logo

Cyber-attack on Microsoft: Research Proposal

   

Added on  2023-01-03

12 Pages2910 Words86 Views
Cyber-attack on Microsoft
company-Research proposal
1

Table of Contents
INTRODUCTION...........................................................................................................................3
A. Task 1: Drafting a Research Proposal...........................................................................3
Research “aim”.....................................................................................................................3
Research “objective”............................................................................................................3
Research “questions”...........................................................................................................3
The issue................................................................................................................................4
Literature review based on the Cyber-attack issue on businesses...................................4
Research Methodology and ethical considerations...........................................................5
Conclusion.......................................................................................................................................9
References......................................................................................................................................11
2

INTRODUCTION
Cyber-attacks is an assault which have been launched by the the cybercriminals which
have been launched using one or more computers against the multiple networks or computers. A
cyber-attack can be able to disabled the computers, steal the data, or use a breached computer as
a launch point for other attacks. The Cybercriminals use variety of methods on the basis of
launching the cyber-attacks including malware, denial of services and other methods. The major
business issue which have been significantly figuring out is cyber-attacks on Microsoft
Corporation (Baezner, 2018).
It is one of the American multinational technology company that has a headquartered in
Washington. Cyber security is a top concern in today's world and even if talking about the
technological executives and work structure, a watch report revealed that 80% of the US
businesses have been majorly hacked successfully. It seems out to be the major and the impactful
business issue nowadays.
A. Task 1: Drafting a Research Proposal
Research “aim”
To functionally examine the impact of cyber-attack on productivity of an organisation. A
study on Microsoft company.
Research “objective”
To develop basic understanding the cyber-attack.
To explore the impact of cyber-attack on productivity of Microsoft.
To identify the effective ways that would be useful in resolving the issue of cyber-attack
on Microsoft.
Research “questions”
What are the Cyber-attacks and develop the effective understanding of cyber-attack on
the basis of trends?
How cyber-attacks can simply impact towards the productivity of Microsoft Company?
Describe some effective ways which are quiet useful is resolving the issues of cyber-
attack on Microsoft?
3

The issue
Cyber-attack is seems out to be the major issue in recent years. It is because it reflected out as a
threat of cyber bullying and struck out of all the sensitive information of the company. In relation
with the Microsoft company, has been recently facing the major threats including cloud
vulnerability, smart contract hacking, social engineering attacks, deepfake and many others.
Microsoft report shows that there is a rapid increase in certain techniques on the basis of notable
shifts and towards the credential harvesting and ransom ware, as well as increasing the focus on
the internet things. The leap sophistications in the past few years, it is very effective and
important to take some major steps of cyber space because the growing issue of hacking will
unfortunately make a growth of hackers (Trautman, 2018).
.
Literature review based on the Cyber-attack issue on businesses
The use of internet have been genuinely made the people and organisation quiet vulnerable
and effective because of the outside attacks. An author of England Mirshsa H., suggested that
cyber issues have been majorly affected the systems of information and there are different types
of malicious attacks as well including virus, spyware and the social engineering as well. The
work have been quiet effective and motivated on the basis of performing several factors which
needs to be taken into the consideration. Cyber-attacks have been majorly compared with the
critical infrastructure. The issue has been some major consequences for the country that is quiet
knowing 1/3 of the population of the world have been widely connected in various and different
platforms. It can be functionally studied that Cyberspace has a systematic power to transform the
lives of huge number of people in the world living in a country’s side.
A cyber-attack is one of the major attack which can simply assault the launched by criminals
using one or more computers against a single or the multiple computers or attacks. A cyber-
attack can simply disable the computers, steal the data, use a breached computer as a launch and
for the attacks. A Cyber-criminal uses variety of methods in launching of the malware, phishing,
denial of services, and other methods. The effective trends of the cyber-attacks includes
Software supply chain attacks on rise: The software supply chain attacks, gives a major and
typical legitimate software which helps in modifying and infecting one of the building blocks in
which the software is simply relied upon it. The software supply chain can be simply divided
4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber-attack on Microsoft company - Research Proposal
|12
|764
|90

Contemporary Issues in Crime, Safety and Security
|15
|3605
|167

Ethical Hacking: WannaCry Ransomware Attack and GDPR Implications
|8
|1826
|130

Cybercrime in Banks: Problems and Solutions in the USA
|7
|1631
|254

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

Crypto Currency and Cyber-Crime: Types of Malware, Mitigation Tools and Processes
|14
|919
|105