Project Objective
Crowd-strike is strongly advocating the “Active defence” mechanism in corporate world when it comes to discussion on cyber security. Antivirus software, firewalls and data protection software are repeatedly proving inefficient when it comes to protecting companies. Crooks, psychological oppressors, remote governments thus called hacktivists and are ending up plainly progressively advanced at breaking security dividers to concentrate information, spy and upset, prompting developing endeavors from organizations and governments to ensure data. The worldwide digital security industry is currently worth $71 billion a year.
Victoria is increase endeavours to end up noticeably a digital security hub as a major aspect of a worldwide push to avert psychological militants, composed culprits, spies and programmers from penetrating the PC frameworks of organizations and governments.
Cyber vigilantism is an area of major interest for financers these days due to increasing rate of crime in cyber world. For instance, Endgame is an organization which has developed one of its kind technology for corporates where in a system known as ‘Bonesaw’ detects software being used by devices linked to internet. This way corporates can rule out their vulnerabilities. Endgame recently got its second round of funding and raised $23m (Business and cyber-crime, The Economist, 2013).
A cyber attackcan change configuration documents or process parameters (e.g. apparatus ways) to bring a section out of particular. Moreover, this assault could likewise change the quality control (QC) framework to maintain a strategic distance from legitimate quality appraisal. Such assaults can disturb the item/framework configuration handle and additionally antagonistically influence an item’s plan purpose, execution, or quality. The consequences of which could postpone an item’s dispatch, destroy gear, increment guarantee costs, or lessen client trust. All the more essentially, these assaults represent a hazard to human security for administrators and customers.
As per data, its particularly the small businesses’ who become the targets of hackers. Since 2012, the attacked have been on rise and doubled in the first two quarters of 2012. These small businesses’ have less than 1000 employees. A cyber attacked can have dire consequences like lawsuits, damaged reputation and can even lead to closure. To guard the organization against the devastating effects of cyber-attack, corporates have to have complete knowledge about the challenges and solutions faced in cyber security. Right decisions facilitated with enough awareness before crisis can prove to be extremely beneficial for companies.
The initial move towards forestalling, distinguishing, and relieving the impacts of digital assaults in assembling is to comprehend and conquer the momentum shortcomings in zones, for example, outline frameworks, generation control, QC, and assembling digital security research and instruction.In the same way as other data innovation organizations, the dynamic safeguard firms are conveying distributed computing (the conveyance of programming and information stockpiling over the web) and enormous information crunching (Business and digital wrongdoing, The Economist, 2013). CrowdStrike has built up a cloud-based administration that scoops in knowledge about online dangers from over the web and unions them with examination from its own particular research group. It charges its clients from $25,000 to a huge number of dollars a year for its administrations. At the Black Hat gathering analysts from Endgame showed a framework named “Binary-Pig”, which crunches enormous measures of information quickly to help recognize and comprehend programmers by looking for examples in the “malware” that they use to enter others’ frameworks (Business and digital wrongdoing, The Economist, 2013).
Literature Review
The various parameters of a Cyber Defence Strategy are:
- Identification of assets at risk
- Third-party vendors – management and due diligence
- Education and training
- Board and management engagement
- Breach and system monitoring
- Disaster planning and revisiting
- Insurance
Different organizations are focusing on innovation to thwart programming that programmers use to enter sites to enjoy discount “scratching”, or extraction, of their substance. Cloud Fare, one such start-up, has built up an administration called Maze, which it gladly depicts as “a virtual maze of garbage and gobbledygook”. The administration identifies content-scrubbers and redirects them from the webpage’s helpful material into sham pages with futile substance.
John Strand, a specialist in dynamic protection systems at SANS Institute, a PC security preparing outfit, says the objective of every one of these advances is to drive up the costs that programmers acquire in the expectation this will stop them in future. It is not to wreak ruin in foe servers. “We bargain in toxic substance, not venom,” he says (Business and digital wrongdoing, The Economist, 2013). By difference, digital clash and wrongdoing run the array from negligible burglary and focused on control as far as possible up to mass disturbance and pulverization, regardless of whether by conceivably bringing down the electric matrix or creating mayhem in the monetary framework for augmented periods. The danger condition is additionally entangled by the assortment of state and non-state on-screen characters that can have an effect, joined with the trouble of ascribing pernicious digital exercises to particular individuals and gatherings. What’s more, however certain impacts of expansive scale digital assaults would be felt quickly, their effect has a tendency to aggregate after some time the more drawn out the influenced frameworks are inoperable, harmed, or playing out the wrong capacities (Stirling Larkin Global, I 2016). The hypothesis developed for this research is as mentioned below:
Hypothesis 1: Empowering the network system alone will protect the organization from cyber attack.
Hypothesis 2: Developing stricter cyber crime law will lead to reduction in cyber crime.
Hypothesis 1 and Hypothesis 2 are developed based on the literature provided from several newspapers. The main objective here is to find out which strategy can contribute better in reducing and/or eliminating cyber attacks. Two best probable strategies in this scenario are empowering network systems and developing stricter cyber crime laws. That why; these two factors are added within the two hypothesises. After analyzing these two factors via previous research works, journal articles, books and news papers, it will be easy to understand which of these two factors can provide better safety and security against cyber crime.
Research Questions
This part of the proposal will mainly focus on the research methods that will be followed to conduct the research in an appropriate manner. Research methods are very important in any research work. Without appropriate research methods it is not possible to cultivate expected results. An appropriate research method includes research methods, research philosophy, research design, and research scope and sample size.
Qualitative research methods and/or Quantitative research methods are used in most of the research works. Qualitative research is mostly used to uncover trends by diving deeper into the problem. This type of data collection methods varies using unstructured or semi-structured methods (Bernard 2011).
On the other hand, Quantitative research methods emphasize objective measurements and the statistical, arithmetical or statistical analysis of data collected via polls, questionnaires and surveys. It is also done by manipulating pre-existing data using computational techniques (Gummerson 2012).
For this research, Qualitative method is selected. Secondary data will be collected through existing journals, books and news paper articles.
Since the beginning of academic research, various research philosophies are used to attain efficient research information. These research philosophies are positivism, realism, interpretivism and pragmatism. For this research work, positivism research philosophy will be used. In order to find out which strategy is better to eliminate the threat of cyber crime, it is important to acquire information in a logical manner. Positivism research philosophy is capable of presenting scientific and logical approach to accomplish pragmatic findings (Crouch and Pearce 2012).
In most of the researches, three types of research designs are vastly used. Those research designs are exploratory, descriptive and exploratory (Hanson and Grimmer 2012). Exploratory research designs are mostly used in the long term researches where explanatory research design is used to connect number of ideas for understanding the reason and effect of a particular research study (Cameron 2012). On the other hand, descriptive research design helps to carry out a research with ample amount of explorations along with ample amount of explanation by providing more detailed knowledge about the research topic (Freshwater, D. 2012). For this particular research, descriptive research design would be the best options as it will help to gather additional information about the incidents about cyber crime and about the strategies that can prevent cyber crimes from occurring.
By the end of the research, it is expected to identify the best strategy than can minimize or can prevent incidents related to cyber crime. By gathering data from previous journals, books and newspapers, it will be possible to understand and find out strategies that have previously helped to eliminate the threats of cyber crimes in various crimes. Based on the information the best strategy will be selected.
Research Design
This research has been done by choosing a sample size of 5. Managers of the business houses who have been facing cyber security issues are chosen to be interviewed in order to understand the cyber security challenges faced by the business world.
The data and statistics presented in this research are reliable since the secondary data is collected by reviewing various peer-reviewed journals and books. The primary data is also collected by interviewing the managers. Hence, the information obtained from them are reliable. Moreover, the information collected could be relied upon and used in various other academic researches. Various eminent researchers support the collected secondary data. Hence, the reliability and the validity of the collected data are proved.
The questions that are asked to the managers are open ended and focused on the specific topic. The managers are chosen in such a manner that they have faced cyber security challenges in their businesses. The questions that are asked are as follows:
- How has cyber security issues affected your business?
- What are the main cyber security challenges that you have faced in your business?
- What are the initiatives that you have taken to curb the issues of cyber security?
- What are the major types of cyber attack faced by your company?
- How has the cyber attacks changed over time?
These interview questions are effective and the responses of the managers are analysed to understand the effects of lack of cyber security in the business organizations.
The primary limitation of this research work is it will follow the secondary data collection method. Through secondary data collection method, information will be gathered from previous research works, journals, books and news papers. In recent time, huge innovations are seen in technological field. Therefore, the chances are low that previous solutions will work in today’s advanced world. Therefore, doing primary research could help the research to have more authentic and up to date data. Conducting interview with the personnel who are working to fight cybercrime could help the research to have real time information.
On the other hand, hypothesises are developed based on only two strategies. It is possible that there are other better options that can deal with the cybercrime. However, as only two strategies are selected, the entire research work will be limited to those two strategies and will not focus on other possibly better strategies.
The research is scheduled over a period of 12 weeks. Each task is aimed to fulfil a desired objective followed by next task.
Conclusion
The end results from this project will be f extreme commercial importance for corporates and those offering cyber solutions. Apart from them, students can also refer to this project for their information and respective assignments. With the everyday progress and dependency on technology has resulted in increased cyber attacks and the vulnerability of business’. The outcome will further educate the professionals on some very crucial aspects of cyber security and what steps they can take to maintain the confidentiality of their data.
There is no ‘one size fits all’ way to deal with overseeing digital hazard. In any case, in dealing with the hazard that gadgets posture to a system, instructive organizations ought to concentrate on the accompanying key issues: In every circumstance, free basic intuition is expected to guarantee that the organization’s digital security methodology is custom-made to the dangers confronted by the foundation, including its lawful commitments, its basic resources, and the outsider sellers that are depended upon; Techniques must go past a straightforward ‘check box’ exercise to a living and breathing procedure that covers the essential specialized perspectives and additionally accommodating progressing training; Digital hazard ought to be overseen on an authoritative level with contribution from all level of partners and staff – with extreme supervision by the board and senior administration; Debacle arranging frameworks and interruption identification frameworks ought to be set up and ought to be effectively and constantly checked; and thought ought to be given to hazard mitigants -, for example, expert digital protection – to help moderate the monetary, legitimate and reputational dangers of digital episodes.
The past work done in same domain highlights the basic fundamentals of cyber security that every organization must account for in their data protection strategy. The same is represented in the picture below.
Cyber Security Fundamentals (Source: Ridout, T. 2016)
References
- “Cyber Security – Increased Challenges.” Mondaq Business Briefing, 5 July 2016. General OneFile, viewed 26thMay 2017.
- “Increase in Business Cyber Crime Calls for Increased Liability Protection.” PR Web Newswire15 Aug. 2012. General OneFile. Web. 22 Apr. 2017.
- “Oxford chooses Melbourne for cyber-security hub.” Age[Melbourne, Australia], 15 Dec. 2015, p. 13. Academic OneFile, viewed 26th May 2017.
- “Update: Cyber Security: Corporate Challenges and Responses to Emerging Opportunities.”Jane’s Defence Weekly, vol. 48, no. 37, 2011, ProQuest Central, viewed 13th may 2016.
- Bernard, H. R. 2011. Research Methods in Anthropology: Qualitative and Quantitative Approaches. 5th ed. Plymouth: Alta Mira Press.
- Cameron, R. 2012. ‘A sequential mixed model research design: design, analytical and display issues’, International Journal of Multiple Research Approaches, 3(2), 140-152,
- Crouch, C. and Pearce, J. 2012. Doing Research in Design -Page 68, 2nd London: Bloomsbury Publishing Plc.
- Firewalls and firefights; Business and cyber-crime. (2013, August 10). The Economist, 408(8848), 53(US).
- Freshwater, D. 2012. “Reading mixed methods research: contexts for criticism”, Journal of Mixed Methods Research, 1(2), pp. 134-46.
- Gummerson, E. 2012. Qualitative methods in management research,5th Thousand Oaks, Calif.: Sage
- Hanson, D., and Grimmer, M. 2012. The mix of qualitative and quantitative research
- Harrison, R. L. and Reilly, T. M. (2011) “Mixed methods designs in marketing research”, Qualitative Market Research: an International Journal, 14(1), pp. 7 – 26
- Lee J. Wells, Jaime A. Camelio, Christopher B. Williams, Jules White, Cyber-physical security challenges in manufacturing systems, Manufacturing Letters, Volume 2, Issue 2, April 2014, Pages 74-77, ISSN 2213-8463.
- Privacy, Data Theft Top Cyber-security Issues In 2012: Report2012, Rhodes.
- Ridout, T. 2016, “Building a Comprehensive Strategy of Cyber Defense, Deterrence, and Resilience”, The Fletcher Forum of World Affairs, 40, no. 2, pp. 63-83.
- Valk, Vincent. “Cyber Security: Attacks Increase, Complexity and Challenges Rise.”Chemical Week, vol. 172, no. 9, 2010, pp. 13, ProQuest Central, viewed 20thMay 2017.