This study deals with preparing a research proposal on Cyber security for business. Recently, Information technology data protection as well as information security plays important role in any business enterprise (Vande Putte & Verhelst, 2014). However, data security becomes one of the main issues in IT industry. With the evolution of internet, it is seen that internet is growing for business development in private as well as government companies. In order to protect the data, it is important to develop information technology by using various techniques or tools in the field of cyber security. Addition to that, cyber security can be treated as significant challenge in computer as well as information technology at the same time. The current segment explains about protection of information need to be measured by each company for securing the data in an effective way (Sajid, Abbas & Saleem, 2016). In this technology age, it is essential for any company to solve the cyber issues as well as increase their work efficiency. There had been increased use of internet where protection as well as privacy is highly needed by any business enterprise. Protection of personal data as well as privacy is increasing day-by-day in Australia starting from the year 2006. Therefore, various forms such as indirect and direct attack could attack the data. The data need to be protected by business for securing the data of the company in the most appropriate way (Van den Berg et al., 2014).
The main aim of this report is to examine the challenges of cyber security in business. In order to achieve the aim, following objectives need to be mentioned as follows:
The main scope of the project is to understand the meaning and concept of cyber security in business. This project report will help readers to gain knowledge about challenges in cyber security in business. Furthermore, the project report has wider scope for information technology business for developing the understanding of various strategy for bringing improvement in cyber security in business (Sukumara et al., 2017).
As rightly put forward by Scully (2014), Cyber security refer to techniques of protecting computers as well as programs and data from unauthorized accesses that are conducted for exploitation. There are major areas that are covered in cyber security and this includes application security, disaster recovery as well as information security and network security (Shoemaker, Davidson & Conklin, 2017).
According to Carr (2016), cyber security is defined by its evolving nature. There are several challenges in cyber security that is being evolved on daily basis. There is most common challenges present with cyber security for small business. Cyber security is more significant than ever before as the frequency of attacks against increases within small business. Furthermore, 43% of all cyber-attacks are presently targeted towards small business and these attacks do not have to be significantly sophisticated. It is easy to look at basic procedures that can protect the data that include:
Administrative right management- It is important to understand the fact that administrative rights need to be carefully managed on all devices used in devices for making it harder for malware installation as well as remote access (Shoemaker, Davidson & Conklin, 2017).
Password management- It is important to understand the fact that business should have a policy in place for replacing default as well as blank passwords on all devices (Van den Berg et al., 2014).
Security patch updates- It is important to understand the fact that a patch update policy is incredibly significant. In addition, missed security updates are exactly made earlier this year as well as staying updated software on all devices (Sajid, Abbas & Saleem, 2016).
There are several strategies that could help to improve cyber security in business and these strategies are mentioned below with proper justification:
Devising a sophisticated password strategy- It is essential to get employees to create passwords with combination of upper case as well as lowercase letters, symbols and numbers. In addition, strong passwords do not actually guarantee total protection and revoking access of user as well as permissions any time an account is compromised (McGettrick et al., 2014).
Back up- It is essential to review the details. The data of the company should be saved a well as stored in different locations like cloud solution independent of physical hardware in office (Van den Berg et al., 2014).
Securing personal devices- It is essential to understand the fact that more mobile workforce refers to monitoring system, as it is necessary to protect the data of the business (Lohrke, Frownfelter-Lohrke & Ketchen, 2016).
Investing in cyber security training- Furthermore, IT security as well as computer protection is no longer a domain for IT staff members (Shoemaker, Davidson & Conklin, 2017).
Designing a response plan- It is important to design a response plan that complement an incident response plan with clear ICT security policies as well as ensuring employees for following proper security procedures (Jajodia et al., 2015).
In this research proposal, there is various literature problems noted and need to be rectified in the future study. The technology used helped in evaluating the technical report as well as outlining a high-level controlled ecosystem. The technology used in the proposal help in facilitating the identity management as well as schema protection device with the intention to prevent any theft or crime (Gunes et al., 2014).
Several gaps had been identified in this literature section or review and this need to be identified. The literature failed to mention about chances of occurring threat in an information systems. Information technology needs to be explained in the study in detail as it helps in developing various techniques in the field of cyber security (Elmaghraby & Losavio, 2014).
In this particular research study, the researcher will be using interpretivism research philosophy as it focus mainly on multiple methods to solve any given research issue (Shoemaker, Davidson & Conklin, 2017). The present research will focus upon using mixed method research design for investigating cyber security challenges for business. Primary data generated through interpretivism research philosophy will enhance the validity of the researcher. However, the research outcome will be observable as well as quantifiable at the same time (Dua & Du, 2016).
In this particular research study, the researcher will follow deductive research approach where the research should focus mainly in investigating the known concepts related to cyber security for business and finding out whether the known concepts are valid or not. However, the research will help in creating a hypothesis based on the identified concepts as well as testing validity by comparing them with the primary data (Cherdantseva et al., 2016).
Step 1: Identifying a research problem
In this first step, the researcher needs to identify a research problem. In case of qualitative research, the research needs to explore and understand the identified research topic (Cavelty & Mauer, 2016).
Step 2: Reviewing the literature
In this second step, the researcher needs to review the literature. In case of qualitative research, the research needs to review the literature by using reliable secondary sources.
Step 3: Specifying a purpose
In this third step, the researcher needs to specify a purpose that should be general and broad (Van den Berg et al., 2014).
Step 4: Collecting the data
In this fourth step, the researcher needs to collect data that emerges from protocols and text or image data.
Step 5: Analyzing and interpreting the data
In this fifth step, the researcher needs to analyze and interpret the data and conduct thematic development.
Step 6: Determining the quality of data
In this sixth step, the researcher needs to determine the quality of data.
Step 7: Reporting the research
In this seventh step, the researcher needs to report the research that is equally flexible and emerging. The research should be reflexive and biased at the same time (Shoemaker, Davidson & Conklin, 2017).
The use of validity is common in quantitative research but now it had been started to reconsider in the qualitative research paradigm. Validity is rooted from positivist perspective as it is redefined for their use in a naturalistic approach. The information collected by the researcher should be valid enough so that there is no discrepancy and biasness present in the results (Brown, Gommers & Serrano, 2015).
Convenient sampling technique will be used to select IT professionals. IT professionals will be interviewed whereas different journals from reputed journal databases, academic books and websites on cyber security in business.
4 IT professionals will be interviewed. There are no specific rules for determining an appropriate sample size in qualitative research.
Face-to-face interview technique will be applied for interviewing IT professionals.
The researcher here believes in collecting information from reliable sources such as journal articles, books and websites. The articles that are selected for the study is mostly taken that is published after 2012 so that it is updated.
Step 1: Identifying a research problem
In this first step, the researcher needs to identify a research problem. In case of quantitative research, the research needs to describe and explain the identified research topic.
Step 2: Reviewing the literature
In this second step, the researcher needs to review the literature. In case of quantitative research, the research needs to review the literature by using reliable primary sources.
Step 3: Specifying a purpose
In this third step, the researcher needs to specify a purpose that should be specific and narrow (Van den Berg et al., 2014).
Step 4: Collecting the data
In this fourth step, the researcher needs to collect data that include large number of individuals, predetermined instruments and numeric data (Shoemaker, Davidson & Conklin, 2017).
Step 5: Analyzing and interpreting the data
In this fifth step, the researcher needs to compare results with prediction as well as past studies.
Step 6: Determining the quality of data
In this sixth step, the researcher needs to determine the quality of data.
Step 7: Reporting the research
In this seventh step, the researcher needs to report the research that is equally standard and fixed. The research should be objective and unbiased at the same time.
The primary data collected by the researcher need to be valid by nature. Validity refers as the extent to which a concept is appropriately measured in a quantitative study (Van den Berg et al., 2014).
Random probability sampling technique will be used to select managers in an IT firm.
20 managers are selected from IT firm based in Australia.
Questionnaire method will be used by the researcher and distribute to the manager of IT firm in Australia. Quantitative data will be presented by using tables and graphs and will be analyzed by using statistical methods like correlation and regression methods. The data will be analyzed by using SPSS software tool and then evaluated in the results section
The variables used in this research report are cyber security and business. In this particular research, proper emphasis has been given on understanding the concept and challenges of cyber security in business (Van den Berg et al., 2014).
The researcher faces several limitations while conducting the study that needs to be taken into consideration in the future scope of the researcher. The researcher had limited time to conduct the study that automatically limits them to conduct in-depth analysis on the research topic (Challenges in cyber security in business) (Shoemaker, Davidson & Conklin, 2017). The researcher even had limited financial resources that limit usage of expensive theories and tools.
Main activities |
1st week |
2nd week |
3rd week |
4th week |
5th week |
Selection of research topic: Challenges in Cyber Security for Business |
|||||
Constructing aims, objectives and questions |
|||||
Reviewing the literature |
|||||
Quantitative data collection methods |
|||||
Qualitative data collection methods |
|||||
Limitations of the study |
|||||
Submission of research proposal |
Conclusion
At the end of the research proposal, it is concluded that cyber security means a technology process as well as practices that are intended for maintaining computer program, data and network from unauthorized access and damages. Furthermore, the above analysis shows that cyber security integrates the controlling of physical access from hardware as well as protecting from hazardous. However, the study access network as well as injection of data and code. It is important to recognize the virtualization technologies used at Netbox Blue Company for protecting the data networking procedure. From the above analysis, it is clear to understand the maintaining the timing of consistency, quality of products and services as well as advanced technologies is specific challenges for business enterprise. Thus, business enterprise should use secure data as well as communication technology to start a business in and over lifetime.
Reference List
Brown, S., Gommers, J., & Serrano, O. (2015, October). From cyber security information sharing to threat management. In Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security (pp. 43-49). ACM.
Carr, M. (2016). Public–private partnerships in national cyber?security strategies. International Affairs, 92(1), 43-62.
Cavelty, M. D., & Mauer, V. (2016). Power and security in the information age: Investigating the role of the state in cyberspace. Routledge.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. computers & security, 56, 1-27.
Dua, S., & Du, X. (2016). Data mining and machine learning in cybersecurity. CRC press.
Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-497.
Gunes, V., Peter, S., Givargis, T., & Vahid, F. (2014). A survey on concepts, applications, and challenges in cyber-physical systems. TIIS, 8(12), 4242-4268.
Jajodia, S., Shakarian, P., Subrahmanian, V. S., Swarup, V., & Wang, C. (Eds.). (2015). Cyber Warfare: Building the Scientific Foundation (Vol. 56). Springer.
Lohrke, F. T., Frownfelter-Lohrke, C., & Ketchen, D. J. (2016). The role of information technology systems in the performance of mergers and acquisitions. Business Horizons, 59(1), 7-12.
McGettrick, A., Cassel, L. N., Dark, M., Hawthorne, E. K., & Impagliazzo, J. (2014, March). Toward curricular guidelines for cybersecurity. In Proceedings of the 45th ACM technical symposium on Computer science education (pp. 81-82). ACM.
Sajid, A., Abbas, H., & Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4, 1375-1384.
Scully, T. (2014). The cyber security threat stops in the boardroom. Journal of business continuity & emergency planning, 7(2), 138-148.
Shoemaker, D., Davidson, D., & Conklin, A. (2017). Toward a Discipline of Cyber Security: Some Parallels with the Development of Software Engineering Education. EDPACS, 56(5-6), 12-20.
Sukumara, T., Sudarsan, S. D., Starck, J., & Vittor, T. R. (2017). Cyber security–security strategy for distribution management system and security architecture considerations. CIRED-Open Access Proceedings Journal, 2017(1), 2653-2656.
Van den Berg, J., Van Zoggel, J., Snels, M., Van Leeuwen, M., Boeke, S., van de Koppen, L., … & De Bos, T. (2014). On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. In Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium (pp. 13-14).
Vande Putte, D., & Verhelst, M. (2014). Cyber crime: Can a standard risk analysis help in the challenges facing business continuity managers?. Journal of business continuity & emergency planning, 7(2), 126-137.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download