The report will discuss in detail about cyber security which becomes a platform for protecting all the important as well as valuable property and information of business in the present world of technology and which is being used as theft as well as misuse. The situation is becoming very critical and a big management issue (Van den Berg et al., 2014). The government of the many developed countries like US recognizes this issue as very serious for the security in national and economic perspective. This includes the perspectives of protecting the networks computers, programs and the data from the attack that has been configured mainly with the in computing contexts and the security standards which include the cybersecurity and the physical security forms as well.
Objective and scope of the project
The issue of cyber security is becoming constantly important challenge for business all across the world and with the high cost on data and many breaches related to it is creating a lot of challenges for many organizations which are not prepared (Nunes Tartari et al., 2016). The main objective of the report is to understand the seriousness as well as also the scope of the report is wide since the issue is worldwide and affects so many sections of society.
Literature review
There are many big companies these days that have constantly strengthened the issue of cyber based security and varied abilities specifically over last few years. There are presences of formal based processes that have been executed to recognize and also bring priority to security based risks in IT and also grow as well as mitigate strategies and so much money also goes into it and based on exciting different kind of strategies (Norris et al., 2015). At the same time, the recent study also shows that the concept of in-depth interviews as well as solving the issues with right kind of information associated with security leaders with twenty five international companies and the overall outcome is revealed which is growing worries.
Justification
Every kind of company is however, fighting its own battle as well as challenges associated with cyber security. With rise in use of technology in every aspect of company, the criminals have a wider range of organizational based issues to exploit. There are so many kinds of personal data which can be easily collected from huge range of sources and which also lead to recognize the concept of theft and other types of cyber crime (Kaplan et al., 2015). Any kind of piece of data collected from a legal business motive can be easily exploited for so many wrong gains. There are clients as well as customers that may not understand the overall details related to it however they trust the organizations for which they conduct business.
How do you address the results which are related to the vulnerability for the higher to the lower risk transformation?
Research design and methodology
In this case, so many quantitative sources will be included in the study to understand the issues. Consumers will also be contacted for collecting the qualitative data to understand people perspective. This further will be executed to make sure that the opinions of people in cyber crime were covered completely in all aspect (Kshetri, 2015). Moreover, there are many small companies as well which are getting impacted for the same issue who will be interviewed to understand the reaction and opinions related to serious problem.
The study will have a simple as well as random sampling method that will be utilized to conduct interview which is based on respondents as well as they also answer the research based questions as well as test the hypothesis. Also a pilot study will be carried just before conducting the main research to decide the impact of data collection and related tools just before the main survey (Donaldson et al., 2015).
The elements or variable in the present research can be based on many dependent as well as independent points. The dependent on one hand will be based on age, gender of the respondents. Independent variable will include the basic attitude of the business whether people can utilize the basic standard of such issues or level of impact of cyber crime on business and many more (Klavans, 2015).
After finalizing the sample for the study, different forms of informed permission will be provided to the participant through electronic medium or by physical delivery. The main motive of the study will also be explained to the participants. It is important to keep the information provided by them confidential and only based on the opinion of other clients to make a common conclusion (Šendelj et al., 2014).
The outcome achieved from the survey will be recorded at one place on an excel sheet. Then it will be edited properly and the data will then be properly exported into a version related to data analysis system. Data presented will also use the descriptive status like means as well as mode based percentage method. The overall summaries will be presented in visual manner (Šendelj et al., 2014).
Following are some of the outcomes:
There will be the usage of mixed techniques in this research which is related with number of threats to the validity as well as reliability of outcome achieved. In case of primary research, a test on the concept will be perfumed to understand whether the same outcome can be reproduced or not (Johnson, 2015).
Research limitations
Some of the limitations of the methodology used in this research will be long time restrictions and overall efforts are required for the same. In addition, the research all needs more resources to collect a lot of information to reply the research questions. There are many sources of data that can also be used to become more confident with the finding of the research and most importantly some data obtained might not be very collaborative by nature (Johnson, 2015). This is why; there can be a case of discrepancy in outcomes.
Reference
Choo, K.K.R., Abawajy, J. and Islam, R., 2016. Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
Donaldson, S.E., Siegel, S.G., Williams, C.K. and Aslam, A., 2015. Measuring a Cybersecurity Program. In Enterprise Cybersecurity (pp. 213-229). Apress.
Johnson, T.A. ed., 2015. Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare. CRC Press.
Kaplan, J.M., Bailey, T., O’Halloran, D., Marcus, A. and Rezek, C., 2015. Beyond Cybersecurity: Protecting Your Digital Business. John Wiley & Sons.
Klavans, J.L., 2015. Cybersecurity-What’s Language got to do with it?.
Kshetri, N., 2015. Recent US Cybersecurity Policy Initiatives: Challenges and Implications. Computer, 48(7), pp.64-69.
Norris, D., Joshi, A. and Finin, T., 2015, June. Cybersecurity challenges to american state and local governments. In 15th European Conference on eGovernment (pp. 196-202). Academic Conferences and Publishing Int. Ltd..
Nunes Tartari, E., Ricca, F. and Taylor, A., 2016. Challenges in Cybersecurity: a comparative analysis of disparate US and Russian positions in the international arena (Doctoral dissertation).
Šendelj, R., Lombardi, F., Ognjanovi?, I. and Guarino, S., 2014. Cyber Security in Montenegro: Practice, Framework and Challenges.
Thuraisingham, B., Kantarcioglu, M., Hamlen, K., Khan, L., Finin, T., Joshi, A., Oates, T. and Bertino, E., 2016, July. A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. In Information Reuse and Integration (IRI), 2016 IEEE 17th International Conference on (pp. 1-10). IEEE.
Van den Berg, J., van Zoggel, J., Snels, M., van Leeuwen, M., Boeke, S., van de Koppen, L., van der Lubbe, J., van den Berg, B. and de Bos, T., 2014. On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. In Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium (pp. 13-14).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download