In today’s world, business operations are set towards achieving business goals through use of Information technology implementation. The main focus being able to collect and store important data that can be used for decision making. It is a reality that, any business growth should originate from business operational data because it is the only source of data that can explain either failure or success of the business (Chen, Chiang & Storey 2012, p. 1168). Once an organization actualizes technological implementation, it is faced with real business operational cyber security issues. Cyber security is the main issue that almost all businesses are faced with immediately after successful implementation of IT infrastructure. To keep their data secure and free from intrusion, organizations try to put in place security measures. Some of the measures involves acquisition of up to date devices that offer all recent features to protect organizational data (Stergiou et al 2018, p. 969). On the same note, they are going an extra mile to hire very specialized experts to help them with sufficient technical skills required in data protection. As organizations try to protect their data, they are finding it difficult due to technological advancements and sophisticated tools available to use by even novice computer users.
The main goal of the project would be to evaluate cyber security challenges that are faced by organizations in their daily operations. To come up with desirable results, the following will be accessed;
In this research, possible cyber security challenges that organizations face would be given the highest priority. Once all challenges are evaluated, an intensive and extensive analysis on the value of data to business operations would be done. Further, vulnerabilities in any newly established IT infrastructure would be discussed with aim of giving possible solutions to the problem. Moreover, several cyber security threats would be discussed as well as professional advice on the need to secure operational data and methodologies to be used.
Internet innovation has turned business operations to be online oriented (Saini et al 2018, p. 141). Technological advancement has given business a success path and all firms have realized the power of internet. By emulating other firms that made first successful implementation of IT infrastructure, almost all businesses are using information systems. With almost all business turning to use of technology and internet enabled solutions to support their daily operations, cyber security threats are giving sleepless nights to business owners and government (Khan & Estay 2015, p. 4). Cyber threats has taken the higher stake in any technology enabled business due to its ability to destabilize organizational operations when business operational secrets are unearthed by competitors. Important to note is that, technology has resulted to development of very simple but sophisticated tools that make even novice computer users threat to any business information system. Data storage has turned to be very volatile in such a way that an organization can be brought down by a simple penetration done by any unauthorized persons. According to Chang, Zhong & Grabosky (2018, p. 111-112), hackers have proved to be very good in identifying business vulnerabilities in organizational network and turning them into business competitive advantage. These hackers may not directly benefit from the extracted data but can be used by a third party to evaluate target business operational procedures. Once all data has been extracted and presented to the competitor, it becomes very easy for the competitor to advance on business strategies that are meant to outdo the target firm (Carruthers 2014, p. 10). Therefore, it has come into light of all business owners and IT experts that cyber security is real and cannot be bypassed in any organizational decision making.
There are important aspects that have contributed to higher number of cyber security threats despite strict measures put in place to safeguard organizational data (Farwell 2012, p. 23). First, online platforms such as organizational website are the norm of today’s business and this has made business operational data to be at higher risks. With these platforms being used to link to many of the organizational information systems, they make target systems vulnerable to attacks. Signals from these platforms are being used to analyze the type of communication established, the nature of data and security parameters in place (Macher et al 2018, p. 383). Once analysis has been done, it makes it possible to bypass all security measures and gain access to organizational data. Next, organizations should be weary of IT infrastructure set ups because poor configuration of security devices such as firewall and routers are leaving valuable data prone to attackers. Abomhara (2015, p. 67-68) argues that, to make sure all setting are correctly done, IT experts should come up with testing mechanisms with aim of establishing any vulnerability. In such cases, organization may decide to provide IT experts or any other specialized and authorized employee with hacking tools (Czosseck, Ottis & Taliharm 2011, p.28). In recent days, organizations have found this strategy as the best mechanism to secure their business from cyber-attacks. This mechanism provides organization with an opportunity to analyze possible ways through which unauthorized persons can gain access to the organization information system. In this regard, upon identification of security loopholes, remedies can be done to protect data loss instead of waiting for hackers to gain access to the system.
Upon analysis of factors contributing to increase in cyber-attacks, it is important to evaluate some of the cyber-attacks that are prone to business operations. First, there is Denial of service (DoS) which is a form of attacker that prevents organizational employees from accessing the target system (Baskerville, Rowe & Wolff 2018, p. 39). DoS can be done through a malware attacks such as Ramsonware which attacked business information systems by locking devices until a specific code can be sent to unlock affected device. Similarly, DoS can be done through hacking where attackers gains access to the system and changes all access credentials with aim of restricting accredited users from making any required access to the subject system. To seal the loopholes, data encryption while on transit and on storage has been given the highest priority. It protects data from any form of use despite attacker having gained access to the system (Dawson 2018, p. 174). To make sure no unauthorized access to the system can be made, strong authorization procedures and credentials such as biometric scanning has been implemented.
To what extend is cyber security affecting business performance?
Secondary questions
Formulation of research design and study methodology to be used can follow either qualitative or quantitative approach. In this case, the qualitative methodology would be analyzed by giving main steps to be followed during research.
The following are the main steps that the study would follow during data collection and analysis;
In the research, it would be important to choose the best tool that are appropriate in the design study, data to be used as well as processes to be followed during research. Additionally, reliability of the methodology would be very high due to the nature of the study to be conducted. The study involves an analysis of few scenarios from small number of responded. The sample to be used in the study would be chosen from number of individuals and organizations who have suffered from cyber security. The sample size would be obviously small due to the complexity of study. The number of people aware of cyber security is quite small and this makes qualitative the best methodology to use in the study (Roman, Lopez & Mambo 2018, p.680). The data collection methods to be used in the study are; questionnaire, interviews, observations and focus groups. The variable specification which would be subject to the study are; the effects of cyber security and business performance.
It is very clear that, research is usually coupled with many shortcomings that are beyond control of the researcher. In some circumstances, it is possible to have these limitations influence the outcome of the study either positively or negatively. First, the research will most likely be faced by lack of experienced responded (Shoemaker & Kohnke 2016, p. 14). The study is quite specific in that, responded need to have been affected by cyber security. The impact might be either personally or organization wise. Next, the research would have time constraints due to the nature of responded required to facilitate the study (Bures 2018, p. 29). Getting resourceful responded would be very challenge due to their strict time schedule. Finally, the research would be faced by resources to conduct the study. Every study is always limited to resources because facilitators work on very tight budget that makes study difficult to complete.
Time (weeks) Tasks /Activities |
1 |
2 |
3 |
4 |
5 |
6 |
7 |
8 |
Proposal |
||||||||
Literature review |
||||||||
Project design |
||||||||
Results and findings |
||||||||
Discussion and findings |
||||||||
Presentation |
Conclusion
Cyber security has proved to be a real threat to business performance in today’s business world. With technological advancements and adoption of technology in business sector, cyber security threats have manifested heavily on business operations. To solve the issues of cyber security, organizations have tried to employ various mechanisms to protect their operational data. In their daily operations, organizations are faced with threats such as DoS, malware, data leakage and hacking. Upon identification of such threats, organizations are using available technology to protect their data from intrusion while on transit or storage. The objective of the study would be to evaluate possible challenges that are faced by organizations when they implement IT infrastructure in their business operations. To collect and analyze data on cyber security threats, qualitative study has been adopted as the best methodology. Therefore, as technology advances, cyber security remains to be a threat in business performance.
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Baskerville, R., Rowe, F. and Wolff, F.C., 2018. Integration of information systems and cybersecurity countermeasures: An exposure to risk perspective. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 49(1), pp.33-52.
Bures, O., 2018. Contributions of private businesses to the provision of security in the EU: beyond public-private partnerships. In Security Privatization (pp. 23-49). Springer, Cham.
Carruthers, K., 2014. Internet of things and beyond: Cyber-physical systems. IEEE Internet of Things Newsletter, 10.
Chang, L.Y., Zhong, L.Y. and Grabosky, P.N., 2018. Citizen Co?production of cyber security: Self?help, vigilantes, and cybercrime. Regulation & Governance, 12(1), pp.101-114.
Chen, H., Chiang, R.H. and Storey, V.C., 2012. Business intelligence and analytics: from big data to big impact. MIS quarterly, pp.1165-1188.
Czosseck, C., Ottis, R. and Talihärm, A.M., 2011. Estonia after the 2007 cyber-attacks: Legal, strategic and organisational changes in cyber security. International Journal of Cyber Warfare and Terrorism (IJCWT), 1(1), pp.24-34.
Dawson, M., 2018. A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 173-180). IGI Global.
Farwell, J.P., 2012. Industry’s vital role in national cyber security. Strategic Studies Quarterly, 6(4), pp.10-41.
Khan, O. and Estay, D.A.S., 2015. Supply chain cyber-resilience: Creating an agenda for future research. Technology Innovation Management Review, 5(4).
Macher, G., Armengaud, E., Kreiner, C., Brenner, E., Schmittner, C., Ma, Z., Martin, H. and Krammer, M., 2018. Integration of security in the development lifecycle of dependable automotive CPS. In Solutions for Cyber-Physical Systems Ubiquity (pp. 383-423). IGI Global.
Roman, R., Lopez, J. and Mambo, M., 2018. Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges. Future Generation Computer Systems, 78, pp.680-698.
Saini, S., Beniwal, R.K., Kumar, R., Paul, R. and Saini, S., 2018. Modelling for improved cyber security in Smart distribution system. International Journal on Future Revolution in Computer Science & Communication Engineering, Accepted. pp. 98-159.
Shoemaker, D. and Kohnke, A., 2016. Cyber education and the emerging profession of cybersecurity. EDPACS, 54(5), pp.12-16.
Stergiou, C., Psannis, K.E., Kim, B.G. and Gupta, B., 2018. Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, pp.964-975.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download