Discuss about the Business Innovation Through Open Data.
Cybersecurity is slowly becoming is a challenge to the advancement of technology. The target of the cybercriminals is developed million of new as well as unfilled jobs in cybersecurity in the near future. And with this rise, increases some cybersecurity money dedicated just on this. At every place, businesses are heavily investing a lot of money into recruiting new professionals of security while maintaining the privacy of the consumers and completely ignoring any kind of attacks from ransomware (Awan and Memon, 2016).
There is a number of challenges in cybersecurity which is constantly evolving on the routine basis. The report will cover various challenges related to cybersecurity in business around each corner. The process is continuous learning and gaining clarity on what keeps the work so exciting.
In last many years, there is a rise in various scams and cybersecurity issues in the news. The organization should thus be more updated and aware of the employees about such scams. However, from a technology point of view, they must not depend on a single system of defence methods as any kind of anti-malware at a consumer or workers device stage, despot they must put some thought process in many segmented networks with so many lines of defence (Carr, 2016).
Following is a detailed discussion: –
Evolution of ransomware: the concept of ransomware is considered as a bane in the cybersecurity, data professionals, IT and management. Most probably nothing is considered worse than spreading any kind of virus that can impact the customer and business data and can only be removed when business meet the demand of the cybercriminals (Chen, 2017). Generally, these demands cost hundreds of thousands of money to the organization.
Attacks from ransomware are considered one of those fields of cybercrime which is developing very fast. The number of attacks is rising every year. And the unfortunate thing is that these attacks are not fading and only getting stronger with time (Chen, 2017). In the year 2013, there are approx. five lakhs of application which were claimed to be malicious. In the year 2015, this number is only increasing to 2.5 million. Presently the number of sites on record is mentioned more than three million.
However, there is more to it, where when businesses expected to take cybersecurity seriously since there is growth in the number of applications, there are many who are not bothered by it. In fact, approx. twenty percent of business still don’t have any kind of recovery solutions in case of disaster and it means that when there is any form of malicious attack which comes and will impact the 1/5th of the businesses have no procedure or plan for data recovery, customer satisfaction, application or systems (Elmaghraby et al., 2014).
And there is forty-two percent of the businesses that do face the disaster with recovery strategy and also use a tape related, an outdated method for backup. In the present time of ransomware which is constantly evolving, outdated strategies do not work at all. Data also get disappeared and the business cannot revive it properly (Cherdantseva et al.,2016). That is unless there is a payment to the criminals.
AI-based expansion: robots are able to assist in defending against any kind of incoming attacks from the cyber. From the year 2016, businesses will spend more than two billion dollars on the concept of artificial intelligence to save any form of cyber attacks (Carr, 2016).
With the growth comes many advantages and the first thing is when people don’t have to pay the robot at any time. They function for free once people have them. There is another benefit as well that is they can function all the time since they don’t need a break. Timing is crucial with malware and other form manipulation of data.
IoT threats: many people are always about the plugged in with the majority of people of first-class nations that have an iPhone and other advanced technologies easily. Eighty-four percent of household in many countries of the world have at least one smartphone or desktop or laptop (Sadeghi et al., 2015). The IoT or Internet of Things is ensuring that each device that people own is connected. It is obvious that all the connections are dependent on many advantages which makes it so attractive in the first place and people no longer have to further log in on different devices they own. It is easy to control the devices through phone (Chertoff and Simon, 2015). But the issue arises when all these interconnections make the customer immensely susceptible to all kind of attacks in the form of cyber attacks. Particularly, insecure web-based interfaces, as well as the transfer of data with insufficient authentication process and lack of customers security data, leaves the consumer open to many kinds of attacks (Cherdantseva et al., 2016).
Blockchain Revolution: the previous year with an immense rise in the overall valuation and popularity of many forms of cryptocurrencies like Ethereum and Bitcoin. These kinds of cryptocurrencies are built on different blockchains as well as the technical level innovation at the centre of revolution with decentralized and safe recording of the work. However, these kinds of technologies related to blockchain have to be associated with cybersecurity and it is also a question that many professionals have just initiated since there is progress in 2018, one can likely to find more solutions (Elmaghraby and Losavio, 2014).
Serverless apps and related vulnerability: the concept of the serverless application can ask for invites with many cyber-attacks. Customer data is specifically at risk, especially when the consumer access the application server and domestically on the devices.
In fact, on-server, when the data is saved in the cloud rather than the device of the users, one has to control the data as well as the security surrounding it (Chertoff et al., 2015).
The concept of cybersecurity is constantly evolving and all the sides cover the threat actors as well as defenders continuously innovating. There are parts where there are different kinds of security vendors with different products and there is a lot of ground that cover a new form of threats that can be seen each day (Goel et al., 2017). Here the biggest issue for cybersecurity of organization is based on two megatrends that is the exponential development in data from systems of business and the security sensors which means saving business and the extreme as well as development in the shortage of skilled with cybersecurity personnel to test and answer to incidents as discussed in the data (Sajid et al, 2016).
At the same time, the industry of cybersecurity is also facing the challenges which are based on finding a method that can weave together the information contained in all that information without depending on people to actually connect different dots. Also, with advancement in learning about the machine have shown some growth since there is organizing and also finding anomalies in a huge set of data along with alert-based refinement just giving certain incremental types of benefits in connection to issues. A similar thing is right while there is automation of actions as per the playbook (Rawat and Bajracharya, 2015). What actually requires dramatic benefits and where all the artificial intelligence can make an important impact is related to automating the decision making specifically for challenging the human work (Eustace et al., 2018).
Primary questions
What are the main challenges while dealing with cybersecurity for the business?
Secondary questions
Qualitative method
The qualitative part of the research will be used to conduct a detailed survey with a questionnaire that will have open as well close-ended questions about the problems businesses are facing while dealing with cybersecurity.
Quantitative method
For the quantitative part of the research, a well-planned and structured interviews will be organized which will include an equal number of phone interviews and face to face interviews. This will make sure that every interview will have been based on a similar set of questions (Sadeghi et al., 2015).
Sample size
It is important to identify the population here for the research. The sample will work as a representation of the complete population after studying and thus also finding the sample population which can be reviewed and show the study population.
Sampling
The study will be based on simple as well as random sampling methods that will be used to interview the organization, answer questions in research and evaluate the hypothesis. This is the pilot study can be carried out right before the main study to decide the overall effectiveness of collecting the data tool right before the main survey (Yaqoob et al., 2017).
Variables
There are dependent as well as an independent variable that consists of many elements of the type of organization and kind of cybersecurity they require. The independent variable will consist of the nature of the business, whether they utilise the standard the financial standards, level of impacts of the financial statements, nature of the organization and whether they file while returning the tax (Sajid et al., 2016).
Data collection
The candidate will be inquired to submit the filled questionnaires back to the researcher after some time. All the responses get from the questionnaire and the interviews will be part of Microsoft Excel, coded.
Data analysis
All the summaries of the outcome will be presented visually in form of charts, tables as well as graphs. In addition, there exist multilinear regression model will be utilised to find the analysis of finance-based reporting for the organizations.
Expected conclusion
The cybercriminal is able to develop the job structure for security over the next some years as well as they are going to do at remarkable (Mussington et al., 2018). There is no perfect or full proof solution for the hackers who want to get the business as well as customer data as well as use the data for there malicious deeds. In future expected ransomware has evolved more than it already exists and there is AI that takes some of the burden from cybersecurity, the IoT as well as apps which are serverless in order to raise the vulnerability of customer as well as blockchain to change the efforts of cybersecurity (Sajid et al., 2016).
Reliability and validity
The primary data is evaluating for the sake of validity as well as reliable that can be conducted to understand whether the same outcome can be reproducible or not. But when secondary data is included, there is no requirement of carrying out the reviews since the data will have already been part of publication as well as signed in the financial statement of many SMEs (Sajid et al., 2016).
Research limitation
There are many sources of data that can be used to stay confident with research findings and there is likely to be information that can get that might not be collaborative and therefore there can be an option when discrepancy of outcomes (Sajid et al., 2016). Many candidates who will be considered in the research that are those who have the sound business organizations.
Time plan
References
Awan, J. and Memon, S., 2016, January. Threats of cybersecurity and challenges for Pakistan. In International Conference on Cyber Warfare and Security (p. 425). Academic Conferences International Limited.
Carr, M., 2016. Public-private partnerships in national cyber?security strategies. International Affairs, 92(1), pp.43-62.
Carr, M., 2016. Public–private partnerships in national cyber?security strategies. International Affairs, 92(1), pp.43-62.
Chen, E.T., 2017. The Internet of Things: Opportunities, Issues, and Challenges. In The Internet of Things in the Modern Business Environment (pp. 167-187). IGI Global.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016. A review of cybersecurity risk assessment methods for SCADA systems. Computers & security, 56, pp.1-27.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016. A review of cyber security risk assessment methods for SCADA systems. Computers & security, 56, pp.1-27.
Chertoff, M. and Simon, T., 2015. The impact of the dark web on internet governance and cybersecurity.
Chertoff, M. and Simon, T., 2015. The impact of the dark web on internet governance and cyber security.
Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), pp.491-497.
Elmaghraby, A.S. and Losavio, M.M., 2014. Cybersecurity challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), pp.491-497.
Eustace, K., Islam, R., Tsang, P. and Fellows, G., 2018. Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks. In Security and Privacy in Communication Networks: SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, 2017, Proceedings 13 (pp. 166-181). Springer International Publishing.
Goel, S. and Jindal, A., 2017. Evolving Cyber Security Challenges to the Smart Grid Landscape.
Mussington, D., Arnold, B.J., Dupont, B., Hilts, S., Grayson, T., Leuprecht, C., Nevill, L., O’Higgins, B. and Tupler, J., 2018. Governing Cyber Security in Canada, Australia and the United States.
Rawat, D.B. and Bajracharya, C., 2015, April. Cybersecurity for smart grid systems: Status, challenges and perspectives. In SoutheastCon 2015 (pp. 1-6). IEEE.
Sadeghi, A.R., Wachsmann, C. and Waidner, M., 2015, June. Security and privacy challenges in the industrial internet of things. In Proceedings of the 52nd annual design automation conference (p. 54). ACM.
Sadeghi, A.R., Wachsmann, C. and Waidner, M., 2015, June. Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference (p. 54). ACM.
Sajid, A., Abbas, H. and Saleem, K., 2016. Cloud-assisted not-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4, pp.1375-1384.
Yaqoob, I., Ahmed, E., Hashem, I.A.T., Ahmed, A.I.A., Gani, A., Imran, M. and Guizani, M., 2017. Internet of things architecture: Recent advances, taxonomy, requirements, and open challenges. IEEE wireless communications, 24(3), pp.10-16
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download