Cybersecurity Challenges Faced by Organizations
Discuss about the Evolutionary Computing and Computational Intelligence.
The use of internet has been increasing day by day as number of people are reliant over the internet to complete their number of tasks regarding to the entertainment, finance and shopping. Many people get support from the application of social media as it facilitates to share the information with family and friends. The services of internet are used by the private sector public and individuals that protect them from the cyber security risk. The research paper will elaborate a number of factors regarding the challenges of cybersecurity faced by business. Along with that the recommendations will be made regarding overcoming the cyber security challenges. The project objective and the project scope of the research program will define the main aim of the report. Research methodology is the important section of the paper that will tell about the sources from which the information is gathered for the selected topic.
The objective of this research program is to analyse the meaning and the concept of cyber security. Along with that the research will analyze the challenges of cybersecurity faced by the organization. The cyber security challneges should be mitigated in an effecient manner that is whythe recommednations will be made to define the solution of challenges of cyber security.
The project scope of the research is wide as it covers the huge range of cyber security challenges on the performance of organization. (Campos, Sharma, Jantunen, Baglee, and Fumagalli, 2016). This research will support readers to get better understanding about the concept of the research which can be used by them to create further research.
According to Joglekar and Pise, (2016), people use a number of online methods to create a connection with families and friends because it provides several business opportunities to the small organization for enlarging their business. The confidential or personal information is being shared by both individual and company that make higher possibilities of cyber security threat. He, et. al., (2016), argued that hackers use a legal system to hack the personal information of the individual to get the unfair benefits. It would decline the financial performance of the organization it has been found from the previous research that there are more than 2.9 who used the social media platform for sharing the information. Along with that, many organizations use the social media sites to conduct the business activities such as market research, data collection, advertising and feedback. According to Gomes, Iivari, Ahokangas, Isotalo, and Niemelä, (2017), the popularity of the social sites can be able to create a higher chance of cyber security risk. There are a number of organizations such as Old Spice Starbucks and Oreo that make their unique image in the Marketplace by using the social media sites. Along with that there is example of some organizations such as PlayStation, HBO and Google that suffered from the cyber crimes that caused in the loss of valued information.
Mitigating Cybersecurity Challenges
As perFutter, (2016), Mobile banking services has been implemented by various banks to attract its number of customers towards the services. The latest technology in the banking industry in which effective application such as pay-pal and mobile wallet are implied by the organisation to transfer the money from one place to another. It enables organisation to transfer their money and being the cause of potential cyber threats. In oppose to this, Kaplan et al. (2015), that in recent scenario, it has been found that number of banks are failed to secure confidential data of consumers which increase the chance of data leakage. There are number of cyber issues are faced by the organization such as IoT, DDoS, Malware, Smartphone Ransomware and Hacktivists (Shackelford, 2016). The distributed denial of services (DDoS) is attacked on the online users and impact number of business activities. Along with that internet of things is a technique which is used by number of people in which the hackers can easily attain the personal information about an individual (Butcher, 2014). A Smartphone malware technique is another approach which enables the hackers to use confidential data of individuals. ‘Plankton’ Malware and ‘DroneKungFu’ are malware software by which the hackers collect the datafromSmartphone users by back door. In the current scenario, many organizations use latest techniques to secure their confidential data. According to Chou, (2013), Hacktivism is dangerous for the company because the initially it facilitates hackers to demolish the image of the company in the marketplace afterward they make monetarily hinder to the organization.
It has been recommended that companies should imply encryption to protect their confidentialdata from the cybercrime (Frank, et. al., 2013). Alomg with that the company should focus on security camera, biometric locks, and other security technique in the computer so that the data can be protected in efficient manner. The company should invest in cyber security techniques as it enables to protect the data in an efficient manner. Berman, Kesterson-Townes, Marshall, and Srivathsa, (2012), depicted that companies should use security software, firewalls and antivirus as it would be helpful to decline the potential threat of cyber security. Along with that the different sort of passwords including symbol is used by organizations to secure the private or confidential information of person as well as companies. It has been found that the companies using easy password at the time of dealing with financial transactions (Dinh, Lee, Niyato and Wang, 2013). Especially when they use banking services and products, it is required for them to use strong passwords. The noteworthy organizational culture should be made by the organization as it facilitates in providing the security to prevent their sensitive information and create an effective image in the market among players. Along with that it has been found that the organization can be provided the guideline to their employee for saving them against the challenges of cyber security (Dastjerdi, Tabatabaei, and Buyya, 2012). The training and development program should be conducted by organization in relation to the cyber security challenges so that the employees of the company can understand the importance of the data and keep them in save manner (Mylrea, 2017).
Research Methodology
The research question and hypothesis are defined below in the context of this research paper.
Research questions
- What are the challenges of cybersecurity faced by the organization?
- How can prevent from cyber security threats by the organiztaions?
Hypothesis
- Cyber security impacts the organization performance in a positive manner.
- Cyber security impacts the organization performance in a negative manner.
Research methodology is considered as the vital aspect for the whole research as it tells about the sources and methods from where information and data regarding the research is collected.
Qualitative and quantitative method has been selected for the research method in which the information regarding the topic has been gathered in an efficient manner (Crossman, 2017). The main focus of the researcher is on qualitative data in which the researcher gets quality in the data regarding the chosen topic. It can be definite that the qualitative data is a loom which utilized in congregation the quality data that assists in handling the quality of the research.
Research approach is integral concept of the entire research in order to gather the information about the research topic. Inductive and deductive are two major research approaches that facilitates researcher to gather the information. Inductive approach is being taken for this research as it facilitates to attain subjective knowledge on the issues of the research. The reliability and validity of the research is enhanced with the help of this research approach. Along with that the use of deductive approach is suitable for this research because the researcher has developed the hypothesis to answer the research questions (Vogel, 2016).
The major objective of the data collections is to gather the data regarding the topic in an efficient manner. Cyber security crime is the biggest challenge for many organizations as it has the ability to steal the personal information about the company as well as individuals which may pose threat to the company. Primary and secondary sources are taken to accumulate the data as they facilitates in collecting information in statistics and informative way (Thomas, 2015). Real and quick response is come with the help of primary data. To collect the information through primary data, questionnaire is being made in which 10 questions entails regarding the cyber security challenges and investments in cyber security. On the other hand, the more reliable information has been collected with the help of secondary sources (Turkenburg&McAuley, 2013).
It is not possible for the researcher to analyse the huge quantity of the data in short span of time that is why the sampling techniques facilitates them to do the same in shorter period. Random sampling technique has been chose to analyse the data in a sophisticated manner by which every sample of the research get chance to select in which the analysis can be done in more efficiency manner (Yang and Wen, 2017).
Research Approach
The research should be accomplished within time frame to maintain the effectiveness of it for the readers. The research strategy should be done by researcher to analyse the importance of each research activity so that it can be done within selected time frame. In the context of research strategy, researcher has chosen systematic approach which facilitates to implement each activity of the research in more sequence way. For which, the action plan is made in which each activity in sequence way with time frame is mentioned which will facilitate researcher to understand the importance of each activity.
It is necessary for the research program to make the target in an efficient manner so that it could be cleared that from where information is to be collected. It helps in identification of a number of sources from where important data in relation to the selected topics have to be collected. The combination of primary sources and secondary sources has been taken to set the target. In order to collect the data regarding the primary, the questionnaire has been prepared in which it will be represented in front of selected employees of the companies that are facing cybersecurity challenges. It will help to get a quick response from the selected employees regarding the questions. On the other hand, the collection of secondary sources has been made with the help of Internet and journal articles and books which are available after 2008.
Research should be done in a valid and ethical manner so that the trust of The Reader over the research can be maintained for a long time. It is the responsibility of the researcher to take care of all the selected data in an appropriate manner. This behaviour of the researcher is assisted in carrying out the further research in a sophisticated way. However, that is face to face the issue of plagiarism and violation of copyright act in order to gather the data regarding the research topic by using secondary sources. This issue has been resolved by the researcher to put the in-text citation in each paragraph with authenticating references.
There are number of issues can be faced by researcher while completing the research program which might impact the research study in an adverse way that can influence the result of the research. Time is a key limitation for the researcher in which the researcher is not active to collect the data regarding each activity in more effective manner. It is vital for the research to have the access of the data otherwise it will being the cause of limitations. Money constraint is another limitation for the research because it is vital for the research to involve in seminar, conduct research program and many more activities that require money. The less funding the researcher may be not capable to get way in of data sources from several locations of geographic to get the research data in explicit process.
S. No. |
Activities |
Time frame (week) |
Descriptions |
A |
Elected of the research topic |
1 week |
It is the begin step in which the topic will be elected for carrying out the time plan. |
B |
Forecasting of the research |
1 week |
After electing the topic of the research, the forecast for the research is been argued in this step in which it finds as the roadmap that coaches researcher to obtain step in each movement. |
C |
execution of the selected plan |
2 weeks |
The forecast which has been done in the second step will be executed in this step. The plans will be madefor further needs. |
D |
Collection of the methods of data |
1 week |
It is essential for the research to amass the data in relation to the topic. This step will be supportive for the researcher to go for the suitable strategy and techniques to collect the data. The combination of Primary and secondary sources has been considered to bring together the data. |
E |
Data analysis |
1 Week |
After accumulating data with proper method, the data will be analysed in a valuable manner with the help of sampling data. |
F |
Discussion |
2 week |
The analysed data will be defined in awell-organizedprocess to carry out the reaction to the selected questions of the study of the research. |
F |
Conclusion and Recommendation |
2 weeks |
Consistent with the data analysis and discussion, the conclusion will be drawn and the recommendations will be made. |
Data Collection Methods
Conclusion
In the limelight of above discussion, it can be concluded that improvement in the internet based service can develop the higher possibilities of cybercrime. Lack of cyber security can be in the major challenge for many Organizations in which they can lead into adverse situation. Hactivism, IoT, DDoS, Smartphone malware, and other threats are being the major reasons of cyber crimes. It is necessary for the organization to develop the budget for cyber security as it will be helpful for them to secure the information for the long term. Along with that the organization should also include the technique of encryption because it facilitates organization as well as individual to use their personal computer by increasing in the layer of security. The research methodology section has been defined in a sophisticated manner in which various approaches and methods have been discussed together with the information regarding the research topic. The collections of primary and secondary sources have been obtained together with the information. Along with that, the main focus of the researcher is on the qualitative data to get the quality in their data along with that the quantitative data has been taken to get the data in the statistic form.
Reference list
Berman, S.J., Kesterson-Townes, L., Marshall, A. and Srivathsa, R. (2012). How cloud computing enables process and business model innovation. Strategy & Leadership, 40(4), pp.27-35.
Butcher, M. (2014). Here’s What We Know So Far About The Celebrity Photo Hack. [Online] Tech Crunch. Available at: https://techcrunch.com/2014/09/01/heres-what-we-know-so-far-about-the-celebrity-photo-hack/ [Accessed 24 April 2018].
Campos, J., Sharma, P., Jantunen, E., Baglee, D., and Fumagalli, L. (2016).The challenges of cybersecurity frameworks to protect data required for the development of advanced maintenance’, Procedia CIRP, 47, pp. 222-227.
Chou, T.S. (2013). Security threats on cloud computing vulnerabilities. International Journal of Computer Science & Information Technology, 5(3), p.79.
Crossman, A., (2017). An Overview of Qualitative Research Methods.ThoughtCo.
Dastjerdi, A.V., Tabatabaei, S.G.H. and Buyya, R. (2012).A dependency?aware ontology?based approach for deploying service level agreement monitoring services in Cloud. Software: Practice and Experience, 42(4), pp.501-518.
Dinh, H.T., Lee, C., Niyato, D. and Wang, P. (2013). A survey of mobile cloud computing: architecture, applications, and approaches. Wireless communications and mobile computing, 13(18), pp.1587-1611.
Frank, B., Poese, I., Lin, Y., Smaragdakis, G., Feldmann, A., Maggs, B., Rake, J., Uhlig, S. and Weber, R. (2013).Pushing CDN-ISP collaboration to the limit. ACM SIGCOMM Computer Communication Review, 43(3), pp.34-44.
Futter, A. (2016). War Games redux?Cyberthreats, US–Russian strategic stability, and new challenges for nuclear security and arms control’, European Security, 25(2), pp. 163-180.
Gomes, J. F., Iivari, M., Ahokangas, P., Isotalo, L., and Niemelä, R. (2017). ‘Cybersecurity Business Models for IoT-Mobile Device Management Services in Futures Digital Hospitals’, Journal of ICT Standardization, 5(1), pp.107-128.
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., and Gabrys, B. (2016). The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing and other computational intelligence, In Evolutionary Computation (CEC), 2016 IEEE Congress on(pp. 1015-1021). IEEE.
Joglekar, P., and Pise, N. (2016).Solving Cyber Security Challenges using Big Data’, International Journal of Computer Applications, 154(4) p. 1-4.
Mylrea, M. (2017). Smart energy-internet-of-things opportunities require smart treatment of legal, privacy and cybersecurity challenges’, The Journal of World Energy Law and Business, 10(2), pp. 147-158.
Shackelford, S. J. (2016). Business and cyber peace: We need you!, Business Horizons, 59(5), pp. 539-548.
Thomas, J. A., (2015). Using unstructured diaries for primary data collection.Nurse researcher, vol. 22, no. 5, pp. 25.
Turkenburg, J. P. &McAuley, K. E., (2013).Data collection and processing.ActaCrystallographica Section D, vol. 69, no. 7, pp. 1193-1194.
Vogel, R. (2016). Closing the cybersecurity skills gap, Salus Journal, 4(2), pp. 32.
Yang, S. C., and Wen, B. (2017). Toward a cybersecurity curriculum model for undergraduate business schools: A survey of AACSB-accredited institutions in the United States’, Journal of Education for Business, 92(1), pp. 1-8.