How Much Data Is Created Every Day in 2022?

Learning Goal: I’m working on a writing multi-part question and need an explanation and answer to help me learn.Please respond to the following questions with 200 words.In this reflection, introduce your classmates to your project. Tell them about the pro and con sides of the controversy, and present them with your thesis statement. Then, consider some of the following questions as you reflect upon the road so far. If you want to, explain a little bit about your process. What have you experienced so far in writing your paper? Was it difficult or fairly easy to come up with your design? Do you feel confident about your progress so far? How do you feel about your thesis statement? What would you like to do in revisions? What step seems the most difficult or the easiest for you?To help with this assignment i attached my research proposal which also includes my thesis statement. My project Topic is about ” role of education and awareness in the management of cyber threats”Role of education and awareness in the management of cyber threats (Topic)Since the birth of the internet in 1983, the world has been transformed into a digital space with data becoming central to personal, business, and governmental affairs. Today, individuals, businesses, institutions, and governmental agencies rely on the innovation to collect and store critical data. The world creates 2.5 quintillion bytes of data, which is set to increase drastically in the next decade (Bulao, 2022). Such data is exposed to threats, whereby, hackers or unauthorized parties may use the data for nefarious purposes. Currently, the world experiences 2,200 cyberattacks per day costing the world around $10.5 trillion annually to address the attacks (Stouffer, 2021). However, there have been challenges in addressing such cyber threats due to disparities in cyber security education and awareness across the world. Most individuals and organizations lack education and awareness that could help prevent and respond to such attacks.Creating awareness and promoting educational programs are seen as one of the most effective approach in reducing the number of cyberattacks. The programs look to educate individuals and businesses on how to manage cyber threats and entail prevention and response to cyber threats. Cyber experts have long promoted the implementation of such programs targeting individuals, businesses, agencies, and institutions to aid in sharing information and knowledge that will create a unified approach in dealing with cyber threats (Wheeler, 2018). However, some opponents of such an approach believe that cyber security education should not be prioritized as most attacks are one-off and irregular, hence, difficult to educate and train individuals on how to stop them.The ControversyTo address cyber-attacks around the world, awareness and education are needed to provide important information and knowledge on how to address cyberattacks. Despite support by experts from various fields, opponents argue that such education cannot keep up with the rapid innovations taking place. Cyberattacks are irregular and in many cases one-off, hence, such education may not be applicable in the real-world. The opponents suggest prioritizing other areas such as building better systems that can deter such attacks on their own.Pro Side of the ControversyWith individuals creating and storing quintillions of data in cyber spaces, the need to protect such data has also increased. The best approach put forward includes creating awareness and promoting education to create a systematic approach to handling cyber threats. Proponents also call on governments to invest heavily on addressing cyber threats to ensure that their cyberspaces are well protected. The importance of addressing such cyber threats was highlighted in the United States’ presidential elections in 2016. Hackers targeted politicians, campaigns, and electoral systems in an attempt to influence Americans’ perceptions on democracy. Moreover, a survey by the Center for Strategic and International Studies (CSIS), identified an increased number of cyber espionage cases from China targeting the American government and businesses, which could have a negative impact on millions of Americans (2021). As such, the need for awareness on such issues has created urgency in which countries, businesses, and individuals across the world should address support awareness and education as a means of mitigating the risks posed by cyberattacks. The two present an approach where knowledge and skills are shared to form a unified front towards combating cyberattacks and protecting cyber spaces across the world. Con Side of the ControversyAccording to opponents of education and awareness, cybersecurity attacks are one-off and irregular, hence, almost impossible to educate and train individuals to mitigate cyber-attacks. The threats are ever evolving and make it difficult to just educate individuals and businesses on how to stop such attacks (Fredette, 2018). Moreover, frameworks that have been put in place by governments to continuously educate individuals on cyber security have not been very successful. As such, the opponents of education and awareness promote investing funds to other tasks such as building better systems instead. This will make it impossible for hackers to access the data while also addressing the issues of human errors that may lead to such breaches (Odlyzko, 2019). Moreover, the conventional education methods are not able to keep up with the pace of innovation and inadequate for preparing people for real-world events. By prioritizing resources in other areas, the world could develop more secure systems that can easily prevent such attacks from happening.Tentative Thesis StatementAwareness and education on cyber threats should be prioritized because they provide skills and knowledge needed to prevent and respond such attacks, hence, providing a more secure digital environment.ReferencesBulao, J (2022). How Much Data Is Created Every Day in 2022?. Techjury. for Strategic & International Studies (2021). Survey of Chinese Espionage in the United States Since 2000., C (2019). Cybersecurity Education: Why Universities are Missing the Mark. Cybint Solutions., A. (2019). Cybersecurity is not very important. Ubiquity, 2019(June), 1-23. DOI:, C (2021). 115 cybersecurity statistics and trends you need to know in 2021. Norton., T (2018). Cybersecurity is not something; it is everything. The Brookings Institution.
Requirements: Literature Review Response   |   .doc file

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more