123essaywriting

Challenges In Cyber Security In Business

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

Challenges In Cyber Security In Business

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

Challenges In Cyber Security In Business

0 Download7 Pages / 1,560 Words

Question:
Discuss about the Challenges in Cyber Security in Business.
 
 
Answer:

Project Objective
The main objective of the project is- “To assess the challenges faced by the business organizations regarding cyber security”. There are number of challenges faced by the business organizations which not only disrupts the business activities but also cause harm to overall business ( Gabel, et al., 2015)
Project Scope This project has wider scope for the business organizations. As the outcomes of the research will provide benefits to the business organizations. In the research the issues found ion the cyber security will be explored and the impact of the challenges on the business activities will also be identified. These exploration would be used by the business organizations to develop a plan for the privacy or security against cybercrimes or threats (Akhgar & Brewster, 2016). As maintenance of security against the cyber threats is requisite for the business organization as these issues or challenges can have negative impact on the operations of business organization such as- disclosure of important data or information. Therefore this research project will be helpful for the business organizations.
Literature Review
The term cyber security can be defined as an act to protect the systems and content of information and communication technology. Challenges in the cyber security in the business organizations are the cyber-attacks. Cyber-attacks arises risks for the business organizations. Main aspects of the cyber – security risks are- threats, impacts and vulnerabilities. According to ( Jahankhani, et al., 2015), risk management in context to information systems is determined as essential aspect for effective cyber-security. According to ( Li & Clark, 2015), cyber risk raises fears of security failures and hack attacks which can endanger the global economy. In year 2015, a report in context to global risk was published by the WEF i.e. World Economic Forum, that stated, 90% of companies globally recognize they are not sufficiently prepared to defend themselves against the cyber – attacks. Due to cyber-attack companies are losing their customer data as well as information related to credit cards. According to ( Gabel, et al., 2015), in many business organizations, cyber criminals has stolen money from accounts and also hacked the system of company and to unlock the system again they had demanded ransom money.
Importance of cyber security for business organization is broad, as the cyber – attacks can cause threat for the business. Because of the cyber – attack, business organizations can lost their information which is valuable for the company. As information plays an important role in the businesses, because to carry out business operations, information is required ( Gabel, et al., 2015). In context to businesses, information about the financial transactions or statements, employee’s information, stakeholder’s information is required by the businesses to perform various activities. If this information is lost due to cyber-attack or the sensitive information is used by some other unauthentic user then image of the company can be lost.
Business organizations requisites to set an information risk management system to deal with the cyber risks which arise due to cyber-attacks. The management system shall assess the security risk and then develop a policy or plan to deal with those identified risks. Information and communication technology should be protected by the business organizations via adopting measures for standard security and managing configurations and use of system ( Gabel, et al., 2015). Unrequired functions should be disabled by the business organizations and updating of the security patches shall also be done within regular period of time. Business organizations can follow these measures to handle the cyber risk:

Business organization shall consider malware protection, as the policies should be formulated which cover web browsing, email and personal devices usage. Besides this, antivirus software shall also be installed and scanning for malware shall be regularly done.
The business organizations shall follow accepted principles for network design and also ensure the configuration of devices as per the security standards.
User activities should be tracked or monitored by the management of businesses as well as authorization to access the private data shall not be given to low level employees.

Types of cyber-attacks which can cause harm to the business are discussed below:

S. No.

Type of cyber attack

Cause harm to business organization

1.

Hacking

Hacking can be defined as illegal intrusion into a network or computer system ( Baylon, 2014). Hackers, by hacking the computers of business organization, can access to the sensitive information and use this information for their own purpose.

2.

Dissemination of Malware (Malicious software such as- virus. Trojan`s. spyware, hoax etc.)

Some software are designed in such way that can harm the business organizations, as the virus attacks can corrupt or delete the files and data in the computer system.

3.

Phishing

Phishers can cause harm to the business organization, as they can send mail to the employees which looks authentic but in real, but when the employee access to the link given in the mail can cause harm to the business as phishers can collect the private information like account number and passwords ( Jahankhani, et al., 2015).

4.

Network interference

One of the challenge which can be faced by the business organizations in context to cyber security is disruption of network. This can cause harm for the business organization as transmission of data can be delayed.

Research Questions
The main questions associated with the research is: What are the challenges faced by the business organizations in cyber security?
Some other questions which are linked with the primary question of the research are:

What shall be protected by the business organizations?
Why are intrusions so often effective

 
Research Design and Methodology
This research is both qualitative and quantitative in nature. As the data in qualitative and quantitative form will be collected for the research.
Qualitative research
Data collection- Qualitative data will be collected through the interviews. The interview will be done in such way so that information in descriptive form can be gathered. As the qualitative research lays more emphasis on decsrpitive data (Flick, 2014).
Sampling technique- random sampling technique will be done to select the samples from whom the data will be gathered. Management of the IT company will be chosen for research`s purpose.
Sample Size: Sample size for the research will be 30 employees of IT Company.
Analysis of data- The descriptive data will be analyzed through an IT expert. Quantitative research Data collection- Quantitative data will be collected through the questionnaire. A questionnaire will be formulated in such way so that quantitative information or data can be gathered for the research. Questionnaire will provide data in form of numbers and figures ( Vogt, 2011).
Sampling technique- In order to select the samples, random sampling technique will be done from whom the data will be gathered. Samples for the research will be employee of the IT Company.
Sample Size: Sample size for the research will be 50 employees of IT Company.
Analysis of data: Quantitative data will be analyzed through the statistical techniques.
Research Limitations
This research will only be limited to the assessment of issues or challenges faced by the business organizations regarding cyber security. Emphasis will be laid on the security management of computers which are used in the business organizations. The project will only assess the challenges of cyber security faced by the business organization, mechanism to handle the challenges will not be offered through the project (Dwyer & Bernauer, 2013). This research will particularly deal with components for intrusion detection of cyber security. In addition to this, the project will only notify the security challenges due to cyber-attacks or threats to the business organizations, further security plan could be developed by the management off the business organizations.
Time Schedule (Research plan)
The research activities are scheduled in following order:

S. No.

Activity

Start Date

End Date

Total duration

1

Project Objective

2 May, 2017

4 May, 2017

3 Days

2

Project Scope

5 May, 2017

8 May, 2017

4 Days

3

Literature Review

9 May, 2017

18 May, 2017

10 Days

4

Research Question

19 May, 2017

20 May, 2017

2 Days

5

Research Design

21 May, 2017

26 May, 2017

6 Days

6

Research Limitation

27 May, 2017

30 May, 2017

4 Days

7

Total days for completion of activities

29 Days

Conclusion
Consideration of the challenges or the threats in the cyber security is crucial for the business organization in order to run their business or to carry out their activities of business sin smooth way. Challenges in the cyber security can harm the business and therefore it is requisite to develop plan for the managing the issues and challenges. It is being concluded that research is necessary to be performed in order to evaluate or assess those issue or challenges related with cyber security, so that management of business organization could take step against the problem caused due to cyber-attacks.
 
References
Baylon, C., 2014. Challenges at the Intersection of Cyber Security and Space Security. s.l.:Springer.
Gabel, D., Liard, B. & Orzechowski, D., 2015. Cyber risk: Why cyber security is important. [Online] Available at: https://www.whitecase.com/publications/insight/cyber-risk-why-cyber-security-important
Jahankhani, H., Carlile, A. & Akhgar, ,. ‎., 2015. Global Security, Safety and Sustainability. s.l.:Springer.
Li, Q. & Clark, G., 2015. Security Intelligence. s.l.: John Wiley & Sons. .
Vogt, W. P., 2011. SAGE Quantitative Research Methods. s.l.:SAGE.
Akhgar, B. & Brewster, ‎., 2016. Combatting Cybercrime and Cyberterrorism. s.l.:Springer.
Dwyer, L. M. O. & Bernauer, J. A., 2013. Quantitative Research for the Qualitative Researcher. s.l.: SAGE Publications. .
Flick, U., 2014. An Introduction to Qualitative Research. s.l.:SAGE.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 7 pages

PAY 4 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2018). Challenges In Cyber Security In Business. Retrieved from https://myassignmenthelp.com/free-samples/challenges-in-cyber-security-in-business.

“Challenges In Cyber Security In Business.” My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/challenges-in-cyber-security-in-business.

My Assignment Help (2018) Challenges In Cyber Security In Business [Online]. Available from: https://myassignmenthelp.com/free-samples/challenges-in-cyber-security-in-business[Accessed 19 December 2021].

My Assignment Help. ‘Challenges In Cyber Security In Business’ (My Assignment Help, 2018) accessed 19 December 2021.

My Assignment Help. Challenges In Cyber Security In Business [Internet]. My Assignment Help. 2018 [cited 19 December 2021]. Available from: https://myassignmenthelp.com/free-samples/challenges-in-cyber-security-in-business.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

MyAssignmenthelp.com is the perfect solution to render quality solution for all sort of academic issues. We have hired professionals from different fields of study to provide assistance with different subjects. We successfully have provided different types of assignment solutions on 100+ subjects. We have hired industry experts to deliver nursing assignment, hr assignment and finance assignment help. To offer quality content with IT assignments, we have hired IT professionals to render programming language assignment help and IT assignment help for other types of IT assignments as well.

Latest Project Management Samples

div#loaddata .card img {max-width: 100%;
}

SBM 1201 Project Scope, Time And Cost Management
Download :
0 | Pages :
12

Course Code: SBM1201
University: Asia Pacific International College

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
This project plan deals with the development of a fuel-efficient HHO Generator. The HHO fuel cells may appear to provide high fuel efficiency to the users. Nevertheless, there are a few confinements and focuses to be seen, as given beneath. This is to clear up that there is NO 100% substitution of petroleum derivative by including HHO cell. HHO gas is otherwise called Brown Gas, yet this is to illuminate that HHO gas is n…
Read
More
Tags:
Australia Footscray Management organisational behviour University of New South Wales Masters in Business Administration 

HS2061 Information Systems Project Management
Download :
0 | Pages :
9

Course Code: HS2061
University: Holmes Institute

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Case Overview:
The project owner of the Signed, sealed, delivered courier service is facing the problems of managing order of couriers in the synchronised manner. The project manager is incapable of managing central warehouse for the dispatching of products. The important information can be lost with the passage of time. The inventory management of the warehouse is the major concern for the owner of the company. He is looking forward …
Read
More

OPS 935 Project Management
Download :
0 | Pages :
11

Course Code: OPS935
University: University Of Wollongong

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
This essay explores the impacts of digital technologies on project management. It explores how adoption of digital technologies by companies for managing their project have affected their, project managers, human resource, business processes, timelines, deliverables, and practices  of risk management, people management and quality management.
Impact of Digital technologies on Project Management Practices
Digital te…
Read
More
Tags:
Australia Saint Kilda Management International Management University of New South Wales Masters in Business Administration 

ITC505 ICT Project Management
Download :
0 | Pages :
10

Course Code: ITC505
University: Charles Sturt University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers
Case Study- Social Media Research Center
Task-1: Project Charter
Project Objectives
The main objective of the project is to develop a web-based system within the organization “Social Media research Center”. It is analyzed that the Social Media research center wants to develop the web based system in order to connect people with the organization for promoting its research center. The web-based system that is developed conta…
Read
More
Tags:
Australia Alfredton Management IT Network Security  University of New South Wales Masters in Business Administration 

ITC505 ICT Project Management
Download :
0 | Pages :
7

Course Code: ITC505
University: Charles Sturt University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers
Part One- Project Name / Team / Description
Project Name:
RALS Solution
Team Name:
Consultants for RALS
Project Description:
RALS organizes show for the farmers and other related small business persons to display their latest technology equipment for betterment in the field of agriculture and crop production. The show has different types of stalls and other facilities for which many volunteers …
Read
More

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »