Questions:
What Is The Effect Of Cyber Security Challenges On Business?
What Are The Sources Of Cyber Security Threats?
What Requirements And Elements Should Be Observed By The Business And Government To Prevent From The Cyber Crime?
Cyber security is essential for business because the range of crime has been increased. It becomes as known issue in now a days in the business. Technology has become advanced and the issue of cyber security is faced by almost every country. It is the research proposal which will focus on research design and methodology. Literature review in this research proposal will describe the scope of cyber security along with the challenged of cyber security in the business. The risk of cyber security attack depends on three factors such as threats, vulnerabilities and impacts. Good cyber security is essential for the management because it able to prevent undesired surveillance of and collecting of intelligence from an information system.
The aim of this research is to recognize the challenges of cyber security in the business. There are many companies that faced issue regarding cyber security. The main objective of this research to find out the issues related to cyber security
Cyber security is wider and it is required for the business to safe and protects the relevant information regarding employees and clients. Thus, the scope of this project is huge; the topic of this research proposal is one of the challenging issues in today’s world. Literature review will reflect the various aspects of cyber security which is necessary for protecting the data. Primary and secondary issues will be used to accomplish the research.
Social networking platforms have changed the way of people and it become easy for the people to interact each other in an efficient manner. It is not made for initiating the connections, but has handled to sustain the progressing interconnected by engaging people in various interest of their choice. Facebook has mort ha 1 billion users and more than 1 billion tweet made every week. It has been evaluated that The Arab Spring, Occupy Wall Street and Jasmine Revolution have epitomized that the growing community of thousands of people can mobilized for a reason by social media. On the contrary, London riots were supposedly fuelled due to social media (Wells, Camelio, Williams and White, 2014).
Cyber security is a complex issue and cyber attackers can derange infrastructures such as control over the financial and air traffic and create influence with matching the terrorist attack in the physical space. Cyber attackers are able to steal the information of corporate such as personal information of the employee and the clients of the company, intellectual property and financial activity records (Taylor, Fritsch and Liederbach, 2014). Cyber attacks have become more economical. Cyber security challenges has become more complex issue that cuts across various domains and demands for multi layer initiatives. It has been evaluated that damage by cyber attackers to the corporate world cannot be recognized instantly and even in some case, may even move unobserved. In case cyber attack is progressively defended, it would be able to cover the tracks and ascription of a cyber attack would become very difficult to recognize in some scenarios. It has been analyzed by researching on topic that there are no international and government laws to get help in tracing cyber attacks. It makes more difficulty for the business to fight against the cyber warfare (Reddy and Reddy, 2014). It is the responsibility of the business to make policies and procedures and establish the IT team so that possible prevention can be done in the business regarding cyber crime.
It has been found that cyber crime is most challenging issue in preset world and it is proved by research which has been conducted on 25 global companies. It was the research that found that the digital data has become mpre wider. Technology has become advanced in the world but the innovation in technology brings so many threats for the business. There are various cyber security risks such as Ransomware, the internet of things (IOT), Malware, social engineering and fake advertisements and feedbacks. Ransomware is considered as the latest risk which is able to access the financial information of the user and make the payment to the cyber criminals. The IOT is able to access the sensitive information of the user in their system. Social engineering includes maneuvering the person to disclose their relevant data along with information by using the technique of phishing (Wang and Lu, 2013). By publishing the fake advertisement the internet, enhance the cyber crime in the business.
Cyber attack has faced by many companies in all over the world, however, the possible step against the protection of these cyber attacks, government has taken various step to meet the issue of cyber crime. It involves the evaluating the system and security of network. Different countries have been taken initiated step to prevent the cyber security challenges in the organization such as China and US have made a cyber security laws (Von and Van, 2013). It has been researched that Australia is facing the issue of cyber security as it has not efficient knowledgeable staff of cyber security. That is why the demand of cyber security in the Australia is at peak.
It is essential for the protection from cyber attack to establish National Structure for Cyber Security. It would have been involved various roles and responsibilities for stakeholders and focus on creating public private partnership model (Klahr, Shah, Sheriffs, Rossington, Pestell, Button and Wang, 2017). It should be able to enhance the trust between the companies and government. To prepare procedure of cyber security management has been established and the head of cyber security should be appointed with various responsibilities. Along with that Cyber Command is required for preventing forces to protect the Indian Cyberspace. The Cyber Command should be authorized with defensive and offensive cyber weapons (Elmaghraby and Losavio, 2014).
A research methodology contains numerous methods and techniques to research and accumulate certain requirements and information from resources and journals. There are several methods being considered to research on the topic.
There is various methods has been taken to execute the research but the main focus has been kept on quantitative and qualitative research. Quantitative research is able to give quantitative data and able to gather the information and data regarding cyber security challenges. Qualitative data has been taken to collect the quality data from secondary sources for the selected topic.
There are two approaches have been considered that is quantitative and qualitative approaches. Qualitative approaches are being used in then research to evaluate the reasons, views and opinion related to selected topic. Primary and secondary sources helped to analyze the data effectively by analyzing the collected data from articles, journals, websites and research task (Abawajy, 2014).
Enthusiasm has been reflected while researching on the selected topic so that research program could be initiated in efficient manner. The aim behind conducting the research is to make aware business about the challenges of cyber crime. Primary and secondary information has been utilized to collect the information. The information from primary sources have been collected from direct respondents while secondary information has been collected from the used data such as journal, articles, websites and research sources (Reddy and Reddy, 2014).
Random sampling technique has been chosen due to huge amount of gathered data and information regarding selected topic. It is effective technique which provides opportunity to information to select.
It is important to accomplish the research within timeframe so that the possible results of research can be come in efficient manner. An action plan has been made to analyze the various activities of research with timing.
It is important to focus on target market and to gather the relevant information; primary and secondary sources are being opted to set the target market. Primary resources such as questionnaire and interview criteria has been used to gather the data while articles, journals and other used data has been utilized in the context of secondary resources.
The procedure of selection has been accomplished after analyzing the requirement of the research. Ethics consideration defines that what is correct and incorrect while researching. Data has been collected with fair manner
There are several issues has been found while executing the research which influence the research in the form of limitations. These limitations are mentioned below:
Serial no. |
Activities |
Initiating date |
Duration |
Completed date |
Description |
1 |
Selection of topic |
10 September, 2017 |
2 |
11 September, 2017 |
Selection regarding topic has been made. |
2 |
creation of plan |
12 September, 2017 |
3 |
14 September, 2017 |
Plans will be prepared |
3 |
Implementation of the plan |
15 September, 2017 |
5 |
19 September, 2017 |
Data will be selected for the research topic |
4 |
Data collection |
20 September, 2017 |
5 |
24 September, 2017 |
Selected data will be opted for the execution of the research |
5 |
Analyze the data |
25 September, 2017 |
6 |
30 September, 2017 |
Technique will be used to analyze the data |
6 |
Conclusion and recommendations |
1 October, 2017 |
4 |
4 October, 2017 |
Data and information will be concluded by evaluating the data. |
Conclusion
It has been concluded that various organization in all over the world are facing issues of cyber security challenges and the range of cyber attacks has been increased in the form of various attacking approaches such as malware, Ransomware, social engineering, hacking the data sand many more. This research has been made for making aware about the challenges of cyber security and raises the voice against the prevention. The focus of the research is on a collection of quality data for growing the constancy and authenticity of the research program.
References
Abawajy, J., 2014, User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), pp.237-248.
Elmaghraby, A.S. and Losavio, M.M., 2014, Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), pp.491-497.
Hahn, A., Ashok, A., Sridhar, S. and Govindarasu, M., 2013, Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid, 4(2), pp.847-855.
Klahr, R., Shah, J., Sheriffs, P., Rossington, T., Pestell, G., Button, M. and Wang, V., 2017, Cyber security breaches survey 2017: main report.
Reddy, G.N. and Reddy, G.J., 2014, A Study of Cyber Security Challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842.
Streeter, D.C., 2013, The effect of human error on modern security breaches. Strategic Informer: Student Publication of the Strategic Intelligence Society, 1(3), p.2.
Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014, Digital crime and digital terrorism. Prentice Hall Press.
Van den Berg, J., Van Zoggel, J., Snels, M., Van Leeuwen, M., Boeke, S., van de Koppen, L., Van der Lubbe, J., Van den Berg, B. and De Bos, T., 2014, On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. In Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium (pp. 13-14).
Von Solms, R. and Van Niekerk, J., 2013, From information security to cyber security. computers & security, 38, pp.97-102.
Wang, W. and Lu, Z., 2013, Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), pp.1344-1371.
Wells, L.J., Camelio, J.A., Williams, C.B. and White, J., 2014, Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), pp.74-77.
Zahavi, G. 2015, Cyber threat insider, retrived on 22nd September, 2017, from: https://blog.sensecy.com/2015/12/29/top-data-breaches-of-2015/.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download