Discuss about the risk and challenges of cybersecurity and importance of this security system in a virtual network of the organization.
Cybersecurity is the protection techniques of programming, networking and data security from unauthorized access to any attacks or threats. The major areas of cybersecurity are information security, disaster security, network security and application security. Input validation of parameters and application of development aspect of cyber systems is the basic need to introduce the security management. Auditing, logging, parameter manipulation and protect any kind of privacy statement is the basic need of security in networking. In case of risk management and organizational safe situation Anti-virus, Anti-Spyware, firewall, unauthorized access to networking systems, Virus private networks and Intrusion prevention system all these are important. In this proposal, a particular data collection method has been taken for the development of research. Questionnaires have been set by the researcher and the suitable action over the proposal influence better outcomes.
The main aim of this research is to analyze the all the cyber security aspects that is in the context.
The objectives of this research are
The growth of this project lies in growth of IOT in the organization. The proliferation of the tools which is harmful and how to eliminate those tools from the system and how to purify the data from any harmful process would give proper outcome, can be analyzed through this project. Securing the supply and logistics related transaction data as well as company information should be guide other Small or Medium sized enterprises should proceed and respond to cyber threat
Cyber security has become a dire need of organizations and thus it affects all people in the organizational level. NIST can be considered as a tool in a consolidating all the safety aspect of cyber threats (Jouini et al. 2014). The level of risk can be mapped through the charts in this this process. A more standardized process to sustain the risk in an organization is to be more transparent, sustainable in the risk management process. Most of the organizations are exposed to cyber threat and thus it affects all the functions of the system. As per the aim, cyber threat in supply chain management is more essential process in the system. The OTTPS(Open trusted technology provider standard) is one of the main criteria that focuses on risk(Clemente 2013). The cyber security initiatives must be collaborated with the cyber stakeholders to address this security issues. The NIST standards are essential to be considered in implementing a cyber-security concept. It also provides the trustworthy factors in an organization. The success factors in implementing the system is one of the most important factor. The governance, commitment and clear requirements for the security is needed. The performance matrix for internal transparency, compliance and individual (Jouini et al. 2014).
Internal governance responsibility and roles for hindering any kind of attacks can be suggested to the organizations which are most exposed to this cyber issues. There are different kinds of attack that can be highlighted in the cyber issues. The Brute force attacks that are sophisticated algorithms designed to search for vulnerability in systems and attack the protection mechanisms (Jouini et al. 2014). Another kind of attack consists of social engineering or typical cyber fraud. In this kind of attack, the data are the target, from which the money can be transferred and retrieved. DDoS is known as to overload a site with the connections and then target the systems. The system network is one of the network that access business operations (Hong et al. 2014). Phishing attacks is an initial stage of cyber-attack and much more difficult process. Malware, spywares and ransomwares are sophisticated techniques of system infiltration that attacks the information incorporated in the system. Government regulations in the cybercrime are not at all effective to eliminate the threat at the same time the protection plan should be implemented with evaluation and monitoring system. The CIIP handbook of building a proper infrastructure in the system for the company to secure this threat should be considered. As the statistics suggests 80% of the transactional data is saved system, which poses a threat to supply chain management for a company(Foreshew 2017). For example, China is known to be severely attacked by the cyber criminals whereas they also use the protection on a large scale (Donaldson et al. 2015). The cost effectiveness should also be considered in securing data in a corporation.
This method of business research proposal includes qualitative way of doing the research.The qualitative way of research is important and apt for this research because it deals with all the dimensions of the objectives of this research. This kind of research is also capable of producing a factors which are less numeric in character. It consolidates all the influences in diverse set of approach. After the research the reflection on the result is also essential which gives insights to the problem in a proper manner.
The maintenance of the reliability and validity of the research is also part of this research. The validity of the data is the main concern while collecting the data. To be able to present a reliable and viable data, the stability and internal consistency must be given emphasis (Johnson et al. 2012). The consistency is another part of the process. The relevant criteria should be followed. Measurement, casualty, replication and generalization should also be included in the parameter. There are basically two kinds of validity, concept and construct (Johnson et al. 2012). The imperceptivity of the conceptions that are applied in the initial stages should also be maintained in the research.
The research approach in a qualitative research proposals are depended on the process of data collection. The secondary and primary way of data collection process are two main process. In this research the primary way of data collection process will be followed (Johnson et al. 2012). In the meantime the authentic sources of getting background information will also be considered. Conduction of the research can be done in two ways; inductive and deductive. The induction way of research consists of the careful observation, data evaluation and analysis. On the other hand, the deductive way of research is quantitative in nature, where the data collected is processed and after reflecting it in the models they are analyzed. The theory selection and hypothesis testing is one of the major part of the inductive way of research.
The design highlights the two way of designing the research; which are explanatory and descriptive. The research requires finding the right approach to that should be aligned with the core objective of the process. The research also requires more exploration and in depth analysis of the data that will be gathered from the primary data collected from the specific company in the process. This research also requires more descriptive way of conducting the research. The research design(Lancaster 2012) also focuses on the collection process of the data based on the finding and analysis to get a correct conclusion. Based on the research design the focus will be given in collection and analysis. The research design requires a proper way of doing the findings and analysis.
As discussed before, in data collection process primary way of doing the research will be highlighted. According the topic the cyber security, technological companies would be the best option to research about in this context. Therefore, a company which is more technology oriented would be identified and in data would be collected from the company which are related to their cyber security measure. The foundation of the research and a company would also be selected in this process(Lancaster 2012). The smart grid procedure user would also be focus of the company. The routine theory of activity will be used in this process to ensure a secondary information source. Interview process is identified for data collection from the managers and the online survey is selected in the process to get a proper review in the process. The unstructured questionnaires for the managers and structured close ended questions for the employees.
In this method, the data collected from the company would be used to analyze through convenience sampling. The probability sampling method that will be selected is convenient sampling method(Lancaster 2012). The primary data will be collected from the 10 managers and 40 employees will be selected from the organization. The employees related to the information security departments will be selected. The survey would include structured questionnaires. The data will be considered with independent as well as the dependent variable for observations.
The budget is the main limitation in this project. The sourcing different authentic articles is expensive as well as sourcing information and data from the company’s data reserve. The time constraint can also be stated to limit the research budget. Some of the journals and online website may not be a one hundred percent reliable sources(Lancaster 2012). The resources to conduct an interview in gathering people may not be as fruitful as needed to be. These constraints must be kept in mind while researching more thoroughly to eliminate the negative effect of the constraints.
Source : created by author
Figure: project schedule chart
Conclusion
Therefore, from the above proposal, it can be concluded that the cyber security has become an issue of concern for the companies. This makes the data as well as the supply data of the companies more vulnerable to the cyber criminals. Different kinds of attacks as discussed can lead to loss in profitability of the company. The confidential data regarding transaction is exposed to certain unsafe hands. Therefore, the companies must accept the unsecure position of itself and proceed to make it safer. Therefore, the research concentrates on identifying different problems related cyber security and a company will be selected, where research will be conducted and schedule of the research is also outlined in this process.
References
Babate, A I, Musa, M A, Kida, A M &Saidu, M K 2015, ‘State of Cyber Security: Emerging Threats Landscape’, International Journal of Advanced Research in Computer Science & Technology, Vol. 3, Issue 1.
Chertoff, M. 2008, “The cybersecurity challenge”, Regulation & Governance, vol. 2, no. 4, pp. 480-484.
Clemente, D., 2013, Cyber security and global interdependence: what is critical?. Chatham House, Royal Institute of International Affairs.
Donaldson, S.E., Siegel, S.G., Williams, C.K., Aslam, A., SpringerLink (Online service) & Books24x7, I. 2015, Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats, 1st edn, Apress, Berkeley, CA.
Foreshew, J 2017, ‘Australia faces cyber security skills crisis as challenge’, Financial Review.
Gharibi, W &Shaabi, M 2012, ‘Cyber Threats In Social Networking Websites’, International Journal of Distributed and Parallel Systems (IJDPS), Vol.3, No.1.
Gharibi, W and Shaabi, M 2012, ‘Cyber threats in social networking websites’, arXiv preprint arXiv:1202.2420.
Grocke, D. 2017, “Emerging cybersecurity threats in large and small firms”, Bulletin (Law Society of South Australia), vol. 39, no. 3, pp. 20-22.
Hall, P. 2016, “Smaller banks face cybersecurity challenges”, Westchester County Business Journal, vol. 52, no. 46, pp. 15.
Hong, J., Liu, C.C. and Govindarasu, M., 2014. Integrated anomaly detection for cyber security of the substations. IEEE Transactions on Smart Grid, 5(4), pp.1643-1653.
James, C 2016, ‘Cybersecurity: Threats Challenges Opportunities’, ACS.
Johnson, R. B., Onwuegbuzie, A. J. and Turner, L. A. (2012) Toward a definition of mixed methods research, Journal of Mixed Methods Research, 1(2), pp. 112-33
Jouini, M., Rabai, L.B.A. and Aissa, A.B., 2014. Classification of security threats in information systems. Procedia Computer Science, 32, pp.489-496
Lancaster, G. (2012) Research Methods in Management, 4th ed. Oxford: Elsevier
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download