Challenges In Cyber Security For Business: Mechanisms Essay

Question:

Discuss about the Challenges in Cyber Security for Business for Mechanisms.

Answer:

Introduction

Cybersecurity is a term that includes the mechanisms that are adopted to prevent the computer systems and computer networks from the cyber attacks. In the present times, there are many concerns to security that have been recorded and observed. Also, there are various challenges that have been observed in the areas of implementation of the security protocols along with the maintenance of the same. A research proposal on the project to overcome these security challenges has been included in the document.

Project Objectives

  • Identification of the major cyber-attacks and challenges to cyber security
  • Assessment of the cyber-attacks and security issues with the aid of three case studies
  • Development and understanding of the solutions and measures that may be taken to prevent the attacks

Project Scope

  • Finalization of the topic of research
  • Completion of the literature review on the topic
  • Research proposal on the topic as Challenges in Cyber Security for Business
  • Submission of the reflective journal on the research process

Literature Review

The challenges and security issues in association with cyber security are abundant.

Lancope, an organization that has been taken over by Cisco works in the area of cyber security solutions and countermeasures. There are certain common issues and threats that the organization has developed the countermeasures for. However, with each passing day, the form of these attacks keeps on changing. Some of the advanced forms of the attacks such as Advanced Persistent Threats and many more are carried out by the attackers. The real-time attacks and threats are difficult to control and prevent. There are analytics, Business Intelligence and Deep Packet Inspection (DPI) tools that are being used by Lancope for threat identification and prevention. There are still implementation issues that have been observed in case of Lancope in terms of the speed of the flow sensors and the enhanced complexity as well (Rohde-Schwarz, 2016).

The issues and problems associated with cyber security have been analyzed and identified in the hospitality industry as well. There were five hotels in Reno, Nevada that were scrutinized on the basis of the practices that they have adapted to deal with cyber-attacks. There were various gaps that were found in terms of the security practices and protocols that were implemented. The members of staff were not aware about the possible risks and attacks and there were various cases of information breaches and leakage that were observed. The use of cyber systems and platforms is abundant in the hospitality industry and such loopholes in security provide an invitation to the attackers to easily fulfill their malevolent motives. The administrative control and the monitoring process were also not up to the mark (Shabani, 2016).

Because of these issues, there is a poor impact on the customers and clients that are engaged with the hotels.

The third case study involved the analysis of security framework for Ontario Local Distribution Company (LDCO). It is a company that works in the field of electricity and provides associated services to the users and clients. LDCO is a technically advanced firm that involves latest technologies such as smart connections and Internet of Things.

Asset management and vulnerability management are some of the major issues that have been observed in LDCO. Also, there is a lack of monitoring of the security schemes and protocols that lead to the presence of a lot many weaknesses (Herzog, 2011).

In the literature review that was carried out, the primary issues that were observed were in the form of lack of awareness and control, inability to manage the assets and the use of obsolete technologies. It is because of these reasons that the attackers find it easy to target the desired system and impact the security of the same in a negative manner.

There were also issues that were observed in terms of the management of the changes along with the problems with the implementation of the security strategies and protocols (Sharma, 2012).

Research Questions

Primary Question

  • What are the possible measures that may be implemented to prevent, detect and control the cyber security challenges and issues?

Secondary Questions

  • What architectural and infrastructural changes are required to deal with the cyber-security challenges?
  • What are the latest technical tools and systems that have been developed to avoid the cyber-attacks?
  • What are the major gaps in terms of the employees and users that enhance the likelihood of these attacks?

Research Design and Methodology

The research on the topic as Challenges in Cyber Security for Business will be carried out using a combination of qualitative and quantitative research methods.

Qualitative Research

This is the research methodology in which will include the first step as the preparation of the research. A research topic is finalized followed by listing down of the research questions as included in the section above in the form of primary and secondary questions. A literature review is carried out as the next step which has been done by including review of three case studies to understand the security challenges and issues. It is also important to understand and analyze if the research questions can be answered using qualitative method of research. In this case, it is possible to answer most of the research question using this methodology.

Sampling and determination of the sample size is the next step. In case of the qualitative research, the sample sizes are kept relatively small. There are research methodologies such as case study research, action research and grounded theory that will be applied on the samples (Farber, 2006).

There will be various data collection processes that will be used in this case such as conduction of surveys, analysis of the organizational documents and case studies, interview sessions and direct observation. These processes will bring forward the cyber security risks specific to the risk categories and will also highlight the associated impact and likelihood.

The data will then be analyzed using data analytics tools and techniques such as coding, descriptive analysis and narrative analysis. The results will then be documented.

Quantitative Research

This is the research method which is based upon the numerical data or may be used to transform the information in the form of usable statistics.

The sample sizes in this method of research are normally larger and quantification of the opinions, variables and behaviors are done. Measurable data is collected in this case for fact-finding and uncovering the patterns that are involved. Research process includes the preparation of the research along with conduction of the literature review (Fischler, 2010).

Large sample sizes are then used to carry out the research by using data collection methods for collection of measurable data. The data is then collected and analyzed using the research instruments to come up to the results.

Research Limitations

There are scenarios wherein the organizations that have become victim of the cyber-attacks in the past, do not share the information and provide the data to carry out the research. It is because of the reason that the information that is impacted and the damage that is caused remain private to certain internal members of the organization (Reddy, 2014).

There are also newer forms of cyber-security challenges that are being created and executed every day which makes it difficult to cover and analyze all the issues in complete detail.

Time Schedule – Research Plan

Task Name

Duration

Start

Finish

Challenges in Cyber Security for Business

61 days

Tue 7/25/17

Tue 10/17/17

Research Initiation

6 days

Tue 7/25/17

Tue 8/1/17

Selection of the research topic

1 day

Tue 7/25/17

Tue 7/25/17

Feasibility Analysis

2 days

Wed 7/26/17

Thu 7/27/17

Determination of the results

1 day

Fri 7/28/17

Fri 7/28/17

Presentation of the topic

1 day

Mon 7/31/17

Mon 7/31/17

Submission of the topic

1 day

Tue 8/1/17

Tue 8/1/17

Milestone One: Research Topic

0 days

Tue 8/1/17

Tue 8/1/17

Research Planning

5 days

Wed 8/2/17

Tue 8/8/17

Research scope and objectives

2 days

Wed 8/2/17

Thu 8/3/17

Research Questions to be Answered

1 day

Fri 8/4/17

Fri 8/4/17

Determination of the Research Methodology

1 day

Mon 8/7/17

Mon 8/7/17

Research Plan

1 day

Tue 8/8/17

Tue 8/8/17

Milestone Two: Research Plan

0 days

Tue 8/8/17

Tue 8/8/17

Research Execution

41 days

Tue 7/25/17

Tue 9/19/17

Literature Review

6 days

Wed 8/9/17

Wed 8/16/17

Research Proposal

10 days

Thu 8/17/17

Wed 8/30/17

Sampling Methods

7 days

Thu 8/31/17

Fri 9/8/17

Identification of Data Sources

3 days

Tue 7/25/17

Thu 7/27/17

Data Collection

7 days

Mon 9/11/17

Tue 9/19/17

Milestone Three: Literature Review and Research Proposal

0 days

Tue 9/19/17

Tue 9/19/17

Data Analysis

16 days

Wed 9/20/17

Wed 10/11/17

Analysis of the data collected

12 days

Wed 9/20/17

Thu 10/5/17

Compilation of the results

2 days

Fri 10/6/17

Mon 10/9/17

Documentation of the results

2 days

Tue 10/10/17

Wed 10/11/17

Milestone Four: Data Analysis Results

0 days

Wed 10/11/17

Wed 10/11/17

Research Presentation

4 days

Thu 10/12/17

Tue 10/17/17

Review of the Research

1 day

Thu 10/12/17

Thu 10/12/17

Incorporation of Changes

2 days

Fri 10/13/17

Mon 10/16/17

Presentation of the results

1 day

Tue 10/17/17

Tue 10/17/17

Final Submission

1 day

Tue 10/17/17

Tue 10/17/17

Milestone Five: Completion Report

0 days

Tue 10/17/17

Tue 10/17/17

Conclusion

Cyber-security has emerged as a prime area of concern for the business units and the users. There is a need to determine the major issues and risks that are associated with cyber security and develop the methods that may be applied in order to deal with these risks. It is also necessary to ensure that the users are made aware about the possible risks and threats so that the issues are prevented and controlled (Babate, 2015).

References

Babate, A. (2015). State of Cyber Security: Emerging Threats Landscape. [online] Available at: [Accessed 30 Aug. 2017].

Farber, N. (2006). Conducting Qualitative Research: A Practical Guide for School Counselors. [online] Available at: [Accessed 30 Aug. 2017].

Fischler, A. (2010). Quantitative Research Methods. [online] Available at: [Accessed 30 Aug. 2017].

Herzog, S. (2011). Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses. Journal of Strategic Security, 4(2), pp.49-60.

Reddy, G. (2014). A Study of Cyber Security Challenges and Its Emerging Trends on Latest Technologies. [online] Available at: [Accessed 30 Aug. 2017].

Rohde-Schwarz (2016). Lancope accelerates security performance and time-to-market with Dell, Rohde&Schwarz Cybersecurity & Napatech. [online] Available at: [Accessed 30 Aug. 2017].

Shabani, N. (2016). A Study of Cyber Security in Hospitality Industry - Threats and Countermeasures: Case Study in Reno, Nevada. [online] Available at: [Accessed 30 Aug. 2017].

Sharma, R. (2012). Study of Latest Emerging Trends on Cyber Security and its challenges to Society. [online] Available at: [Accessed 30 Aug. 2017].

How to cite this essay: