Discuss about the Basic Cybersecurity Measures Best Practices To Reduce.
In the modern world, the use of internet is increasing day by day and business organizations are not exceptions. The excessive use of ultra-modern technology has changed the approach of business organizations towards the customers. Cyber-security includes different technologies designed to protect the systems, data, and information from various types of cyber-attacks (The Economic Times, 2018). Majority of organizations are implementing technological tools to perform business operations. Thus, the main challenge in front of the management of business organizations is to protect the systems from being infected through various types of potential online threats. The report discussed about the determination of challenges being faced by the business organizations through cyber-security.
The objective of the research is to determine various types of security measures implemented by the organizations in order to counter the threats posed by various types of cyber-attacks. It will provide knowledge regarding the cyber-security techniques to be implemented by the business organizations and the ways through which, such threats are handled (IT Governance, 2018). In addition, the objective of the research is to provide insights into the cyber-security world and the challenges being faced by the business organizations due to cyber-threats. It will provide significant information related to the cyber-security and the ways of implementing cyber-security in the business organizations.
Cyber-security is a significant topic in the present scenario for the business organizations (Cisco, 2018). Most of the organizations implementing computer technologies for business purposes face issues related to cyber-security. The report provides information related to the cyber-security and cyber-threats because of which, the scope of the report is highly significant.
Cyber Security refers to the technologies and practices constructed to protect various networks, programs and devices from cyber-attacks by virus, spam and various online attacks (Fielder, Panaousis, Malacaria, Hankin, & Smeraldi, 2016). Cyber-security has become the need of business organizations as they have to store, collect, and analyze information on computers. The leakage of sensitive data and information could harm the business operations as well as its reputation (Secureworks, 2017). The increasing cyber-attacks have become a serious issue as majority of business organizations have become highly vulnerable to different types of cyber-attacks (Graham, Olson, & Howard, 2016). It requires effective defense mechanisms to be implemented by the organizations from the point of view of internet and computer technologies. The rate of cybercrimes is increasing and such an alarming increase will be a great source of problem for business organizations due to which, they are investing a lot in hiring number of IT professionals in order to prevent their businesses from such crimes (Robert, 2018). In 2017 only, number of business organizations had spent around $86.4 billion over cyber-security measures and numbers of challenges still exist such as;
Therefore, it has been revealed that there are various types of cyber-threats challenging for the business organizations as almost all the business organizations utilize computing devices and internet for business purposes. There is requirement of advanced expertise along with effective security measures to get rid of such issues arising now and then in the organizations (WaterISAC Security Information Center, 2015). The information related to cyber-threats have been explained in previous researches but the information regarding what measures should be taken to prevent or combat such attacks, have not been discussed in majority of the research studies. So, this report will provide information related to the security measures along with various types of cyber-attacks in trend for the business organizations.
The report discusses about the cyber-security issues being faced by the business organizations as well as appropriate security measures to be taken by them to overcome such issues. In this context, the report will answer the following research question and the sub-questions;
The research methodology is considered as a methodical or systematic way to solve a problem. It is known as a science of studying how to carry out a research (Rajasekar, Philominathan, & Chinnathambi, 2013). To gather information for the purpose of answering research question, the report will utilize both the methods of data collection i.e. primary as well as secondary. The secondary data will be gathered from the previous researches conducted by proficient researchers along with reports, books and various other online resources to assist in the research purpose. The primary mode of data collection will include interviews and surveys in order to collect first-hand data which will provide information related to the opinion of people regarding the research issue.
For qualitative technique of data collection, interviews will be conducted with the computer experts of the business organizations, which will provide information related to the issues being faced by the organizations regarding cyber-security and the measures in place to fight against such problems. The convenient non-probability sampling technique will be utilized for the selection of participants to be interviewed and the sample size would be 3. The mode of data collection will be structured questionnaire which will contain 10 open-ended questions to be asked from the interview participants. The face-to-face interviews will be taken on the convenience of the participants and responses will then be analyzed comprehensively.
For quantitative technique of data collection, surveys will be conducted with the computer users of the business organizations to gather the information regarding the issues faced by them in cases of systems getting affected with the viruses and the challenges they have to face because of loss of data and information due to cyber-attacks. The random probability sampling methods will be used to select the survey participants and the sample size will be 30. The survey will be conducted by preparing online questionnaire to the survey participants. The questionnaire will be uploaded on survey monkey and mailed to the participants to be filled by them on their convenience. The number of questions will be 25, out of which, 5 will be demographic questions. The respondents will have to answer the questions on the scale of 1 to 5 wherein, 5 stand for ‘Strongly agree’ and 1 stand for ‘Strongly Disagree’. The data collected through survey will be compiled by the utilization of MS-Excel. For the purpose of visualizing the data, pie charts will be used which will assist in analysis of data. The reliability of the data instrument will be tested using Cronbach’s alpha coefficient. If the value of Cronbach’s alpha coefficient is greater than 0.7, instrument is reliable. The validity of instrument will be ensured by getting questionnaires review from experts related to research area.
The limitations of this research might be time constraints as more time will be required to collect relevant information from survey and interview respondents. To collect data on the convenience of the respondents will require more time consumption and the research is required to be conducted within predefined duration. It might hamper the results of the research within restricted time-period.
Stages of Research |
Week 1 |
Week 2 |
Week 3 |
Week 4 |
Week 5 |
Week 6 |
Week 7 |
Selecting the topic |
|||||||
Collecting the data through secondary sources |
|||||||
Literature Review |
|||||||
Planning the research methodology |
|||||||
Selecting research techniques |
|||||||
Collecting Data |
|||||||
Data Analysis |
|||||||
Findings and recommendations |
|||||||
Final Research Project |
Conclusion
The proposal of the research will assist in conducting the research as per the demands and requirements of the research. Through it, proper guidelines will be followed for achieving the research purpose. It will be beneficial for conducting the research within specific time-period as well as to obtain desired outcomes. All the procedures to be included while conducting the research are already predetermined which will ease the process and delays will also be avoided. The research relates to the modern world requirements as almost all the business organizations utilize internet services and computing devices for achieving business purposes. The following research will focus on the challenges faced by the business organizations regarding cybersecurity. The research is significant as it will find solutions to such cyber-security threats which would be beneficial for the business organizations.
References
WaterISAC Security Information Center. (2015). 10 Basic Cybersecurity Measures Best Practices to Reduce Exploitable Weaknesses and Attacks. Retrieved May 24, 2018, from Ics-cert.us-cert.gov: https://ics-cert.us-cert.gov/sites/default/files/documents/10_Basic_Cybersecurity_Measures-WaterISAC_June2015_S508C.pdf
Alton, L. (2018). 5 Cybersecurity Measures Every Small Business Should Take This Year. Retrieved May 24, 2018, from Allbusiness.com: https://www.allbusiness.com/countdown-to-2016-4-reasons-you-must-update-your-business-software-102555-1.html
Ashenden, D., & Lawrence, D. (2016). Security dialogues: Building better relationships between security and business. IEEE Security & Privacy, 14(3), 82-87.
Carr, M. (2016). Public–private partnerships in national cyber?security strategies. International Affairs, 92(1), 43-62.
Cisco. (2018). What Is Cybersecurity? Retrieved May 24, 2018, from cisco.com: https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html
Davis, R. (2014). 10 Cyber Security Measures That Every Small Business Must Take. Retrieved May 24, 2018, from Tech.co: https://tech.co/10-cyber-security-measures-every-small-business-must-take-2014-11
Doell, L. (2012). 10 essential cybersecurity measures. Retrieved May 24, 2018, from Americanexpress.com: https://www.americanexpress.com/us/small-business/openforum/articles/10-essential-cybersecurity-measures/
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., & Smeraldi, F. (2016). Decision support approaches for cyber security investment. Decision Support Systems, 86, 13-23.
Giles, M. (2018). Six Cyber Threats to Really Worry About in 2018. Retrieved May 24, 2018, from Technologyreview.com: https://www.technologyreview.com/s/609641/six-cyber-threats-to-really-worry-about-in-2018/
Graham, J., Olson, R., & Howard, R. (2016). Cyber security essentials. CRC Press.
IT Governance. (2018). What is cyber security? Retrieved May 24, 2018, from itgovernance.co.uk: https://www.itgovernance.co.uk/what-is-cybersecurity
Knowles, W., Prince, D., Hutchison, D., Disso, J. F., & Jones, K. (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 52-80.
Kohler, M. J. (2017). The Dos and Don’ts of Cyber Security Measures to Help You Protect Your Business and Assets. Retrieved May 24, 2018, from entrepreneur.com: https://www.entrepreneur.com/article/304935
Nibusinessinfo. (2018). Protect your business online. Retrieved May 24, 2018, from Nibusinessinfo.co.uk: https://www.nibusinessinfo.co.uk/content/common-cyber-security-measures
Rajasekar, S., Philominathan, P., & Chinnathambi, V. (2013). Research Methodology. Retrieved from Arxiv.org: https://arxiv.org/pdf/physics/0601009.pdf
Robert, S. (2018). Cyber Threats: Definition & Types. Retrieved May 24, 2018, from study.com: https://study.com/academy/lesson/cyber-threats-definition-types.html
Secureworks. (2017). Cyber Threat Basics, Types of Threats, Intelligence & Best Practices. Retrieved May 24, 2018, from secureworks.com: https://www.secureworks.com/blog/cyber-threat-basics
Shackleford, D. (2015). Combatting cyber risks in the supply chain. SANS.
The Economic Times. (2018). Definition of ‘Cyber Security’. Retrieved May 24, 2018, from economictimes.indiatimes.com: https://economictimes.indiatimes.com/definition/cyber-security
Xu, G., Yu, W., Chen, Z., Zhang, H., Moulema, P., Fu, X., et al. (2015). A cloud computing based system for cyber security management. International Journal of Parallel, Emergent and Distributed Systems, 30(1), 29-45.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download