logo

Cyber Security in Business Research Method

   

Added on  2020-03-04

14 Pages3517 Words493 Views
Running head: BUSINESS RESEARCH METHOD
Business Research Method
Name of the Student
Name of the University
Author Note
Cyber Security in Business Research Method_1
1BUSINESS RESEARCH METHOD
Table of Content
Literature Review............................................................................................................................2
1.1 Introduction................................................................................................................................2
1.2 Management of Cyber Security risk..........................................................................................3
1.3 Major actors in cyber-security...................................................................................................4
1.4 Price of Cyber attack.................................................................................................................6
1.5 The threat landscape..................................................................................................................7
1.6 Internal cooperation...................................................................................................................7
1.7 A look to the future....................................................................................................................9
1.8 Gaps in the literature................................................................................................................10
References list................................................................................................................................12
Cyber Security in Business Research Method_2
2BUSINESS RESEARCH METHOD
Topic- Challenges in Cyber security for Business
Literature Review
1.1 Introduction
It has been identified that challenges in cyber security are developing on a daily basis.
Even though, the organizations are in the rush of developing their strategies to protect their
confidential information, the flaws always remain. The negligence to single occurrence could
lead to a significant failure. It has also been identified that Information technology sector has
evolved widely over the last half century. Over the past several years, the experts as well as the
policymakers have expressed an increasing concern regarding the ICT system from cyber attack.
Hence, the cyber attack means the international access to unauthorized data- such as damaging,
tempering file and stealing significant information.
It has also been observed that cyber security is also conflated inappropriately in public
discussion with other concepts such as privacy, information exchange and sharing, intelligence,
gathering and surveillance. In this context, Wang and Lu (2013) commented that privacy is
associated with the ability of an individual member to have control over the access by others. A
developed cyber security could help to protect the privacy in an electronic environment;
however, the information that is shared to assist in cyber security efforts could sometimes
contain personal information. This section of research provides a critical discussion regarding the
challenges of cyber security on business. A critical analysis has been conducted considering
some particular journals articles that have been conducted on cyber security challenges and its
impact on the business.
Cyber Security in Business Research Method_3
3BUSINESS RESEARCH METHOD
1.2 Management of Cyber Security risk
The studies on cyber security claim that risk associated with any particular attack could
depend on three significant factors such as threats, vulnerabilities and impact. Hence, Yan et al.
(2012) commented that the management of risk to information system is usually considered as
the core base to enhanced cyber security. The existing journals claim that the individuals who
actually perform the cyber attack are largely cited as falling into one or more categories such as –
the criminals intention on monetary benefits from the crime and extortion. In addition, the spies
may steal classified or proprietary information utilized by the government.
Vulnerabilities
As put forward by Choo (2011), there is an ongoing battle in between the attackers and
defenders. It has been studied that Information Technology systems are continuously investing
the weaknesses that could take place at several areas. The defenders have been observed to be
protecting against the weakness but three significant aspects are significantly challenging such as
deliberate act by the insiders along with an access to a system, supply chain vulnerabilities,
which allows the insertion of malicious software at the time of acquisition process and zero-day
vulnerability (Li et al. 2012).
Impacts
It is often observed a successful attack could compromise the confidentiality, availability
of an ICT system, integrity and other significant information to deal with it (Sridhar, Hahn &
Govindarasu 2012). Cyber theft could result in exfiltration of financial and personal information
from which the attackers could gain the advantages. It is further studied that denial-of-service
attacks could slow down or restrict the legitimate users from accessing a system. Likewise, the
Cyber Security in Business Research Method_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
HI6008 - Business Research - Cyber Security
|13
|2803
|140

Emerging Threats.
|5
|462
|82

Research on Cyber Security for Business
|18
|2405
|240

cyber Attack presentation 2022
|11
|796
|49

Cyber Security Prevention and Detection
|9
|1711
|42

Importance of Cyber Security in Retail Industry
|21
|7572
|72