Writing a Recommendation Report on Cybersecurity
Answered
This will provide an overview of a problem and solution relating to the larger Recommendation Report. A table of contents and corresponding page numbers This table should closely correlate with subheadings, and figures in the body of the Recommendation Report. A table of graphics/illustrations.
This table should closely correlate with subheadings, and figures in the body of the Recommendation Report. A one-page executive summary.
Body, including an introduction (problem, solution, background, data sources, scope and limitation) that ends with a clear thesis statement or initiative to solve the identified problem, methods, results, conclusions, and recommendations .
Effective, useful, and properly cited graphic aids (minimum of three). Glossary that provides a comprehensive overview of specialized terminology appearing in the Recommendation Report .
Include at least four sources (from Week Two Assignment) in addition to the course textbook that are amply and appropriately cited in the text of the document and listed on the Reference page. Two sources must be credible journal articles from the University of Arizona Global Campus Library.
- Problem
- Cybersecurity breaches happen because hackers steal sensitive information over the web or through cell phones to obtain social security numbers, dates of birth, etc. (Edelman, 2020).
- Third-party entities sell vital information to companies using consumers’ data without their permission .
- Companies should buy more data protection to stop security breaches and study when breaches happen (Edelman, 2. Create applications for the cybersecurity department to stop potential security threats (Goel & Nussbaum, 2021).
- The first computer worm was created by Bob Thomas in 1971, which became a part of history (Townsend, 2021).
- In 2002, President George W. Bush created the Department of Homeland Security, in which the department became responsible for IT infrastructure and created a division especially for cybersecurity (Townsend, 2021). Also, this was filed as a bill at that time.
- The data sources within the annotated bibliography serve to look at the various reasons for cybercrimes and their disadvantages on consumers and businesses and address the advantages of securing information better.
- The scope of this report is based on information that has been previously studied to give the best outcomes from cyber breaches.
- The limitations of this report are to provide future awareness for cybersecurity and how to better protect businesses from potential scammers and cybercrimes.
Cybersecurity is known to be either protection or a threat to a company and can be beneficial to businesses and consumers alike: when it comes to threats, it makes companies infrastructure more vulnerable, and recommendations can be made to improve cybersecurity further, is to create a way for potential hackers to stop.
- I will read the articles that I have researched in my reference list.
- I will study some of the charts and graphs in the web sources and articles.
- I will not conduct interviews with cybersecurity personnel.
- I will not conduct a study of my own.
- Cybersecurity is to protect consumers and businesses alike from potential threats.
- Cybersecurity stops cybercrimes from happening.
Conclusion
- Cybersecurity systems protect all information and are beneficial.
- Cybercrimes can be minimized or stopped.
- Many cybercrimes have happened to various businesses, and the costs to repair are in the million-dollar range, and cybersecurity issues can be fixed.
- Study when potential hackers start data breaches, meaning morning, noon, or night is when security breaches happen.
- Create a defense that cybercrimes can become illuminated in the future.
- Hack into the company’s website to know how secure it is for potential attackers to retrieve consumer’s information.