logo

Cyber Security Assignment- Business Research Methodology

15 Pages3900 Words51 Views
   

Added on  2020-03-16

Cyber Security Assignment- Business Research Methodology

   Added on 2020-03-16

ShareRelated Documents
Running head: BUSINESS RESEARCH METHODOLOGYBusiness Research Methodology: Cyber SecurityName of the Student:Name of the University:Author Note:
Cyber Security Assignment- Business Research Methodology_1
1BUSINESS RESEARCH METHODOLOGYContentsIntroduction......................................................................................................................................2Project Scope...................................................................................................................................3Project Objective.............................................................................................................................3Literature review..............................................................................................................................3Research Question...........................................................................................................................7Primary Question.........................................................................................................................7Secondary Question.....................................................................................................................7Research Design and Methodology.................................................................................................8Research Choice..........................................................................................................................8Approaches to reliability and validity..........................................................................................8Sampling......................................................................................................................................9Data Collection Method...............................................................................................................9Variables specification.................................................................................................................9Research Limitations.....................................................................................................................10Time Schedule...............................................................................................................................10Conclusion.....................................................................................................................................11Reference List................................................................................................................................13
Cyber Security Assignment- Business Research Methodology_2
2BUSINESS RESEARCH METHODOLOGYIntroductionIn this era of globalization, cyber attack has become an international concern becausethere has been many profile breaches and other security attacks which are posing threat to theeconomy. The cyber attackers are using malicious software and codes to alter the data, logic orthe computer code and this result in disruptive consequences. From internet banking togovernment infrastructure, network protection has become an important concern. This report willanalyze the various challenges which are faced by modern corporations against protecting theirdata from cyber security crimes. Cyber security refers to the protection of important businessinformation and intellectual property against misuse and theft (Best et al. 2014). This hasbecome an important and critical issue in management services in an organization. Thecompanies invest a huge amount of money to protect their data against security breaches. Thereare two types of cyber security crimes i.e. sabotage and breaches. This breach may also lead totheft of personal data, trade secrets or intellectual property rights. On the other hand, sabotageculminates service attacks. The sophisticated companies have endured the use of public breachesin their technological environment and there are many incidents are not reported. The cyberattacks may impose the companies to take various types of regulatory actions. This cyber crimewill slow down if the government and the specialists adopt serious measures. The organizationsor the companies are facing cyber security threats regardless of the business size. This paper willalso highlight the various measures which are adopted by different organizations to reduce cybersecurity crimes. The companies are trying to increase and strengthen the cyber securitycapabilities since the past few years. They are adopting various formal processes to prioritize andidentify the IT security risks and thus develop the mitigation strategies (Arabo and Pranggono2013).
Cyber Security Assignment- Business Research Methodology_3
3BUSINESS RESEARCH METHODOLOGYProject ScopeThis paper will highlight the threats which are faced by cyber security personnel’s inmanaging the database of the company. The various theories which are provided by differentexperts are also analyzed in the paper. The remedies which are taken by various organizations toprevent these breaches are also discussed in the paper. This study will also help to get a betteridea of the business operation of different cyber security companies. It will help the researcher toget an in-depth knowledge of how the cyber security crimes are conducted and also to find outthe relevant solution for it. Moreover, it will also help the researcher to develop certain softwareswhich will help in reducing the cyber security crimes (Kuypers et al. 2016). Project Objective The main objective of the report is to analyze the various problems which are faced bythe organizations in protecting their data against cyber crimes. This is done to understand theperspectives of the various companies and to understand the requirement of cyber security. Thesecondary objective is to provide suitable recommendations for the cyber security crimes. Thechallenges which are faced by different organizations will also be highlighted in the paper. Thispaper will also help in examining the level of awareness of the companies associated with cybersecurity crimes. It will also investigate how the companies identify the major crimes and protecttheir documents from threats and malwares. Moreover, it will also find out alternative and newways in reducing the crimes. Literature reviewAccording to Silvaet al. (2014), the need for cyber security is growing rapidly in thepresent days due to the importance of digital infrastructure. The hackers are attacking the bank
Cyber Security Assignment- Business Research Methodology_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
(solved) Assignment on Cyber Crime
|10
|3075
|85

HI6008 - Business Research - Cyber Security
|13
|2803
|140

Analysis of Information Security Issues - OPM Data Breach
|5
|842
|267

Changing the Job Market and Business Strategy under Cyber Security Guidance
|65
|15173
|37

Cyber Crime
|9
|1980
|464

Cybersecurity and its Importance to ABCT
|5
|959
|422