Challenges In Cyber Affecting For Business Essay

Questions:

What Is The Role Of Cyber Security In Providing Safety And Security To The Data Of The Business?

Which Challenges In Cyber Security Are Faced By The Business?

What Measures Can Be Adopted By The Business For Coping With These Challenges In Cyber Security?

Answers:

Introduction

This research program has been executed over the topic “Challenges in Cyber Security for Business” in which discussion has been regarding the various challenges in Cyber Security affecting the performance of the business. The focus of this research program is on analysis of these challenges in cyber security faced by a business which affects their performance at large. Different methods and techniques will be applied in this research program for the purpose of collection of reliable and authentic data. These methods of data collection have used in the collection of quality data.

Literature review

Cyber security plays a vital role in the present era as it is crucial to provide safety to the business from threats. The term cyber security can be explained as the body which includes different technologies and practices designed for the purpose of providing protection to the different programs, systems, networks from security threats to the business. The number of cases of cyber-attacks are increasing due to which the need to develop technologies has increased. These issues faced by the businesses have led a way for the digital transformation. Lack of availability of proper measures for protecting data can result in adverse impact on the confidentiality as well as financial performance of the business (Carr, 2016). Cyber-attacks can be explained as the cases where loop holes in the systems, networks, and programs are being identified by hackers for gaining benefit from them. Impact of cyber-attack cases can be seen on the national economy as well as on the global economy. Businesses are adopting strategies for ensuring the safety and security of the data of the business from misuse. Innovations are taking place in the business environment which has resulted in the development of new technologies and increase in the cases of cyber-attack (Carroll, et. al., 2014). Businesses are facing various challenges due to the cyber security. Constant efforts are being made by the IT experts for coping with these increasing cases of cyber-attacks. The existence of the business is in danger due to the increasing cyber-attacks. Cyber security measures are being adopted by the businesses for operating within a safe and secure environment. But in this dynamic business environment, there has been a rise in the number of online threats. These online threats affect the confidentiality of the business as well as create a financial loss to the business. These online threats act as a challenge for the business. These challenges in cyber security are creating an impact on the global economy (Ulsch, 2014).

Changes in the IT sector are taking place which has enhanced the performance of the business. The focus on the IT sector is on providing safety to the business from the increasing online threats. Businesses of different nature, size and structure are being targeted by the attackers for gaining access to their confidential data. Different challenges in cyber security have been identified which are creating an impact on the financial condition and performance of the business (Niglia, et. al., 2015). These challenges in cyber security include protecting passwords from unauthorized access, prevention of data from loss, encryption of disk, big data and cloud computing, digitalization, the internet, privacy laws, insider threats and USB control. These challenges need to be dealt in an effective manner so as to ensure that these challenges are not creating an impact on the performance of the business (Tyson, 2011).

An insider threat is the result of dissatisfaction among the employees of the business. Passwords or confidential information of the company may get misused by the dissatisfied employees which result in a threat to the confidentiality of the company. For coping with this issue, companies need to keep a check on the activities of employees and proper monitoring need to be done. Reasons for the dissatisfaction among the employees need to be identified and focus must be on removing these reasons resulting in dissatisfaction among employees. On the other hand, Greenwald (2013), has stated that business faces challenges due to leakage of the information of the business and this information is utilized by the hackers for their personal interest. Business must check the systems installed at regular intervals for ensuring the safety and security of the data. A shift has been identified in the real world from real world towards virtual world. Every activity of the business is carried out with the services based on the internet. This dependency on the internet has increased the threats to business due to cyber security.

With the increasing use of internet has increased online threat for the business. Every activity of the business is carried out with the help of internet and confidential of information is shared and stored on internet platforms or medium. There is a need to develop safe and secure platforms for the safety of the confidential information of the business. Personal devices are being used by the employees for accessing the professional accounts. This increase in the use of personal devices increases the chances of hacking of the software of the devices (Niglia, et. al., 2015). Privacy is the main concern for every business which must be ensured at every level. Business must ensure that employees are aware of the concept of confidentiality, online theft, and cyber-crimes so as to eliminate the cases of cyber-attack on the business. Training must be provided to the employees on regular intervals for using the devices in a safe and secure manner and not to disclose the confidential information in front of others (Jones, 2011).

These challenges create a huge impact on the performance of the business. Impact of these issues can be seen on the profitability, cost, and confidentiality of the business. For coping with these challenges, there is a need to develop a proper understanding of the cyber security and challenges which can affect the cyber security of the business (Woerner & Elfering, 2014). Internal support must be developed by the business for coping with these challenges and IT support team of the business must focus on the elimination of adverse impacts of cyber-attack over the performance of the business. Business must ensure that personal devices of the employees are tracked and secured so as to make sure that the safety measures are used (Ulsch, 2014).

Hypotheses

Research questions are being formulated with a motive to form a base for the collection of the relevant information. Research questions help in the collection of the data for the research and enhance the quality of the research executed. These research questions are used for gathering relevant data for the research and executing it in a successful manner. Research questions for this research program are listed below

  • Challenges in the cyber security affect the confidentiality of the business.
  • Cases of cyber-attacks have increased due to increasing use of internet based platforms.

Operational definitions and measurement

This research program has been executed in a planned sequence so as to make sure that all the activities are carried out in an effective manner. An action plan has been developed for ensuring the execution of the research as the plan formulated. During the execution of this research program, the focus was on a collection of quality data which ensures that the facts presented in the research are reliable and authentic. Primary and secondary sources of data collection have been used for ensuring the reliability of the data presented. This research has been executed within the specified time frame for maintaining the effectiveness of the research project. Secondary sources include articles and journals available online which were published after the year 2010. These secondary sources have been used for ensuring that current information is presented in the research. This report has developed the knowledge of the different challenges in cyber security affecting the business.

Research methodologies

Research methodology can be explained as the sum of various methods and techniques which have been applied for the execution of the research program (Turkenburg & McAuley, 2013). These methods and techniques are discussed below:

Research methods: For the purpose of collection of quality information, the mixed method will be used in this research. Mixed method is a combination of qualitative as well as quantitative method (Wilson, 2016). The questionnaire will be conducted for collecting primary data and journals and articles will be used as secondary data. Use of both these methods will help in presenting different aspects of the research in a better manner (Gorard, 2013).

Research approaches: qualitative as well as quantitative approaches will be used for executing this research program in an effective manner (Quick & Hall, 2015). Primary and secondary data will help in presenting the current data related to the research topic. Structured and semi-structured or unstructured data will be collected with the help of qualitative and quantitative approach (Nirmala, 2013).

Data collection: Data collection is an important aspect which helps in developing a better understanding of the different aspects of the research program. For the collection of data, primary and secondary sources of data collection will be used. The primary source of data collection is the raw form of data which is directly collected by the researchers (Thomas, 2015). A secondary source of data collection is the second-hand information gathered by other researchers for their work (Johnston, 2014). When it comes to reliability, the secondary source is preferred rather than the primary source.

Sampling size and Techniques: Questionnaire will be presented top 40 employees so as to gather data related to the research program. For the analysis of the collected data within the limited time frame, random sampling technique will be used. Random sampling technique will help in analyzing the data in a proper manner by providing equal opportunity to every sample of getting selected (Nishad & Sankar, 2016).

Targeted market: primary data will be collected from the employees of multi-national companies who are the part of IT support team. The questionnaire will be presented to them so as to gather data and analysis will be done on the collected data.

Choice: Different alternatives are available for conducting this research program without skipping out any important aspect. The best alternative has been selected for conducting this research program.

Ethical consideration: During the execution of this research program, the focus was on complying with the ethical aspects of ensuring the safety of the society from the activities of the research project. Different principles or values have been followed during the execution of this project including confidentiality, honesty, dignity, and unbiasedness. Confidentiality has been maintained for ensuring the safety of the confidential information of the respondents. Facts are presented in true and fair manner.

Limitations of the research: few limitations have been identified which have affected the execution process of the research. These limitations include the availability of limited timeframe for executing the project, lack of availability of sufficient resources and access to the data.

Research process

Serial no.

Activities

Initiation date

Duration (days)

Completion date

Description

A

Selection of research topic

22 August 2017

2

23 August 2017

During this step of the research process, research topic will be selected.

B

Formulating plans

24 August 2017

6

29 August 2017

Plans will be prepared for conducting the different activities of the research in a successful manner.

C

Implementation of plans

30 August 2017

8

06 September 2017

Plans will be implemented as per the previous step so as to ensure that all the aspects are considered while implementing plans.

D

Selecting sources of data collection

07 September 2017

2

08 September 2017

For the collection of data, primary as well as secondary sources of data collection are available. These sources will be analyzed for deciding which source will be used for this research program.

E

Collection of data

09 September 2017

7

15 September 2017

Data will be collected by applying the sources of data collection selected by the researcher.

F

Analysis and evaluation of the collected data

16 September 2017

4

19 September 2017

Collected data will be analyzed and evaluated so as to interpret the results from the collected data.

G

Conclusion and recommendations

20 September 2017

3

22 September 2017

The conclusion will be drawn and recommendations will be given by forming a base from the analysis and evaluation of the data.

Expected outcomes

This research has discussed the importance of cyber security for the business and challenges in cyber security for business. From the execution of this research program, it is expected that knowledge of the concept of cyber security will be developed along with the various challenges in cyber security. After completion of this research program, the impact of the various challenges in the cyber security on the business will be developed. It is an important aspect as these challenges are affecting the performance of the business. This research program has been executed with a motive to discuss the role played by cyber security for the safety, security, and confidentiality of the data of the business. After the analysis and evaluation of the different aspects, research will be able to develop knowledge of cyber security and the challenges due to change in the business environment.

Conclusion

Thus, it can be concluded that cyber-attacks are increasing due to which threat to the confidentiality of the business is increasing. This research program has discussed different challenges in cyber security which are affecting the performance of the business. Research questions have been formulated for the purpose of gathering information for the research program. All these aspects have helped in developing knowledge of the changing aspects of the business environment and their impact on the business. Different methods have been applied for the collection of data related to the research topic. Primary as well as secondary sources have been used for the collection of data.

References

Carr, M., 2016, “Public-private partnerships in national cyber-security strategies”, International Affairs, 92(1), pp.43–62.

Carroll, T., Greitzer, E. & Roberts, F., 2014, “Security informatics research challenges for mitigating cyber friendly fire”, Security Informatics, 3(1), pp.1–14.

Gorard, S., 2013, “Research design: creating robust approaches for the social sciences”, SAGE, London.

Greenwald, J., 2013, “Challenges hold up passage of federal cyber security legislation”, Business Insurance, 47(10), 17-18.

Johnston, M. P., 2014, “Secondary Data Analysis:A Method of which the Time Has Come”, Qualitative and Quantitative Methods in Libraries, pp. 619 –626.

Jones, R., 2011, “Targeted cyber-attacks top agenda: the release of classified documents by whistleblowing website Wikileaks highlights the security challenge of the digital age for companies looking to protect critical business intelligence”, MEED Middle East Economic Digest, 55(2), p.22.

Niglia, A., Muchaidze, G. & Niglia, A., 2015, “The Protection of Critical Energy Infrastructure Against Emerging Security Challenges”, IOS Press.

Nirmala, Y., 2013, “Chapter four: research design”, Language in India, vol. 13, no. 2, pp. 102.

Nishad, P. M. & Sankar, S., 2016, “Efficient random sampling statistical method to improve big data compression ratio and pattern matching techniques for compressed data”, International Journal of Computer Science and Information Security, vol. 14, no. 6, pp. 179.

Quick, J. & Hall, S., 2015, “Part three: The quantitative approach”, Journal of perioperative practice, vol. 25, no. 10, pp. 192.

Thomas, J. A., 2015, “Using unstructured diaries for primary data collection”, Nurse researcher, vol. 22, no. 5, pp. 25.

Turkenburg, J. P. & McAuley, K. E., 2013, “Data collection and processing”, Acta Crystallographica Section D, vol. 69, no. 7, pp. 1193-1194.

Tyson, D., 2011, “Security Convergence Managing Enterprise Security Risk”, Burlington: Elsevier Science.

Ulsch, M., 2014, “Cyber Threat! How to Manage the Growing Risk of Cyber Attacks (Wiley Corporate F&A)”, Hoboken: Wiley.

Wilson, V., 2016, “Research Methods: Mixed Methods Research”, Evidence Based Library and Information Practice, vol. 11, no. 1, pp. 56-59.

Woerner, R. & Elfering, D., 2014, “Execution in the Fog of War: Four Enterprise Security Challenges that Must be Addressed as Cyber War Combatants”, Security, 51(9), pp.72-74.

How to cite this essay: