Tag Archives: Cyber Awareness

Cyber-Attack Proposal Summary

The following research proposal investigates the vulnerabilities that make small businesses susceptible to cyber-attacks. This proposed research will take suggestions and evaluate other previous similar research to make the study’s performance high quality. One hundred small businesses with under one hundred employees will be randomly selected to take the designed questionnaire about certain aspects of … Continue reading Cyber-Attack Proposal Summary

The Final Search

For my topic I am doing research on how cyber security involves with businesses. How having good security benefits with protecting your business. From data files, information and etc. and just want to expand on how cyber attacks try to breach data. Search 1: Terms-  Data Breach “AND” Data Privacy “OR” security Results- 346 Database- … Continue reading The Final Search

Diving Deep into Cyber Research

Citation: I am looking at using many different resources in my research about Cyber Security. Mostly with how we can prevent it, avoid it and be safe.   Frank, M. L., Grenier, J. H., & Pyzoha, J. S. (2019). How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance. Journal … Continue reading Diving Deep into Cyber Research

Looking more in Depth with Cyber Attacks

Search 1: Database: Computer Source Boolean Terms: Cyber Attacks and Business Results: Using the Boolean search term led to 217 results. The filters I used were Peer-Reviewed Journals, publication date 1999 – 2022, and Full-Text Documents. Usefulness: The search yielded a slew of results, but what I was looking for was an article about cyberattacks against … Continue reading Looking more in Depth with Cyber Attacks

Diving Deeper into Cyber-Attacks

Search 1: Database: Computer Source Boolean Terms: Breach or Scanning Tools Results: Using the Boolean search term led to 159 results. The filters I used were Peer-Reviewed Journals, publication date 1999 – 2022, and Full-Text Documents. Usefulness: The search generated numerous articles, though what I was trying to find was an article involving Network Penetration testing. … Continue reading Diving Deeper into Cyber-Attacks