logo

HI6008 Assignment 2 Requirement

   

Added on  2019-11-08

12 Pages2755 Words166 Views
2017Assignment on Business ResearchAssignment on Business Research

Contents1.Introduction.........................................................................................................................22.Project Objective.................................................................................................................23.Project Scope......................................................................................................................24.Literature Review...............................................................................................................25.Research question:..............................................................................................................3Primary question:....................................................................................................................3Secondary Question................................................................................................................36.Research Hypothesis...........................................................................................................47.Research Design ad methodology.......................................................................................6Qualitative Research...............................................................................................................6Quantitative Research.............................................................................................................78.Research Limitation............................................................................................................79.Time Schedule of the research plan....................................................................................810.Conclusion.......................................................................................................................911.References.......................................................................................................................91

1.IntroductionThe cyber-security is the set of standards and principles used for securing digital environment. It helps in safeguarding the digital infrastructure from cyber-attack. The cyber-criminal activities are mainly associated with the fetching of the confidential information of the user, manipulation and modification in the information available on the internet, controlling of business activities, and many other (Tong, 2013). The step should be taken to provide prevention control mechanism for overcoming and resolving the issues associated with the digital activities performed on the internet. The cyber security strategies should be built for getting best quality result of resolving security issues. The technological devices should be placed with the international standards for preventing the system for cyber-criminalactivities. 2.Project ObjectiveThe objective of the project is to research on the need of cyber security parameters. The increasing rate of cyber-crime affects the working of the organization. The research should beorganized which helps in developing the key parameters of security for preventing loss of data due to the occurrence of cyber-crime activity. The research helps in determining the prevention methods which plays an important role in providing solution to the security problems. 3.Project ScopeThe research scope is to analyse the cyber-security system and the prevention methods which should be taken to make secure the system with the deployment of vulnerabilities and other associated attacks. The focus should be given on analysing the cyber-crimes occurrence and the impact, countermeasures used for securing the system, and cyber threats associated with the security infrastructure. 4.Literature ReviewThe analysis of various research papers and articles has been done to carry over the research study on determining the facts and figures associated with the cyber-security (Faris, 2010). The online and offline resources are used for collecting data on cyber –crimes and proactive action plan which should be taken by the experts. The cyber-crime can be conducted at 2

international level by the cyber-criminals. The innovation in the field of digital life increases the activity of cyber-crime. Hacking and phishing are the major attacks which are associated with digital world. The cyber-criminal activities are mainly associated with the fetching of the confidential information of the user, manipulation and modification in the information available on the internet, controlling of business activities, and many other (Edgar, 2010). The contamination of the system can be resolved with the use of cyber security system. The capacity of the system can be enhanced with the use digital security method. The one time password generation is the effective technique used for securing the system. The cyber security guidelines and principles should be used for expanding the security policies of the organization. The innovation in the cyber-security helps in resolving the issues of cyber-crime. The risks management plan helps in identifying the threats and risks associated with the digital network. The cyber-security is the set of standards and principles used for securingdigital environment. It helps in safeguarding the digital infrastructure from cyber-attack. The subsequent risks mitigation plans should be developed according to the identified risks. The expertise in cyber security helps in managing the security issues of the digital tools and technologies. The cyber security strategies should be built for getting best quality result of resolving security issues. The cyber security challenges which come forth are categorised as hacking, phishing attack, virus and malware attack, and other. The intrusion detection and prevention method should be used for developing the security framework for the organization. The loss of the data can be minimized with the use of intrusion detection and prevention method and other security measures within the curriculum of the organization5.Research question:The research questions helps in taking the research in right direction. The research questions which are undertaken to perform the research activities are depicted below:Primary question:What are the preventive and control measures taken to overcome the situation of security threats?Secondary QuestionWhat are the devices and activities which should be protected against the occurrence of cyber-criminal offence?What is the reason behind the success of the intrusion?3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
The Potential Consequences of Politically Motivated Hacking and Evaluation of Current Defense System
|11
|3363
|289

Information Security Assignment Sample (pdf)
|10
|3084
|33

Professional Issues in Computing - Assignment
|5
|774
|82

Challenges of Cyber Security on Business Performances
|18
|3599
|35

HI6008 - Business Research on Cyber Security
|19
|3876
|330

Cyber Crime in Pakistan: Issues, Challenges, and Countermeasures
|10
|1948
|284