\n<p>Patel, M. (2020, January 09). Will a VPN Protect You Against Cyber Attacks? Retrieved July 31,<br>2020, from the Fintech Times: https:\/\/thefintechtimes.com\/will-a-vpn-protect-you-<br>against-cyber-attacks\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security and Cyber Awareness I. Introduction Cybersecurity can be described as the techniques that are used to protect the information,programs, computers, and networks from unauthorized access or attack with the aim ofmanipulation. Major areas that are covered by cybersecurity include application, information,disaster, and network security (Patel, 2020) . The main objective of cybersecurity is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8120","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/8120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=8120"}],"version-history":[{"count":1,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/8120\/revisions"}],"predecessor-version":[{"id":8121,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/8120\/revisions\/8121"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=8120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=8120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=8120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}