Wednesday, December 11, 2019

Challenges in Cyber Security for Business †MyAssignmenthelp.com

Question: Discuss about the Challenges in Cyber Security for Business. Answer: Introduction My project report is based on the topic Challenges in Cyber Security for Business. I have noticed that the cyber security is a common problem that is present worldwide and with the rapid use of the technology this have become a rising problem. In order to cope up with the different problems of the cyber security, there are many challenges that has to be faced. I have seen that the data protection and the privacy are some of the common concerns of any organization as they are easily leaked and misused and can easily lead to several drastic consequences. However, I have noticed that nowadays the amount of money which is spend on the operations and the data security is primarily from the intruders. Most of the organizations now a days are seen to spent on their online and data maintenance platforms. I have understood that they need to take up steps so that they can easily save their own information and data of their customers. Some of the examples that can be cited is of the innocent cu stomers becoming a part of their fraudulent charges without having any clue or even knowledge of it. In this research proposal I have made a focus on the challenges and the incidents that the customers and the company might face in order to maintain their cyber security in the business area. I have also made sure to follow the different procedures that I have prepared in the report that includes the possible techniques that has to be conducted. Evaluation of effectiveness I have made the project scope in a wider aspect and this is solely because to address the cyber security in the business world that needs to be focused at an industrial level globally. These concepts will also be discussed by me along with addressing the challenges. I have widened the scope and made a horizon of their knowledge and that is how the business can be made more secure and safer. It can be said that the technology nowadays is an integral part of the business operations that can easily pose for the threats in the business operations. I have realized that there is a need to tackle the threats so that it becomes competent in the business environment. Objectives In this report, the key objectives that I have identified is that the cyber security challenges are prevalent in the business field and the method needs to be addressed is also mentioned. I have seen that all of these challenges are faced at a global level. I have not only limited the project to the different challenging discussions on the cyber security but also to the alternative discussions that is available in meeting the discussed challenges. My aim on this project is to find out the different solutions to the problems that can be faced by the organizations in this present situation of the business environment. Evaluation In this section, I have tried to provide a data information section on the topic Challenges in Cyber Security for Business. I have realized that the cyber security is one of the prime challenges in the business organization in the current competitive environment. This is primarily because the technology is growing at a rapid pace and almost all the organizations are trying their level best to manage with their technological devices like the laptops, computers, mobiles, internet and the rest that has led more challenges and attacks in the business. The wide range of the cyber attacks that has been faced and experienced in the last few years has been mentioned by me in this report and its possible cures using the improvisations of the security mechanism. In other words, it can be stated that the cyber security is a digital informational property that is used by the companies so that it can easily be protected. This has eventually become one of the serious management issues. There are certain challenges in the in the world of the cyber security that has made an increased growth in the data from the different business systems. As per Best, Endert and Kidwell (2014), it can be said that the technology has become an essence in the business. It brings development and growth into the system of the business just like two aspects in the business technology world, that has some of the side effects. I have found out some of the affects in the security and the privacy of the data. The cyber security hence is termed as an important factor that has the ability to face the challenges that may initially lack funding from the government. I have realized that cybercrime damages the whole data that is prevalent in the business. Hence if the employees become more trained it will be easier to manage the cyber security issues along with arousal of the ethical issue. I have evidenced it that the employees who used to be once the ethical hackers have now turned into unethical hackers after they leave their organization. In this 21st century, the cyber security is developing at a rapid pace. There are too many challenges as well that might be because of the productivity of the business that is quite degrading. In this research, I have invested a lot of time in understanding how to maintain the security of their information and business data. The factors that are the leading threats and challenges has also been explained. Some of the factors like the lack of the collaboration and leadership, knowledge and laws about the cybercrime are all set ups for an effective control in the business security process. Learning plan My primary research questions deal with: What are the major cyber security challenges in the business? My secondary question deals with: How the cyber security challenges can be mitigated? In this research methodology, I have used approaches and methods that is quite relevant to the given topic. I have used the mixed method that includes both the qualitative and the quantitative data in using and collecting it. This data has helped me in gathering the answers of the questions in this research process. The qualitative data is based on the gatherings of the opinions of the people and their secondary resources that is a quantitative data. I have collected the primary and the secondary data from the different sources. I have collected the primary data through a questionnaire survey of 10 people who works in an IT firm and were asked about the safety and the cyber security measures in their organization. In case of the secondary data, I have collected this from the journals, books and the web sources. I have gathered a sample from a size of 10 respondents. I have saved strong passwords so that none can modify and misuse the collected data and keep it as confidential. The only limitations that was faced by me while conducting this research is the shortage of the time provided. The time was so shortly provided that the data could not be analyzed and collected in a proper way. I have created a time schedule or an action plan so that the research can be easily completed within the time period provided. I have provided the Grantt chart that is based on the geographical representation of the action plan of the research so that it may be competed at a perfect time. Conclusion In todays world, the cyber security is an essential part of the business that is used to maintain the secrecy and the privacy of the data and I have realized that it is an integral part of the competition in the industry. The challenges that I have faced in securing the data is the shortage of time. The other different challenges that can be used to mitigate the process of security is through proper training of the employees. The main aim is to focus on the integration of the data and adoption of the measures that will help in the security challenges. References Best, D.M., Endert, A. and Kidwell, D., 2014, November. 7 key challenges for visualization in cyber network defense. InProceedings of the Eleventh Workshop on Visualization for Cyber Security(pp. 33-40). ACM. Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety, security and privacy.Journal of advanced research,5(4), pp.491-497. Gunes, V., Peter, S., Givargis, T. and Vahid, F., 2014. A survey on concepts, applications, and challenges in cyber-physical systems.TIIS,8(12), pp.4242-4268. He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y. and Gabrys, B., 2016, July. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing other computational intelligence. InEvolutionary Computation (CEC), 2016 IEEE Congress on(pp. 1015-1021). IEEE. Kumar, V.A., Pandey, K.K. and Punia, D.K., 2014. Cyber security threats in the power sector: Need for a domain specific regulatory framework in India.Energy Policy,65, pp.126-133. Reddy, G.N. and Reddy, G.J., 2014. A Study of Cyber Security Challenges and its emerging trends on latest technologies.arXiv preprint arXiv:1402.1842. Robert, M. and Directorate, I.C., 2015. ISR. Sadeghi, A.R., Wachsmann, C. and Waidner, M., 2015, June. Security and privacy challenges in industrial internet of things. InDesign Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE(pp. 1-6). IEEE. Scully, T., 2014. The cyber security threat stops in the boardroom.Journal of business continuity emergency planning,7(2), pp.138-148. Thuraisingham, B., Kantarcioglu, M., Hamlen, K., Khan, L., Finin, T., Joshi, A., Oates, T. and Bertino, E., 2016, July. A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. InInformation Reuse and Integration (IRI), 2016 IEEE 17th International Conference on(pp. 1-10). IEEE. Tisdale, S.M., 2015. CYBERSECURITY: CHALLENGES FROM A SYSTEMS, COMPLEXITY, KNOWLEDGE MANAGEMENT AND BUSINESS INTELLIGENCE PERSPECTIVE.Issues in Information Systems,16(3). Van den Berg, J., Van Zoggel, J., Snels, M., Van Leeuwen, M., Boeke, S., van de Koppen, L., Van der Lubbe, J., Van den Berg, B. and De Bos, T., 2014. On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. InProceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium(pp. 13-14).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.