logo

Cyber Security Assignment | Business Research Assignment

   

Added on  2020-06-06

9 Pages3490 Words73 Views
Business Research
Cyber Security Assignment | Business Research Assignment_1
LITERATURE REVIEW
Introduction
The aim of literature review is to provide theoretical framework to the research study. It
is most crucial part of research study where researcher identifies, analyse and examines the
articles, journals, books written by the senior scholars. Literature review helps the researcher to
give strong evidence to the research project he or she currently doing. In this context, the
literature review of present study covers the challenges faced by business organisation in
implementing cyber security in their organisation. Further, the gaps will be identified that will
aid in increasing the effectiveness of the literature review efficiently.
Scope and objectives of literature review
As information and technologies are rising rapidly which influences the management of
business organisations by increasing the efficiency in the quality of products and services. There
are various issues and challenges faced by the management of firms relating with the cyber
securities. In this context, the scope and objectives of literature review is to analyse the
challenges of cyber security faced by management of business organisation. As organisations
begins using more and more advance and integrated technologies, the issues with data leakage
and hacking increases simultaneously (Khurana and et.al., 2010). In this concern, the literature
review will help in identifying and analysing what are the reviews of other authors and senior
researchers about the issues and challenges faced by the business managers.
Cyber Security
Cyber security is the process of securing and protecting vital and essential data and
informations which are stored on the computer system of an individual or organisations. Lord
(2017) defines Cyber Security as the body of technologies, processes and practices designed to
protect networks, devices, programs and data from attack, damage or unauthorized access.
According to Wang and Lu, (2013) the inception of using digital and information technologies
gives birth to cyber criminals and hackers. These hackers can access through organisational
computers and information technological server with the help of various tools and get all the
information they desired. In order to protect the information from these thieves, management of
firms implemented cyber security in the organisation. Elmaghraby and Losavio, (2014)
enunciated from small to large, cyber security protects and secures the data stored in the
computers effectively and efficiently. In the era of digital technology, organisations and
1
Cyber Security Assignment | Business Research Assignment_2
managers investing heavily in order to digitise their premises by installing high tech computer
systems. This helps in increasing the effectiveness in the quality of management and products.
Wells and et.al., (2014) contends that cyber security plays crucial and important role by
protecting vital information stored in the database and computer systems. From encrypting data
on drives to protecting information on cloud servers, cyber security helps in securing the data
from hackers and cyber criminals. There are various elements of cyber security such as
application security, network security, end user education, operational security, business
continuity planning and information security. According to Rouse, (2017) one of the most
problematic elements of cybersecurity is the rapidly and constantly evolving nature of security
risk. The traditional approach has been to focus most resources on the most crucial system
components and protect against the biggest known threats, which necessitated leaving some less
important system components undefended and some less dangerous risks not protected against.
Thus, there are many challenges faced by the business organisation related with cyber security
(Wang and et.al., 2010).
Cyber security challenges
Baheti and Gill, (2011) contends that every minute, a company gets hit by malware and
spyware. These are created by cyber criminals in order to steal the organisational data and
information. Malicious software or malware are programs or files that is hazardous to the user of
computer. It includes viruses, trojans, worms and spyware. Li and et.al., (2012) enunciated that
since the evolution of internet and hybrid technologies, management of business firms
implementing high tech information systems in their organisations in order to promulgate their
productivity and profitability. By using information technologies and system, organisations
create immense opportunities which helps them to sustain in the competitive environment and
maximise their customer base. Liu and et.al., (2012) said that from marketing to human resource
management and from production to packaging and dispatching, information systems and
computers assists employees and employers greatly. It helps them to reduce their efforts, cost
and time and leads the organisation on the path towards growth and development. As per Wang
and et.al., (2010) with the increase in cloud computing and remote systems, organisations stores
data range from gigabytes to terabytes on the servers. The data contains information about their
employees, company records, confidential data, etc. In order to protect and secure the data and
information, managers implemented cyber security systems. Cyber security is the process of
2
Cyber Security Assignment | Business Research Assignment_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security in the Business Organisation
|9
|2858
|89

Impacts of Computer Crimes and Misuse on Users, Companies, and Society
|13
|4227
|329

Introduction to Cyber Security
|14
|3209
|388

Challenges in Cyber Security for Business 7 Running Head: Challenges in Cyber Security for Business 7 Running Head: Challenges in Cyber Security for Business 7 Running Head: Challenges in Cyber Securi
|12
|3221
|498

Data Analytics and Consulting Organisations : Essay
|18
|6002
|54

Assignment on Cyber Secuirty
|5
|883
|29