View the step-by-step solution to:


Can you please explain how to draft a formal

technical report on A proposal on how Target can use software and effective tools and resources to protect their them from future cybersecurity attacks for my technical and scientific writing course.

I have attached my draft below but I need to revise to report on a specific business. I have chosen Target. I need help with organization, document design, development, or use of sources of the final report. I have to provide a lot of material in the body portion, how do I construct this in a formal technical report, do I have subheadings etc?

To:         Dr. Amy Mecklenburg-Faenger

From:       Melissa Fletcher

Date:         09/15/2019

Subject:  A proposal on how Target can use software and effective tools and resources to protect their them from future cybersecurity attacks


Cybersecurity protects online frameworks like hardware, software, and data from cyber-attacks. Cybersecurity also involves data entry and integrity, which is vital to the design and safety of services, as part of maintaining privacy and confidentiality (skillsforcare, 2017). It is essential to recognize that breaches of security can emerge from multiple sources, like written documents, faxes, and verbally transferred information. Security breaches of digital data, however, can have a significant impact on the general population (skillsforcare, 2017).

In 2017, 46% of businesses identified a cyber breach or assault according to the Government Cyber Breaches Survey (skillsforcare, 2017). In almost all businesses today, cybersecurity is a necessity, and employees should be aware of their company's cybersecurity policies. Employees being aware of this policy ensures the security of company data and technology foundation. Which then in turn prevents financial damage to the company and maintains the businesses' reputation.

Statement of Problem:

SEC shows that cybersecurity assaults are an enormous danger and problem for personal enterprises (2015). The way they don't pay attention to digital misconduct, or acknowledge that they are not objectives, is crucial for most personal businesses. As most independent ventures today need subsidizing, or don't have legitimate administration, or don't have a solid plan of action. Any independent company without the finest of feasible resources would become powerless against a cyber-attack (US Protections and Exchange Commission 2015). If a business fails to consider cybersecurity, there can be financial problems, poor business reputation, and lastly the risk of the company going out of business  (skillsforcare, 2017).

For these reasons, cyber criminals must be a portal for large enterprises because most small enterprises ' cyber defenses are less accurate than the cyber defenses of large companies. (U.S. Securities and Exchange Commission, 2015). To examine this issue in greater depth I intend to evaluate the characteristics, revenue, necessitates, technology usage of a small business to understand the relationship with cyber security better.

Proposed Solution:

This proposal will offer a practical and realistic plan to protect against cyberattacks. A possible solution is to provide small businesses with more guidance about cybersecurity (SBA, 2019). Next, we must prepare employees in security principles, which incorporates requiring solid passwords and set up internet use guidelines. Next, it is fundamental that system computers are consistently updated, which includes having the most recent software, current browser, and operating system, viruses, malware, and other online severe threats (SBA, 2019).

Even more significantly, antivirus programming is an absolute necessity for each small businesses. Antivirus software will protect computers across the whole business from threats and destroy and warn of potential threats to the system. Most importantly, antivirus software keeps up with the latest threats.


1. What is a small business that has been affected by cyber security?

2. In terms of cost, how much is the typical loss of a small business when it suffers from a cyber attack?

3. How does the state perform a role in cyber-attack resources?

4. What are the most efficient alternatives, for example, tools, that helps small businesses with cyber-attacks?

5. What's the prospective of cyber attacks? How is this going to impact global economy?

6. Why do small businesses need cybersecurity?


The proposed solution will be available to diverse audiences. I will offer most of the instruction to advanced personnel who can develop an approach to reach and inform about the influence of cybersecurity and coming up with an excellent scheme to avoid potential cyber-attacks, for instance, funding. The primary audience will be public authorities and executives of small companies. Further, secondary audiences will comprise of business managers, cybersecurity businesses, and global population to understand cybersecurity and to plan for the challenges that go with cyberattacks.


This proposal seeks to enhance the understanding, importance, and devastating effects of cyber-crime. I will also examine how a small business works with a cybersecurity. Also, helpful solutions that I mentioned preventing cyber-attacks on small businesses that help to protect the economy from a likely recession. Enabling cyber-crime to evolve among small businesses puts the possible risk of the next financial crisis and could take billions from the global market (SBA, 2019). I will begin thorough research as soon as possible with your approval and support.

Annotated Bibliography:

Aguilar, L. (2015). | The Need for Greater Focus on the Cybersecurity Challenges Facing   Small and Midsize Businesses. Retrieved 15 September 2019, from

           "The Need for Greater Focus on the Cybersecurity Challenges Facing Small and Midsize Businesses" was written by commissioner Luis a Aguilar. Although it was published in 2015 as clearly stated in the article, I plan to use this information as an overview of challenges faced with small businesses and cybersecurity. The possible solutions mentioned in the article I find useful as it appears this is an ongoing issue today. I found this article appealing because it clearly states the solutions to resolve this issue. 

I plan to research and use information from the article for possible solutions, statistics, problems, and the reasoning why small businesses are targets. This article is credible as it clearly states the author at the top of the article. Also, the article is a public statement and was open to the public in the autumn edition of" Cyber Security Review." The article is credible, and it states on the bottom of the article how views expressed are those of the author. Also, how it does not reflect the members of his fellow commissioners or members of the staff. Raghavan, K., Desai, M., & Rajkumar, P. (2017). Managing Cybersecurity and e-Commerce Risks in Small Businesses. Retrieved 15 September 2019, from

This journal will help provide the needed statistics I need for this report. Reading the abstract helped me determine whether I wanted to use this source. The article provides information on the increase in cyber breach incidents. Also, it offers steps to strengthen cybersecurity. It goes further by explaining how to build customer trust, and even goes into available tools on website security. The headings in the journal make it easier to determine what information I need to use for example, introduction, problem and significance and cybersecurity management execution flow.

I plan to research and use information from the journal to use statistics to make my report more credible. The authors clearly state their full names and emails on the top of the journal, showing how credible this resource is. After doing a quick research on all the authors of this journal, most of their articles have many citations. Also, on the top it states the journal it was published in, Journal of Management Science and Business Intelligence. The date is displayed below, May 2017, the year is not too old so information used will be quite relevant.

SBA. (2019). Top Tools and Resources for Small Business Owners | The U.S. Small Business Administration | Retrieved 15 September 2019, from

The site is a related government webpage that offers business guides, funding programs, federal contracting, learning centers, and local assistance for small businesses. SBA claims that it has been attempting to negotiate change since 1953 and to encourage intervention to establish, build, or restore these personal businesses. As a regional federal agency, SBA is a credible source.

I plan to research and use the information from SBA to produce a proposed solution. This government affiliated site is credible as they state their contact information at the bottom, "Contact SBA". Upon clicking on the link SBA states, "We appreciate your interest in the SBA. Find ways to contact us by phone and email along with other avenues to guiding you through our services." This source appears to be comprehensive with lots of available topics and resources.

skillsforcare. (2017). An Introduction to Cyber Security. Retrieved 15 September 2019, from    

U.S. Securities and Exchange Commission. (2015). | The Need for Greater Focus on the Cybersecurity Challenges Facing Small and Midsize Businesses. Retrieved 15 September 2019, from

Recently Asked Questions

Why Join Course Hero?

Course Hero has all the homework and study help you need to succeed! We’ve got course-specific notes, study guides, and practice tests along with expert tutors.


Educational Resources
  • -

    Study Documents

    Find the best study resources around, tagged to your specific courses. Share your own to gain free Course Hero access.

    Browse Documents
  • -

    Question & Answers

    Get one-on-one homework help from our expert tutors—available online 24/7. Ask your own questions or browse existing Q&A threads. Satisfaction guaranteed!

    Ask a Question
Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes