Scope of the project
Discuss about the Challenges of Cyber Security in Business.
Cyber security has become a major issue in the present day business situations. The advancement of the technology helps to give various solutions that can solve the problems in the business within a short time span and in a cost effective way. Most of the business organizations are going for the digital disruptions nowadays which leads to the increased amount of using the smart phones and other advanced digital devices. This trend is enhancing the threats from the cyber crime. In order to mitigate the risks from the cyber security threats, the business organizations are needed to follow some steps. The solution should be effective in nature and will give the sustainable solutions to the business organization so that they can compete in the business in the competitive market. The aim of this research proposal is to develop a concept about the challenges regarding the cyber security in the business field. The paper discusses about the various aspects of the challenges and the way to overcome those challenges so that the organizations can hold a good position the highly competitive market.
- The main objective of this article is to discuss about the challenges regarding the cyber security in the business which can be applicable in the highly competitive business environment.
- Apart from that the paper also addresses the way to face those challenges .
- This paper delivers the knowledge about the cyber security from the different perspective and the ways to deal with that challenges so that the security in the business organizations can be maintained.
The scope of this project has great concern in today’s digital world. The security challenges faced in the organization can be both internal and the external. The business organizations have to handle the large amount of data in daily basis. Most of the digital organization supports the digital disruption and this make sthe use of the technology as the integral part of the business organization. The use of the technologies in the organizations makes the scope of the discussing the challenges in the protection of the security and the data within the organization.
The main objective of the project is to address the challenges regarding the cyber security in the business organizations. The objective of this paper has a good scope to be researched as there are many opportunities that can be evaluated in this course. The paper can contribute in the implementation of the right security standards in the organizations as it evaluates the different security challenges in different organizations. This evaluation will indicate the nature of the security challenges and will specify the different ways of mitigation. The ways of evaluation of the security challenges and the mitigation techniques are derived from the comparative studies of the cyber security challenges in different organizations those are conducting their business online.
Objectives
The issues regarding the cyber security has become a major concern nowadays. The business organizations are conducting the business in both the online and offline modes. In this case, the business organizations are concerned about the security threats in the conduction of the online business. In order to deal with the various security threats in the online business organizations, the management of the organizations are hiring the cyber security experts to keep their systems safe from the internal and external threats. This helps the companies to do business in an cost effective way.
According to the report generated by the ACS, the threats can be of different types. The business organizations can face the threats such as Phishing and scamming (ACS 2016). Major security threats can also come from the activities like key logger and attacks from malware and ransom wares. It can be said with the advancement of the technology conduction of the business has become easier along with that it also increases the security issues in the organizations (Herrera, Ron and Rabadão 2017). The use of the cloud computing architecture and the use of IoT in the business organizations have increased the productivity and the creativity of the technological and business companies (Li et al.2012). However, the use of these advanced technologies has increased the threats for the cyber security. The advancement of the technology has enhanced complexity of the threats in the security (Sadeghi, Wachsmann and Waidner 2015). The business organizations are responsible for the maintaining the security of the data. In case, if the system security in the organization get breached , the whole situation will turn against the business organizations.
The working of the various types of the cyber security threats is different. The control of the system can be done by the cyber criminals through the use of Bonets. The keys which are pressed can be recorded using the key loggers and the key logging information can be used by the criminals to enter in to the system (Babate et al. 2015). Malwares are the malicious programs which acts as a normal application in the system but secretly collects the user data from the system and the information can be accessed by the cyber criminals through a specific link (Bradley 2017). The most common threats faced by the business organizations are the virus and Trojans. The main specification of these kinds of threats is that they can spread from one system through another through the programs and the links (Goutam 2015). These types of threats can destroy the system and make the loss of the data in a significant way.
Security threats organizations face due to cybercrime
The main problem in the cyber security is that it causes the negative effect on the business organizations. The threat regarding the cyber security has become o e of the major problem nowadays according to the government of the United States ( Amit and Zott 2012).. The importance of the cyber security lies on the ability to protect information and the raw data of the organizations from the unauthorized access (Fischer 2016). Almost all the organizations in the world have been affected negatively from the violation of the cyber security by the unauthorized entity (Tisdale 2015). The importance of the cyber security has increased as almost all the sectors of the business are dependent on the digital technology and internet in order to do the business.
Various studies has discussed about the different threats that can be encountered by the online organizations during doing the business online (Harris and Patten 2014). The introduction of different security threats has been discussed by some papers. Apart from that the impact of the violation of the cyber security has been well explained and importance of the cyber security experts and the need for the cyber security has been well explained in the journals and reports maintained in the literature review. However, there is a gap in those research as no discussion has been conducted about the challenges the organizations can face from the cyber security and the ways to mitigate those threats (Jeschke et al. 2017). The nature of the previous papers are explicit. The objective of the current paper is to present a knowledgeable discussion about the challenges of the cyber security in the business filed and the ways to mitigate those challenges.
The papers has helped in finding the different aspects of the security threats applicable for the various technologies (Fonseca and Rosen 2017). These information has made an opportunity to research further regarding the challenges caused by the security threats in the organization conducting the business online (Arabo 2015). Apart from that the problems faced by the various organizations have made a way to find out the problems and the possible loss the organization can face due to the violation of the cyber security. This leads to the way for finding the ways to dissolve the challenges and the possible ways for mitigation of the damage.
Hypothesis:
H1: There are many potential threats regarding the cyber security and the ways for the mitigation of those threats are affecting the business of the organizations.
Types of cyber security threats faced by organizations
H2: There are no potential threats of the regarding the cyber security and it is not affecting the business of the organizations.
What are the challenges in maintaining the cyber security in the organizations?
There are two types of data collection method –primary data collection and secondary data collection. The secondary data collection includes the evaluation of the data those are already published. In this article secondary data will be used in order to determine the challenges of the cyber security and the impacts of the threats from the cyber security in the organization.
The data analysis method can be of two types- qualitative and quantitative. Qualitative data analysis includes the examination of the information from the well researched articles and the discussion (Shaik, Abdullah and Klein 2017). On the other hand the quantitative approach of data analysis indicates the systematic approach towards the research question through the analysis of the numerical and statistical data. In this paper the combination of these two analysis will be used to address the research questions.
Under the qualitative analysis section the comparison of the three e-commerce organizations is done. The analysis of the threats the three companies has been faced and the impact of those threats for those companies are examined in a detailed process (Sajid, Abbas and Saleem 2016). It has been seen that one common thing between the three organizations is that , they has been attacked by the malware. Due to this attack all the three companies has faced a loss of great revenue. The occurrence of this attack has been found out due to the lack of cyber awareness among the employees of the organization and unintentional use of the malicious links. It has been seen that one of the companies has become the victim of the key logging. In this case the possible culprit may be the someone inside the organization.
Under the quantitative analysis section the charts are use and the percentage of the loss due to the different cyber security challenges has been mentioned through the use of numerical data.
The research is limited between the comparison of the three e-commerce organizations. The security challenge discussed in this paper is limited to the attacks of different malicious entities in the websites of the organizations. However, the data breaches and the damage of the system can be happen to any organization of different fields like banking and marketing organizations. The threats and the effects of the cyber attack may have a different impacts on those organizations. The limit of this research is that the research has not done on the diverse company profiles. The findings are restricted to the e-commerce websites and denotes the challenges in the business regarding cyber security along with the possible way of mitigation.
Task Name |
Duration |
Start |
Finish |
Research Project |
85 days |
Tue 01-05-18 |
Mon 27-08-18 |
Topic selection |
3 days |
Tue 01-05-18 |
Thu 03-05-18 |
Selection of the topic for the research |
1 day |
Tue 01-05-18 |
Tue 01-05-18 |
Development of short proposal with research aim |
1 day |
Wed 02-05-18 |
Wed 02-05-18 |
Submission of the short proposal |
1 day |
Thu 03-05-18 |
Thu 03-05-18 |
Research Proposal Development |
10 days |
Fri 04-05-18 |
Thu 17-05-18 |
Refining aim of the research |
1 day |
Fri 04-05-18 |
Fri 04-05-18 |
Identification of the variables, research objectives and questions |
2 days |
Mon 07-05-18 |
Tue 08-05-18 |
Conducting preliminary literature review |
3 days |
Wed 09-05-18 |
Fri 11-05-18 |
Selecting methodology |
2 days |
Mon 14-05-18 |
Tue 15-05-18 |
Selecting secondary data source |
1 day |
Wed 16-05-18 |
Wed 16-05-18 |
Submission of the research proposal |
1 day |
Thu 17-05-18 |
Thu 17-05-18 |
Final research work |
72 days |
Fri 18-05-18 |
Mon 27-08-18 |
Conducting in depth literature review |
30 days |
Fri 18-05-18 |
Thu 28-06-18 |
Secondary data collection |
7 days |
Fri 29-06-18 |
Mon 09-07-18 |
Analysis of the data |
15 days |
Tue 10-07-18 |
Mon 30-07-18 |
Drawing conclusion from the data analysis |
7 days |
Tue 31-07-18 |
Wed 08-08-18 |
Providing recommendations |
2 days |
Thu 09-08-18 |
Fri 10-08-18 |
Preparing the final report |
10 days |
Mon 13-08-18 |
Fri 24-08-18 |
Submission of the research project |
1 day |
Mon 27-08-18 |
Mon 27-08-18 |
Effects of cyber security challenges on business organizations
Conclusion
It can be concluded form the research that maintaining the cyber security is an important factor for the organizations. This paper has researched in a general way about the challenges in the business in case of the e-commerce websites. The findings of the challenges also indicates the ways for the mitigation. It can be said that the cause of the threats can be both internal and external. The impact of the challenges on the business organizations due to the cyber security threats can be in form of data loss and the dam age of the system It also develops the negative impact about the company in the business market. The companies are needed to be aware of the importance of indulging g the security experts and the use of the advanced infrastructure while doing the business in a digital way. Apart from that the training of the employees and spreading awareness about the cyber security can be helpful for the organizations to mitigate the challenges regarding the cyber security.
Reference
Arabo, A., 2015. Cyber security challenges within the connected home ecosystem futures. Procedia Computer Science, 61, pp.227-232.
Sajid, A., Abbas, H. and Saleem, K., 2016. Cloud-assisted iot-based scada systems security: A review of the state of the art and future challenges. IEEE Access, 4, pp.1375-1384.
Tisdale, S.M., 2015. Cybersecurity: Challenges from a Systems, Complexity, Knowledge Management and Business Intelligence Perspective. Issues in Information Systems, 16(3).
Jeschke, S., Brecher, C., Meisen, T., Özdemir, D. and Eschert, T., 2017. Industrial internet of things and cyber manufacturing systems. In Industrial Internet of Things (pp. 3-19). Springer, Cham.
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Fonseca, B. and Rosen, J.D., 2017. Cybersecurity in the US: Major Trends and Challenges. In The New US Security Agenda (pp. 87-106). Palgrave Macmillan, Cham.
ACS (2016). Cybersecurity – Threats Challenges Opportunities [Online]. Available at: https://www.acs.org.au/content/dam/acs/acs-publications/ACS_Cybersecurity_Guide.pdf [Accessed on 25 April 2018].
Amit, R and Zott, C (2012). Creating value through business model innovation. MIT Sloan Management Review, 53(3), p.41.
Babate, A I, Musa, M A, Kida, A M & Saidu, M K (2015). State of Cyber Security: Emerging Threats Landscape. International Journal of Advanced Research in Computer Science & Technology, Vol. 3, Issue 1.
Bradley, R (2017). Why Cybersecurity matters to your business? Forbes.
EMERGNING TRENDS ON LATEST TECHNOLOGIES [Online]. Available from https://arxiv.org/ftp/arxiv/papers/1402/1402.1842.pdf [Accessed on April 23 2018].
Fischer, E A (2016).Cybersecurity Issues and Challenges: In Brief. Congressional Research Service.
Goutam, R K (2015). Importance of Cyber Security. International Journal of Computer Applications. Volume 111 – No 7.
Harris, M and Patten, K (2014). Mobile device security considerations for small-and medium-sized enterprise business mobility. Information Management & Computer Security, 22(1), pp.97-114.
Li, X, Liang, X, Lu, R, Shen, X, Lin, X and Zhu, H (2012). Securing smart grid: cyber attacks, countermeasures, and challenges. IEEE Communications Magazine, 50(8).
Sadeghi, A.R., Wachsmann, C. and Waidner, M., 2015, June. Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference (p. 54). ACM.
Shaik, F., Abdullah, A. and Klein, S., 2017, January. Digital Transformation in Oil & Gas-Cyber Security and Approach To Safeguard Your Business. In 22nd World Petroleum Congress. World Petroleum Congress.
Herrera, A.V., Ron, M. and Rabadão, C., 2017, June. National cyber-security policies oriented to BYOD (bring your own device): Systematic review. In Information Systems and Technologies (CISTI), 2017 12th Iberian Conference on (pp. 1-4). IEEE.