Project Objectives
Discuss about the Challenges in Cyber Security for Business for Mechanisms.
Cybersecurity is a term that includes the mechanisms that are adopted to prevent the computer systems and computer networks from the cyber attacks. In the present times, there are many concerns to security that have been recorded and observed. Also, there are various challenges that have been observed in the areas of implementation of the security protocols along with the maintenance of the same. A research proposal on the project to overcome these security challenges has been included in the document.
- Identification of the major cyber-attacks and challenges to cyber security
- Assessment of the cyber-attacks and security issues with the aid of three case studies
- Development and understanding of the solutions and measures that may be taken to prevent the attacks
- Finalization of the topic of research
- Completion of the literature review on the topic
- Research proposal on the topic as Challenges in Cyber Security for Business
- Submission of the reflective journal on the research process
The challenges and security issues in association with cyber security are abundant.
Lancope, an organization that has been taken over by Cisco works in the area of cyber security solutions and countermeasures. There are certain common issues and threats that the organization has developed the countermeasures for. However, with each passing day, the form of these attacks keeps on changing. Some of the advanced forms of the attacks such as Advanced Persistent Threats and many more are carried out by the attackers. The real-time attacks and threats are difficult to control and prevent. There are analytics, Business Intelligence and Deep Packet Inspection (DPI) tools that are being used by Lancope for threat identification and prevention. There are still implementation issues that have been observed in case of Lancope in terms of the speed of the flow sensors and the enhanced complexity as well (Rohde-Schwarz, 2016).
The issues and problems associated with cyber security have been analyzed and identified in the hospitality industry as well. There were five hotels in Reno, Nevada that were scrutinized on the basis of the practices that they have adapted to deal with cyber-attacks. There were various gaps that were found in terms of the security practices and protocols that were implemented. The members of staff were not aware about the possible risks and attacks and there were various cases of information breaches and leakage that were observed. The use of cyber systems and platforms is abundant in the hospitality industry and such loopholes in security provide an invitation to the attackers to easily fulfill their malevolent motives. The administrative control and the monitoring process were also not up to the mark (Shabani, 2016).
Because of these issues, there is a poor impact on the customers and clients that are engaged with the hotels.
The third case study involved the analysis of security framework for Ontario Local Distribution Company (LDCO). It is a company that works in the field of electricity and provides associated services to the users and clients. LDCO is a technically advanced firm that involves latest technologies such as smart connections and Internet of Things.
Project Scope
Asset management and vulnerability management are some of the major issues that have been observed in LDCO. Also, there is a lack of monitoring of the security schemes and protocols that lead to the presence of a lot many weaknesses (Herzog, 2011).
In the literature review that was carried out, the primary issues that were observed were in the form of lack of awareness and control, inability to manage the assets and the use of obsolete technologies. It is because of these reasons that the attackers find it easy to target the desired system and impact the security of the same in a negative manner.
There were also issues that were observed in terms of the management of the changes along with the problems with the implementation of the security strategies and protocols (Sharma, 2012).
- What are the possible measures that may be implemented to prevent, detect and control the cyber security challenges and issues?
- What architectural and infrastructural changes are required to deal with the cyber-security challenges?
- What are the latest technical tools and systems that have been developed to avoid the cyber-attacks?
- What are the major gaps in terms of the employees and users that enhance the likelihood of these attacks?
The research on the topic as Challenges in Cyber Security for Business will be carried out using a combination of qualitative and quantitative research methods.
This is the research methodology in which will include the first step as the preparation of the research. A research topic is finalized followed by listing down of the research questions as included in the section above in the form of primary and secondary questions. A literature review is carried out as the next step which has been done by including review of three case studies to understand the security challenges and issues. It is also important to understand and analyze if the research questions can be answered using qualitative method of research. In this case, it is possible to answer most of the research question using this methodology.
Sampling and determination of the sample size is the next step. In case of the qualitative research, the sample sizes are kept relatively small. There are research methodologies such as case study research, action research and grounded theory that will be applied on the samples (Farber, 2006).
There will be various data collection processes that will be used in this case such as conduction of surveys, analysis of the organizational documents and case studies, interview sessions and direct observation. These processes will bring forward the cyber security risks specific to the risk categories and will also highlight the associated impact and likelihood.
The data will then be analyzed using data analytics tools and techniques such as coding, descriptive analysis and narrative analysis. The results will then be documented.
This is the research method which is based upon the numerical data or may be used to transform the information in the form of usable statistics.
Literature Review
The sample sizes in this method of research are normally larger and quantification of the opinions, variables and behaviors are done. Measurable data is collected in this case for fact-finding and uncovering the patterns that are involved. Research process includes the preparation of the research along with conduction of the literature review (Fischler, 2010).
Large sample sizes are then used to carry out the research by using data collection methods for collection of measurable data. The data is then collected and analyzed using the research instruments to come up to the results.
There are scenarios wherein the organizations that have become victim of the cyber-attacks in the past, do not share the information and provide the data to carry out the research. It is because of the reason that the information that is impacted and the damage that is caused remain private to certain internal members of the organization (Reddy, 2014).
There are also newer forms of cyber-security challenges that are being created and executed every day which makes it difficult to cover and analyze all the issues in complete detail.
Task Name |
Duration |
Start |
Finish |
Challenges in Cyber Security for Business |
61 days |
Tue 7/25/17 |
Tue 10/17/17 |
Research Initiation |
6 days |
Tue 7/25/17 |
Tue 8/1/17 |
Selection of the research topic |
1 day |
Tue 7/25/17 |
Tue 7/25/17 |
Feasibility Analysis |
2 days |
Wed 7/26/17 |
Thu 7/27/17 |
Determination of the results |
1 day |
Fri 7/28/17 |
Fri 7/28/17 |
Presentation of the topic |
1 day |
Mon 7/31/17 |
Mon 7/31/17 |
Submission of the topic |
1 day |
Tue 8/1/17 |
Tue 8/1/17 |
Milestone One: Research Topic |
0 days |
Tue 8/1/17 |
Tue 8/1/17 |
Research Planning |
5 days |
Wed 8/2/17 |
Tue 8/8/17 |
Research scope and objectives |
2 days |
Wed 8/2/17 |
Thu 8/3/17 |
Research Questions to be Answered |
1 day |
Fri 8/4/17 |
Fri 8/4/17 |
Determination of the Research Methodology |
1 day |
Mon 8/7/17 |
Mon 8/7/17 |
Research Plan |
1 day |
Tue 8/8/17 |
Tue 8/8/17 |
Milestone Two: Research Plan |
0 days |
Tue 8/8/17 |
Tue 8/8/17 |
Research Execution |
41 days |
Tue 7/25/17 |
Tue 9/19/17 |
Literature Review |
6 days |
Wed 8/9/17 |
Wed 8/16/17 |
Research Proposal |
10 days |
Thu 8/17/17 |
Wed 8/30/17 |
Sampling Methods |
7 days |
Thu 8/31/17 |
Fri 9/8/17 |
Identification of Data Sources |
3 days |
Tue 7/25/17 |
Thu 7/27/17 |
Data Collection |
7 days |
Mon 9/11/17 |
Tue 9/19/17 |
Milestone Three: Literature Review and Research Proposal |
0 days |
Tue 9/19/17 |
Tue 9/19/17 |
Data Analysis |
16 days |
Wed 9/20/17 |
Wed 10/11/17 |
Analysis of the data collected |
12 days |
Wed 9/20/17 |
Thu 10/5/17 |
Compilation of the results |
2 days |
Fri 10/6/17 |
Mon 10/9/17 |
Documentation of the results |
2 days |
Tue 10/10/17 |
Wed 10/11/17 |
Milestone Four: Data Analysis Results |
0 days |
Wed 10/11/17 |
Wed 10/11/17 |
Research Presentation |
4 days |
Thu 10/12/17 |
Tue 10/17/17 |
Review of the Research |
1 day |
Thu 10/12/17 |
Thu 10/12/17 |
Incorporation of Changes |
2 days |
Fri 10/13/17 |
Mon 10/16/17 |
Presentation of the results |
1 day |
Tue 10/17/17 |
Tue 10/17/17 |
Final Submission |
1 day |
Tue 10/17/17 |
Tue 10/17/17 |
Milestone Five: Completion Report |
0 days |
Tue 10/17/17 |
Tue 10/17/17 |
Conclusion
Cyber-security has emerged as a prime area of concern for the business units and the users. There is a need to determine the major issues and risks that are associated with cyber security and develop the methods that may be applied in order to deal with these risks. It is also necessary to ensure that the users are made aware about the possible risks and threats so that the issues are prevented and controlled (Babate, 2015).
References
Babate, A. (2015). State of Cyber Security: Emerging Threats Landscape. [online] Available at: https://www.ijarcst.com/doc/vol3issue1/ver2/alhaji.pdf [Accessed 30 Aug. 2017].
Farber, N. (2006). Conducting Qualitative Research: A Practical Guide for School Counselors. [online] Available at: https://www.schoolcounselor.org/asca/media/asca/Data%20Specialist/Farber.pdf [Accessed 30 Aug. 2017].
Fischler, A. (2010). Quantitative Research Methods. [online] Available at: https://education.nova.edu/Resources/uploads/app/35/files/arc_doc/quantitative_research_methods.pdf [Accessed 30 Aug. 2017].
Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), pp.49-60.
Reddy, G. (2014). A Study of Cyber Security Challenges and Its Emerging Trends on Latest Technologies. [online] Available at: https://iet-journals.org/archive/2014/jan_vol_4_no_1/872825138167247.pdf [Accessed 30 Aug. 2017].
Rohde-Schwarz (2016). Lancope accelerates security performance and time-to-market with Dell, Rohde&Schwarz Cybersecurity & Napatech. [online] Available at: https://cybersecurity.rohde-schwarz.com/sites/default/files/download/casestudy_lancope_misc_en_3607-2390-32_v0201.pdf [Accessed 30 Aug. 2017].
Shabani, N. (2016). A Study of Cyber Security in Hospitality Industry – Threats and Countermeasures: Case Study in Reno, Nevada. [online] Available at: https://arxiv.org/ftp/arxiv/papers/1705/1705.02749.pdf [Accessed 30 Aug. 2017].
Sharma, R. (2012). Study of Latest Emerging Trends on Cyber Security and its challenges to Society. [online] Available at: https://www.ijser.org/researchpaper/Study-of-Latest-Emerging-Trends-on-Cyber-Security-and-its-challenges-to-Society.pdf [Accessed 30 Aug. 2017].