The development of technology has become inevitable

Over recent years, technology has become something that everyone depends on for survival. Different types of sectors have adopted technology all intending to make work easier. The development of technology has become inevitable, and each day, a new kind of technology is invented. However, the main problem has emerged where more technology is developing, the more unique types of security issues are being encountered. The problem of security did not begin in recent years, but it has existed for many years now. The internet began with the invention of web 1.0. This was a very secure we since it was one way. The user could post images or any other information but they could not get any feedback. In short, web 1.0 was not interactive. This was not satisfactory for man as he wanted technology to interact with one another openly. This means that if one posts an image on their side, they can get comments from people and even feedbacks. Despite this advantage of web 2.0, it also brought about its share fare of disadvantages. One major disadvantage was the security issues. The security issues that technology has brought about cannot go unnoticed. Web 3.0 was also developed, but it also brought about more security issues than web 3.0 (Rudman, 2015). For this reason, I believe that cybersecurity would be the best topic to review

This assignment’s main purpose is to educate people on the cybersecurity issues that have risen and how they can be stropped. In recent years, everything has turned digital, and everyone depends on technology to do almost everything. Every other sector has adopted the technology. An example, the bank is no longer what it used to be sometime back, for now, one can bank at the comfort of their homes through their mobile phones. More to this, there has been the development of online platforms through which people do their shopping and have it delivered right to their doorsteps. All these kinds of transactions need to be secured since if the user’s information is in anyway leaked, then the results can be catastrophic. This means that cybersecurity in such a scenario is very crucial. As much as the bank keeps the security of such information, people still become cyber-attacks due to lack of knowledge.

In some cases, users will be asked to fill in online forms, and unknowingly they are submitting their documents and passwords to people with bad intentions of robbing them off. Such people will be victims of cyber-crime due to a lack of knowledge. If only people who do not know much about cybersecurity were educated, then cyber crime cases will be significantly reduced. This is the reason why I believe that the essay can be beneficial to a considerable population (Tsagourias, 2012).

The research targets an audience of those people who are online shoppers, and yet they have little knowledge of the risk of cyber-crime that they face. This group will be affected by the research because it will start off by giving the definition of cybersecurity and going into details on what threats are faced and even various ways through which it can be stopped. By the end of the research, this audience will be capable of identifying a cyber-attack when they see it and even know the best way to stop it. More to this, the research will also affect the organizations that have IT departments. It will not make any sense if one educates people who ought to be protected and ought to defend them are not educated (Kenney, 2015).

Currently, the internet has brought about a lot of changes in the education sector. This is because it has dramatically increased the accessibility of resources. One can be able to access both current and even past information. Cybersecurity is a very current issue but at the same time, the past of cybersecurity cannot be ignored since the history is very important if at all one has to understand the topic in-depth for this reason, I feel that the first resource that can be very important and viable to use is the Wikipedia. Wikipedia is a source that will be regularly updated. An example, it can be greatly used to show the recent types of attacks and where they have been conducted. The resource is viable because it has been updated. Cybersecurity is a sensitive topic, and it would not make any sense if the research paper were to educate people on ancient issues. Cyber threats need to be updated regularly. The second resource that can be used is Google Scholar. This database contains many articles, some of which will directly be related to cybersecurity. The source is viable because it only provides peer-reviewed articles. This means that a lot of research has been done, and the information published in the articles is one that can be relied on. This makes the source very credible. The research that should be presented to the audience must be one that has the right information and one that can be trusted. This means that the information that is presented in the research must be one that can be verified (Rid, 2015).

 

 

 

 

 

 

 

 

 

References

Kenney, M. (2015). Cyber-terrorism in a post-stuxnet world. Orbis59(1), 111-128.

Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies38(1-2), 4-37.

Rudman, R. (2015). Web 3.0: governance, risks and safeguards. Journal of Applied Business Research (JABR)31(3), 1037-1056.

Tsagourias, N. (2012). Cyber attacks, self-defence and the problem of attribution. Journal of Conflict and Security Law17(2), 229-244.