Cyber security or information technology security is the proper protection of any computer system from damage or theft to the information, software or even hardware (Von Solms and Van Niekerk 2013). Cyber security helps to secure the information and thus the information is never lost. Moreover, the accidental or intentional attacks are also stopped with this security.
The following report outlines a brief description about the case study of Widget Inc Dot Com (Hahn et al. 2013). This particular organization is involved in the designing, manufacturing and distribution of Internet of Things. This report provides a significant discussion on the cyber security awareness of Widget Inc Dot Com. A training scheme is highly required for this purpose (Wang and Lu 2013). The various types of policies and procedures for the training and the kinds of cyber threats are solely explained in this particular report.
Case Study
Widget Inc Dot Com is an organization that does designing, manufacturing and distribution of Internet of Things. The annual turnover of this organization is about 10 million pounds (Amin et al. 2013). The organization has employed around 85 people for the various responsibilities like widget design, widget architecture, testing, production, selling and distribution. Experts in Accountancy, Finance, IT Support, Human Resources, Health, Safety, Network Support and IT administration, properly support the procedure of widget production (Elmaghraby and Losavio 2014). The executive board of this particular organization is extremely worried regarding the cyber threats that are common for any company and the type of damage that can easily occur due to this cyber attack.
Cyber Security Awareness Training for Widget Inc Dot Com
The cyber security in the organization of Widget Inc Dot Com can be provided with the help of proper training to the staffs and employees. This training is extremely important for the employees of this organization (Buczak and Guven 2016). It is a specific formal procedure that helps to educate the staff members of an organization. The corporate policies, procedures for completing the tasks with information technology are helped to understand in this training. Information is received by the employees regarding the security threats and the reason that data is the most important and vulnerable asset of the organization. Widget Inc Dot Com should involve a special cyber security training awareness for all the employees and staff members working there (Wells et al. 2014). This would certainly increase the awareness amongst them and moreover, they would not be involved in any accidental or unintentional cyber threats.
There are various policies and procedures that are solely required for the cyber security awareness training within the organization of Widget Inc Dot Com (Cavelty 2014). The cyber security policy and procedure are particular formal set of rules that should be followed by all the employees and staff members of the organization. These employees are mainly related to the information technology or the technological assets of the company and any type of violation of rule leads to serious steps or even imprisonment (Gupta, Agrawal and Yamaguchi 2016). The major aim of these policies and procedures is to properly inform all the authorized users, who have the access of information technology assets and technological resources. These assets mainly include software, hardware, disc, operating systems, application servers, electronic mail, routers, modems, hubs and many more (Hong, Liu and Govindarasu 2014). This type of policy helps to understand how these assets and resources can be secured from all types of cyber threats and what measures should be taken when these types of attacks will occur with the resources. The cyber security policies and procedures of Widget Inc Dot Com are as follows:
iii) Penalty for Security Violation: This is the third most important policy for cyber security (Ben-Asher and Gonzalez 2015). There should be a high penalty for the violation of security within the organization of Widget Inc Dot Com.
Types of Cyber Threats
Cyber attacks or cyber threats are extremely common in modern world. All types of information technology assets and resources are vulnerable or exposed to these types of attacks (Taddeo 2013). These cyber threats can cause major destruction to all the assets and resources and thus the confidential data or information would be lost. The most significant and vulnerable cyber threats for Widget Inc Dot Com are as follows:
iii) Denial of Service Attacks: DoS attacks or denial of service attacks are again very common and vulnerable attack in any system of information technology (Hahn et al. 2013). This type of attack occurs when the intruder or attacker makes any particular machine completely unavailable for the access of the authorized and legitimate users. This causes major loss of confidential information or data within the system.
Prevention from Cyber Attacks
Although the above mentioned cyber threats are extremely vulnerable for any organization, there are certain methods to stop or prevent these types of attacks. Widget Inc Dot Com should follow certain methods or methodologies for the successful prevention of cyber attacks or cyber threats (Von Solms and Van Niekerk 2013). The most important ways of preventing cyber attacks from any computer system or information technology devices are as follows:
iii) Proper Training: This is the third most important way to prevent any type of cyber threat to the system of Widget Inc Dot Com (Taylor, Fritsch and Liederbach 2014). The employees or the staff members of the organization should be trained properly so that no unintentional or accidental threats occur within the organization. Widget Inc Dot Com should hire a cyber security expert for the training purpose of their employees.
Processes for Enabling Business Continuity
The business continuity of Widget Inc Dot Com can be enabled with the help of various processes. The most significant processes for enabling business continuity within the organization are as follows:
iii) Testing: Testing is yet another important process that will help to enable the business continuity of Widget Inc Dot Com organization (Fennelly 2016). They should test all the products and services properly and perfectly, so that no fault is present within the products.
Professional, Social, Ethical and Legal Considerations
There are various professional, social, ethical and legal considerations of cyber security (Gupta, Agrawal and Yamaguchi 2016). The awareness training should include these considerations. The professional considerations are as follows:
The social considerations are as follows:
The ethical considerations are as follows:
The legal considerations are as follows:
Conclusion
Therefore, from the above discussion it can be concluded that cyber threats are the most vulnerable threats in today’s world. Cyber security can be defined the appropriate protection of all the computer systems from damage of the software, information or hardware. Moreover, the misdirection or disruption of these above mentioned resources and services are also protected with the help of cyber security. The physical access is eventually controlled and managed by securing the software and hardware. Information is the most important resource of any organization. This report has provided the proper understanding regarding Widget Inc Dot Com. It is an organization that manufactures and designs widgets. The report has also given the various types of cyber threats that are extremely common here. For the mitigation of these threats, the report has provided a proper training scheme for the employees of Widget Inc Dot Com.
References
Abawajy, J., 2014. User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), pp.237-248.
Amin, S., Litrico, X., Sastry, S. and Bayen, A.M., 2013. Cyber security of water SCADA systems—Part I: Analysis and experimentation of stealthy deception attacks. IEEE Transactions on Control Systems Technology, 21(5), pp.1963-1970.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, pp.51-61.
Buczak, A.L. and Guven, E., 2016. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.
Cavelty, M.D., 2014. Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and Engineering Ethics, 20(3), pp.701-715.
Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), pp.491-497.
Fennelly, L., 2016. Effective physical security. Butterworth-Heinemann.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global.
Hahn, A., Ashok, A., Sridhar, S. and Govindarasu, M., 2013. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid, 4(2), pp.847-855.
Hong, J., Liu, C.C. and Govindarasu, M., 2014. Integrated anomaly detection for cyber security of the substations. IEEE Transactions on Smart Grid, 5(4), pp.1643-1653.
Taddeo, M., 2013. Cyber security and individual rights, striking the right balance.
Tamjidyamcholo, A., Baba, M.S.B., Tamjid, H. and Gholipour, R., 2013. Information security–Professional perceptions of knowledge-sharing intention under self-efficacy, trust, reciprocity, and shared-language. Computers & Education, 68, pp.223-232.
Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014. Digital crime and digital terrorism. Prentice Hall Press.
Von Solms, R. and Van Niekerk, J., 2013. From information security to cyber security. computers & security, 38, pp.97-102.
Wang, W. and Lu, Z., 2013. Cyber security in the smart grid: Survey and challenges. Computer Networks, 57(5), pp.1344-1371.
Wells, L.J., Camelio, J.A., Williams, C.B. and White, J., 2014. Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), pp.74-77.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order form