Running Head: CYBERSECURITY zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz
zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz 1
W5 ~ FINAL EXAM RESEARCH & VISUAL AIDS
CYBERSECURITY zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz
zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz 2
Many organizations across diverse sectors and industries are facing issues like phishing
attacks every year because most employees are not aware of the cybersecurity issues
at the workplace. The organizational employees are not able to differentiate between
malicious and genuine emails, which results in a major loss for the organization. The
issues of cybercrime are also creating a significant impact on the online operating
business economy (Dayalan, 2017). Sometimes the technical team of the organization
can help by intervening in the cyber-attack issue at the right time, but sometimes they
are unable to trap the cybercriminals because of the complexity of the cyber-attacks.
Therefore, it becomes very important for all organizations to focus on the integration
of cybersecurity awareness elements and IT (Information technology) strategy. The
seriousness of cybersecurity threats is required to understand by the employees or
trainees through designing a proper training session for cybersecurity awareness. This
training session can make them learn about the seriousness of cybersecurity threats
that is happening every day in the online mode and the rising serious repercussions if
immediate action is not taken by the employees in a proactive manner.
The importance of training on cybersecurity awareness
Training on cybersecurity awareness is significant in the digital era because it
can help in protecting a firm from cyber-attacks on the system that usually leads to
data breaches. The prevention of such kinds of cybercrimes can result in financial
losses as well as the loss of the brand's reputation (Terra, 2022). There are several
reasons behind reconsidering the cyber security awareness training, which includes
preventing data breach and phishing attacks, develop technological defenses against
cyber threats, build a culture of security, give confidence to the customers, show
socially responsible as a business, compliance, and improve employee wellbeing (7
reasons why security awareness training is important. CybSafe, 2022). The below
CYBERSECURITY zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz
zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz 3
graph shows that the importance of training on cybersecurity awareness has been
understood by many companies these days. It shows the rising use of security metrics.
Source: (Top 11 most powerful cybersecurity software tools in 2022. Software
Testing Help, 2022)
An organization can get many benefits by providing training on cybersecurity
awareness to all its employees. It has been identified that a well-trained staff in cyber
security can reduce the risk to the overall security of the digital network of the
organization. This can also result in fewer financial losses because of cybercrimes.
Thus, it can be said that allocating funds or rising investment for cyber security
awareness training among the office staff can be a great option to improve business
growth. Moreover, less likelihood of lapses in protection can be found if all the office
staff is pursuing cyber security practices training. Further, the provision of cyber
CYBERSECURITY zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz
zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz 4
security awareness training can create many security-aware personnel who can create a
better reputation with customers. This can make the business a more trustworthy
organization. Much research has proven that a business can lose its customers because
of the repeated subject of the business to security breaches. This can also give
negative publicity to the business. Therefore, it is important to be informed of best
practices to build this improved security level.
The use of cybersecurity tools in training
In the present digital world, it is important for every single firm to keep a
regular check on its systems, assets, information, and data because of the rising
different cybersecurity threats and attacks, regardless of the organizational size. It is
essential to protect the data the organization holds and all the services where the role
of cybersecurity tools comes into play.
• Web vulnerability scanning tools
The web vulnerability scanning tools are helpful in scanning web applications to
find out security vulnerabilities, including path traversal, cross-site scripting, and SQL
CYBERSECURITY zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz
zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz 5
injection. Some examples of these software programs are Burp Suite, SQLMap, Nikto,
and Paros Proxy (STAGE9 BrainStation, 2022).
• Intrusion detection and protection systems (IDS/IPS)
The intrusion detection and protection systems help in discovering possible
intrusions by monitoring the network traffic. It is helpful in stopping the attack soon
by discovering an exploit. The IDPs can easily prevent and detect the attacks like
rootkits, phishing, malware, trojans, and viruses. This cyber security tool is capable of
blocking any kind of threat. Intrusion detection keeps an eye on unusual things and
detects adversaries, whereas intrusion prevention work actively to take measures to
shut down or prevent any suspicious activity on online mode (STAGE9 BrainStation,
2022).
• Introduction of encryption tools
Encryption tools are helpful in protecting huge amounts of data by scrambling text.
This security tool does not allow any unauthorized users to access the data. Some
examples of such kind of tools are VeraCrypt, AxCrypt, TrueCrypt, Tor, KeePass, and
NordLocker. The introduction of encryption tools at the organizational level can help
employees, and customers feel secure from all data breaches or cyber-attacks.
• Antivirus software
The antivirus software is developed to identify viruses and other harmful malware,
including worms, adware, Trojans, ransomware, and spyware. Some example of these
software tools includes Bitdefender Antivirus, Norton 360, Kaspersky Anti-Virus,
Norton AntiVirus, and McAfee Total Protection (STAGE9 BrainStation, 2022). This
CYBERSECURITY zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz
zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz 6
tool can be used at the organizational level to prevent all data breaches at the
workplace.
• Firewalls
One of the most important security software tools is a firewall. It is the core of
security tools that can prevent unauthorized access from a private digital network. This
software tool can be implemented as software, hardware, or a combination of both.
The implementation of such tools at the organizational level can be used to prevent
unauthorized users by examining each message and blocking the threats or spam
messages that are not meeting the particular security criteria. This software has many
benefits, but it also has some limitations that an organization needs to understand
before implementing it at its organizational level. There is a possibility that a skilled
hacker can pass the data and program through firewalls without creating any issues.
• PKI services
PKI is an effective tool that can also be used for creating compliant and trusted
digital signatures, enabling multi-factor authentication and access control, building
identity and trust in IoT ecosystems, digitally signing and protecting the code, and
encrypting email communications. zz
Overall, spreading knowledge about cybersecurity tools in the training session can
be helpful for the organization's growth as well as the employee's growth in career.
CYBERSECURITY zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz
zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz 7
References
7 reasons why security awareness training is important. CybSafe. (2022, September 9).
Retrieved October 7, 2022, from https://www.cybsafe.com/community/blog/
Dayalan, M. (2017). Cyber Risks, the Growing Threat. IJNRD-International Journal of
Novel Research and Development (IJNRD), 2(9), 4-6.
STAGE9 BrainStation®. (2022, January 4). Cyber security tools (2022 guide).
BrainStation®. Retrieved October 7, 2022, from https://brainstation.io/career-
guides/what-tools-do-cybersecurity-analysts-use
Terra, J. (2022, September 16). Why is security awareness training important?
Simplilearn.com. Retrieved October 7, 2022, from
https://www.simplilearn.com/importance-of-security-awareness-training-
article#:~:text=Security%20awareness%20training%20is%20important,and%20financi
al%20losses%20as%20well.
CYBERSECURITY zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz z zz zz zz zz zz zz zz zz
zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz z zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz zz 8
Top 11 most powerful cybersecurity software tools in 2022. Software Testing Help.
(2022, October 1). Retrieved October 7, 2022, from
https://www.softwaretestinghelp.com/cybersecurity-software-tools/