Objectives
Question:
Discuss about the Challenges in Cyber Security for Business.
The internet helps the businesses from different locations and size to reach to the new customer base in the organization. This will also provide opportunity for the business organization to work more efficiently by using different computer based applications and tools. The business organizations that are using the internet must create a culture of security that will increase consumer’s confidence and enhance the business organization. Despite the threat from different malwares and viruses, there must be awareness in computer security and protection of the data with the rapid growth of the internet along with the passage of time. The concept of stealing data, bringing down the websites and committing fraud is associated with cybercrime. With more than 3.4 billion internet users, it has been found that the opportunities for cybercrime is increasing gradually with the passage of time. It is important to combat with the hardware and the software policies and to minimize the impact of cybercrime in the organization. The increasing severity and the prevalence of malicious cyber activities constitute threat to the foreign policy and national security of the economy (Yi et al. 2014). Cyber is associated with the protection of computer based equipment and different information from unauthorized and unintended change, access or destruction. Most online attacks or cyber crimes are prevented using basic security practices, IT systems and processes. The current or the former employees in the organization can pose threat to the organization or are involved in the cyber security crimes in the organization. There are several attacks on the third party systems in different organizations or IT websites and system which are posing threat to the organizations. There might be financial loss from disruption of doing business or trading, theft of information or bank and financial details which affects the business organizations (Chen et al. 2014). This paper will carry out an in-depth analysis of the challenges faced by cyber security business organizations drawing relevant literatures.
The main objectives of this project are mentioned below:
- To tackle the challenges of cyber security crimes.
- To understanding the working of the technical experts who are involved in this crimes.
- To address the important technical concerns associated with cyber security crimes.
- To identify the threats and find out relevant ways to prevent it.
The scope of this project is not limited only to the IT industry, but also in other lines of business. It will be beneficial for the latest technologies such as mobile computing, cloud computing, banking and E-Commerce to prevent from the threat of cyber attacks.
According to Lee and Lee (2015), with the passage of time as the cyber attacks are growing in number and increasing to a large extent, the threat is considered as a problem rather than national or international security content. The danger lies in how to overcome it and respond to the different international strategies and measures which are taken to protect the information against malicious software. The business entities in different states and nations are trying to address the different challenges that are faced by them. The cyber security questions must be discussed within a larger framework of international norms, co-operation and rules which are appropriate for the behaviors that will ensure the use of cyberspace in the organization. The potential impact of the new and the emerging cyber attacks as well as new procedures and impact are posing challenge to the organization. The costs and benefits that are associated with national and international security in different business fields must be properly understood. Van de Berg et al.(2014) has stated that with the development of cyberspace, it is important to focus on information security that lays more emphasis on availability, confidentiality and integrity of information. The business organizations have applied cyber security standards in understanding supplier relationship, cyberspace assets, compliance and business continuity management. Cyber risks is associated with the IT risks which is regarded as complementary to the technical focus which is related to information security in the organizations. The cyber actors in different cyber domains are exposed to different kinds of risks when carrying out the cyber activities. These actors are the main users in the organizations and they must strongly co-operate in different supply chain networks in the organizations.
International norms and rules in the cyber security domain
According to Elmaghraby and Losavio (2014), cyber security is regarded as the subset that focuses on the different computing system, information processes and varied data exchange channels which are sanctioned under different kinds of criminal laws. The assurance and information security collaborates with cyber security to focus on the varied information that is to be processed. The three general areas that need to be secured are related with the integrity and authenticity, confidentiality and privacy and the availability of information for the use of services. It can be said that the legal and the social concept of privacy addresses the different confidential aspects of one’s life , makes a person free from unwarranted interference and control over one’s own public profile. According to Liu and Wong (2017), the danger of ransom ware is posing a great threat to the business organizations. This has prevented the user from accessing varied multiple functions and data on the different network without any payment. The cyber criminals have been playing a major role in this attack and they have also tried to extort the money from the victims. On the other hand, DDoS attacks are also increasing with the passage of time. This has stood as a challenge for many organizations regardless of its size. It can be said that all cyber criminals are not profit oriented and sometimes they try or attempt for different kinds of cyber attacks for social or political reasons. These types of attacks are considered more dangerous than the traditional threats that are used by the hackers in different organizations. The business organizations do not always face external threats. However, there are certain internal threats which affect the business organizations and these threats may be referred to as insider threats. It has been found that more than two third of the business organizations are affected by this insider malicious threat while the remaining attacks may be due to inadvertent actors. Moreover, machine learning algorithms that are used by the business organizations for the calculation of complicated data sets may also be leveraged in different crimes and it will help in identifying the fraudsters who targets high value data sets. Although machine learning is used to detect fraud, however it also helps in committing different cyber crimes (Gupta et al. 2016).
Sadeghi et al.(2015) has stated that the systematic integration of the different countermeasures against different cyber attacks will follow different integration of the IT companies . The IoT system can be considered vulnerable to different cyberattacks. The main objective of this IoT is to realize the smart products that will help to know the history as control the entire production process in the organization. Moreover, in smart service, the companies can also outsource the production process to different smart factories that are operated by the third parties. It can be said that the strong connectivity of the IoT system and the demand of smart products against the protection of various industrial espionage helps in maintaining the confidentiality and privacy of the employees. The industrial IoT system also provides the base for different attacks systems. As the smart factories consists of different cyberphysical production processes, it helps in the control of business information and also keep a close monitoring of the physical processes through the actuators and the sensors. The various softwares can be comprised through the use of malicious codes and other runtime attacks. It can be said that the communication protocols may also be subjected to different types of protocol attacks such as denial-of-service attacks and man-in-the-middle. Giarratano et al. 2017 has started that there are many guidelines which are listed by different businesses against the high profile incidents in different countries. The latest innovation of digital electrical grid has tried to break the traditional fence which has crossed several domains. It has been found that since one system is interconnected, one infected system can infect the other systems because of meshed structure and the cascading effect. The SoD must be implemented at the beginning of the process level and it must describe the entire process that is to be integrated into the varied components of the system. Moreover, it shall also remain cross dominated in this case. It can be stated that the data flow integrity has become an important issue in the threat-modeling standpoint. Moreover, it has become tough to handle the data because of the new digitized structure grid of the electrical system. Some of these substitutions are usually at the substation level and billing processes. In certain cases, the traditional control room, data acquisition and supervisory control are located in various field and they dominate the different situations. The integrity of these data sets can be maintained only by their key users. In this case, after analyzing the past issues it can be said that the attackers are capable of opening a breaker from different remote locations. This situation can be avoided if any final system which is at the end of any grid can identify the particular originator of that command (Chang and Ramachandra 2016).
Assurance and information security
Almorsy et al.(2016) has highlighted that the cloud computing management layer can also be extended and incorporated for co-ordination of different components. This layer is very critical and there are certain issues and challenges which needs to be overcomed if there is any breach in this layer. It will also result in having adversary control and offers different set of API’s that are to be performed by the client applications for the integration of cloud platform. Moreover, there might be some security issues in the Pas model which is important in the application of cloud management layer in the organization. It is the responsibility of the security controllers to target and reduce the vulnerabilities which are associated with the different protocols for the protection of data between the consumers and the cloud platforms. According to Roman et al.(2013) it is important to authenticate and identify the IoT which is regarded as a multiple entity and plays an important role in authentication. Such interactions might be dynamic and it becomes difficult to know the entities which are used by the partners in advance for providing the particular service. These security mechanisms also need to consider the inherent and the important features of IoT which is possible through interactions. In centralized IoT structure, application logic is located in a single central entity which becomes challenging and difficult to identify. Many data providers such as information consumers and sensors are used to detect the various problems in this case which remains connected to this central entity. It can be said that this authentication must be centralized in one single entity so that that the providers associated with it can identify the entity easily. It has also been found that this simplification does not remain evenly distributed in all the IoT architectures which helps in the fulfillment of edge intelligence principle and different types of collaboration. In IoT, there can be certain challenges related to access control which are found commonly in the distributed IoTs. There might also be construction of some data sources and services from different contexts and locations which will help in revealing the information. In certain cases, location and granularity also helps in providing correct information to the people in providing the correct credentials for the access control policies in different organizations. In case of authentication, these access control are also easier to maintain and store within a particular single entity. The IoT also inhabits in the internet ecosystem which provides support to the existing protocols. These protocols cannot be implemented without any change and thus it must be adapted according to the complexities in different designs. Moreover, there are various strategies which has to be followed to tackle the problem of the IoT approach. This is possible through the various entities which are responsible for distributing and managing the credentials. In certain cases, the optimization of these security protocols might impact the cryptographic algorithms. There are several entities which will help in controlling the granularity of the different databases (McGettrick et al. 2014).
Different types of cyber attacks
According to Liang et al.(2014), MSN is built on a broad area of wireless medium which helps to inherit different security problems such as secure routing, data eavesdropping attacks and denial of service attacks. Sharing of information based on gesture is regarded as a unique idea in the research process in MSN. These gesture information can be viewed by the neighbors who can make the gestures clear and that helps in targeting the SU. It can be said that for privacy preservation, the social context in MSN needs to be considered for the designing the different communication protocols. In certain cases, the privacy preserving profiles helps in reducing the profile information between the social context and the disclosed information. These effectiveness needs to be validated in different social contexts and thus it is necessary to explore the effectiveness of the profile matching the particular protocols. It has been found that the distributed systems are also vulnerable to different kinds of attacks where the attackers abuses or manipulates the identities. The SU’s often offers protecting the local privacy which are challenging for the attackers and it is hard to detect and predict their behaviors. There might be certain challenges in co-operative monitoring and thus it requires the normal SU’s to connect with the other behaviors which will help in monitoring the results for the centralized authority (Leitner and Rinderle-Ma 2014).
Conclusion
Thus, knowledge is considered as a challenge in case of cyber security. As cyber security involves a holistic approach and different organizations would require analytics process and tools to cope up with them accordingly, it is important to get an idea of the technological view of cyber security in these organizations. The organizations must also be viewed as a complex system and the employees in different levels in the organizations must cope up with the information management process and try to share information. The cyber security functions are also associated with the varied information systems and it can be identified as the main starting point of a business problem. It is also essential because it helps to secure the best information systems. There are certain promising approaches which help to deal with the privacy challenges in different applications such as service review applications and other business areas. It has been found that the gesture assisted information for security, the social context based information which are used for private sharing and effective resistance to different types of cyber attacks. It is important to take further initiatives for defining the different security technologies which will help in the security measures based on varied risk management. The challenge which is interconnected to different systems must be addressed globally. This will help in the authorization and authentication of the individuals in the areas of their operation and it shall remain consistent. `Therefore, it is important to conduct further research to understand the complex, comprehensive nature of the cyber security management
References
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Chang, V. and Ramachandran, M., 2016. Towards achieving data security with the cloud computing adoption framework. IEEE Transactions on Services Computing, 9(1), pp.138-151.
Chen, S., Xu, H., Liu, D., Hu, B. and Wang, H., 2014. A vision of IoT: Applications, challenges, and opportunities with china perspective. IEEE Internet of Things journal, 1(4), pp.349-359.
Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), pp.491-497.
Giarratano, D., Guise, L. and Bodin, J.Y., 2017. Does cyber security moving towards risk management leads to new grid organisation?. CIRED-Open Access Proceedings Journal, 2017(1), pp.2700-2702.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global.
Lee, I. and Lee, K., 2015. The Internet of Things (IoT): Applications, investments, and challenges for enterprises. Business Horizons, 58(4), pp.431-440.
Leitner, M. and Rinderle-Ma, S., 2014. A systematic review on security in Process-Aware Information Systems–Constitution, challenges, and future directions. Information and Software Technology, 56(3), pp.273-293.
Liang, X., Zhang, K., Shen, X. and Lin, X., 2014. Security and privacy in mobile social networks: challenges and solutions. IEEE Wireless Communications, 21(1), pp.33-41.
Liu, F. and Wong, M., 2017. Challenges of Cyber Security and a Fundamental Way to Address Cyber Security. Cybersecurity and Privacy-Bridging the Gap, p.189.
McGettrick, A., Cassel, L.N., Dark, M., Hawthorne, E.K. and Impagliazzo, J., 2014, March. Toward curricular guidelines for cybersecurity. In Proceedings of the 45th ACM technical symposium on Computer science education (pp. 81-82). ACM.
Roman, R., Zhou, J. and Lopez, J., 2013. On the features and challenges of security and privacy in distributed internet of things. Computer Networks, 57(10), pp.2266-2279.
Sadeghi, A.R., Wachsmann, C. and Waidner, M., 2015, June. Security and privacy challenges in industrial internet of things. In Design Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE (pp. 1-6). IEEE.
Van den Berg, J., Van Zoggel, J., Snels, M., Van Leeuwen, M., Boeke, S., van de Koppen, L., Van der Lubbe, J., Van den Berg, B. and De Bos, T., 2014. On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. In Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium (pp. 13-14).
Yi, X., Liu, F., Liu, J. and Jin, H., 2014. Building a network highway for big data: architecture and challenges. IEEE Network, 28(4), pp.5-13.