support@w4writers.com +44 7743 307695
May 02, 2023

Answer:

Introduction

Students or teenage people are comparatively more vulnerable to cyber security issues. However, the main reason for the same is that, they do not think before clicking on any random link, which might be malicious and eventually could harm their data. Besides that, in the case of adults, who have been familiar with such risks and are more aware, are comparatively more ready to face them, especially in terms of keeping their own data safe. Thus, such vulnerabilities as well as the valuable data which universities entail had eventually made the universities a target for cyber attackers. Hence, it should be a major question that, how could teenagers and teenage people be encouraged to take protective measures? Individual accountability is particularly important when communicating about the dangers of using the Web or when communicating regarding internet security (Boehmer, et al., 2015). The current study Protection Motivation Theory (PMT) is to investigate the influence of a previously unstudied component as well as the personal responsibility of the students of colleges and universities. However, as far as this particular paper is concerned, here will be discussed several aspects of cyber security issues regarding universities and colleges, along with discussing evaluation and responses previously prepared by prominent authors, as mentioned in the earlier bibliography (Boehmer, et al., 2015).

Definition

Regular Online consumers` security protocols are still a popular issue since they are being asked to take steps to combat dangers, including resetting the password inside the aftermath of the WannaCry vulnerability panic in 2014 (Boehmer, et al., 2015). Moreover, it is also required to mention here that, such random or ordinary users of the internet are eventually the students of the colleges or universities. It happens because of the reason that they aren’t familiar with such attacks which eventually pull the ordinary users over random websites or web links that are malicious by nature. It is also evident with several examples regarding such cases that, their password gets in hands of the attackers or sometimes even the control of the entire system gets in the hands of attackers, all of which eventually leads to the cases where such ordinary users get their data deleted or leaked. Moreover, this paper will focus on such issues from studying or evaluating the information mentioned in the previously prepared papers, and eventually, a conclusion for the same would be prepared along with considering the responses of such papers (Boehmer, et al., 2015).

Key Features

After going through all of the above-mentioned details regarding the cyber security in universities and the major reasons behind such fear of attack or the vulnerability of universities, it is needed to further talk about or gather the key features regarding the universities and the cyber security threats they have. To begin with such key features, it is needed to first talk about the issues or threats where the attackers are from the external sphere i.e., does not belong to the closed entity of the given university. Besides that, another threat that should be mentioned in the key features of cyber security regarding universities are the ones where it is required by the universities to think about the internal threats and be prepared to face them or eventually to fight with them. As nowadays using cloud storage for excessive data is very prominent out there, thus threats that are generally faced in the case of data stored over cloud services are also needed to be taken care of by the universities and thus should also be counted as a considerable key feature for this case. Besides that, it is also required to mention here that, although 90% of common perspective that secure Web activity are critical to the country`s financial stability, most participants stated that they do not participate inappropriate safety equipment habits. A quarter of personal computers visited the World wide web without antivirus software, putting the United States in 5th position from out 24 countries assessed. As a consequence, the overwhelming bulk (90 percent) didn`t feel secure when accessing the Web virus infections, spyware, and attackers. Which although Digitally Immigrants who`ve already grown up on social media are typically more laptop than preceding ages (Prensky 2001), the younger age poses a cybersecurity risk amongst individuals as well as the global rest of the society due to their risky web activities (Palfrey and Gasser 2008). In a polling average, teenagers in the United States between 18–29 had greater percentages of physically removing data or eliminating cookies using chrome browser, but then only 50% of them employed automatic computer data management. Teenagers were just more careful than elderly persons in preventing cyber dangers, but they were still significantly more prone to participate in inhabits that facilitate hacking attempts, including sharing images or birth certificates on social media. In a separate government study in the United States, roughly a third of participants aged 18–26 indicated they hadn`t ever updated their internet financial credentials or couldn`t recall the very last occasion they had accomplished so. Just a third of people upgraded their encryption programs and much less than 50% upgraded their version of windows or browsing technology on a constant schedule (Boehmer, et al., 2015).

Recent Post

Order this Assignment now

Total: GBP120

fables template