Posted: August 22nd, 2022

Cyber Threat

Cyber Threat
For this assignment, you are requested to search in the Saudi Digital Library the following paper:
Breaking down silos between business continuity and cyber security in Journal of Business Continuity & Emergency Planning Volume 12 Number 3
Authors: Rick Phillips and Brandon Tanner
Your essay must include the following:
– Describe in details the different steps that you have followed to download this paper from Saudi Digital Library.
– Based on this paper and other related references, write with your own words how to minimize cyber threats through education and awareness.


Your well-written paper should meet the following requirements:

– Be 2 to 3 pages in length, which does not include the title page, abstract or required reference page, which are never a part of the content minimum requirements.
– Use Saudi Electronic University academic writing standards and APA style guidelines.
– Include at least one scholarly reference in addition to the above reference. The Saudi Digital Library is a good source for resources.

Cyber threat is a malicious act which its main intention is to steal data, damage information or send a signal that is meant to disrupt digital activities. Some of the common threats are such as phishing; attackers harvest data through social media and use it to impersonate or trick people to get what they want. Ransomware; attackers hold a device or a system of an institution hostage until they are paid a certain amount. Cryptojacking; attackers use a link to manipulate users of a computer to click on the link or visit an infected website. They then mine cryptocurrency. (Smart, W. 2018).
When downloading this paper, I clicked on the sign-in link which directed me to the SDL site. I then selected the SDL icon to enter the library. I put my username and password in the required slots then searched by the name of the paper. I got several other related topics to what I was looking for but finally settled on this one. Finally, I downloaded the paper as a pdf after finding the exact information I needed.
Education refers to the general understanding of cybersecurity concepts. Being taught how the process works and understanding what it entails. On the other hand, awareness training should be done separately and continually. The program is designed to keep employees up to date with information on the latest tools and techniques cybercriminals are using every day. Awareness training is more specific and timely than education.
The executives, board members, and the employees should be educated on how to minimize cyber threats. Education should cover everything from basic company policies to on-the-job training. This will also help to minimize the budget used up in buying and installation of the modest software that curbs cyber threats. Cybersecurity awareness is brought about through education. Once a staff member learns how to minimize cyber threats, he will be able to identify the dos and don’ts and make them known. That is creating awareness.
Through education, businesses and institutions can identify the type of cyber threat used. If it is phishing; one will be able to spot the emails mimicking original ones to avoid theft. for ransomware, one can be able to spot the malware used to hold systems hostage and for cryptojacking, one will be able to spot the email or online advertisement used to lure victims into visiting the website.
There are ever emerging ways used to attack victims. Through awareness training, the employee gets to learn new forms of attack and is also able to continue thinking of cybersecurity as a never-ending process. Implementing a phishing training program alone will not help to address education and awareness. It only covers a small area of education so a comprehensive education and awareness program is important.
Education also helps those in leadership positions to be able to keep contents of the information safe; for instance, pins, passwords or security codes. The executives have access to personnel records containing names, social security numbers and other personal information which attackers use to fraud victims. If the executives are educated on how to keep that information safe and secure then cases of cyber threats will minimize. (Tanner, B. (2019).
In conclusion, any organization, despite the size is a target. Funds that can be used to buy new and up to date software to curb cyber threats should be allocated to the education and awareness program. This will help prevent an organization or a business from becoming a victim of fraud or rather cyber threat. As we all know prevention is better than cure.
Phillips, R., & Tanner, B. (2019). Breaking down silos between business continuity and cybersecurity. Journal of business continuity & emergency planning, 12(3), 224-232. Ponemon Institute (2018)
Smart, W. (2018). Lessons learned review of the WannaCry ransomware cyber-attack. London: Skipton House.


Order for this Paper or Similar Assignment Writing Help

Fill a form in 3 easy steps - less than 5 mins.

Why choose us

You Want Best Quality and That’s our Focus

Top Essay Writers

We carefully choose the most exceptional writers to become part of our team, each with specialized knowledge in particular subject areas and a background in academic writing.

Affordable Prices

Our priority is to provide you with the most talented writers at an affordable cost. We are proud to offer the lowest possible pricing without compromising the quality of our services. Our costs are fair and competitive in comparison to other writing services in the industry.

100% Plagiarism-Free

The service guarantees that all our products are 100% original and plagiarism-free. To ensure this, we thoroughly scan every final draft using advanced plagiarism detection software before releasing it to be delivered to our valued customers. You can trust us to provide you with authentic and high-quality content.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.