Cyber Security Challenges and Solutions
VerifiedAdded on 2020/02/24
|11
|2493
|93
AI Summary
This assignment analyzes the persistent challenges faced by cybersecurity professionals in a constantly changing digital landscape. It highlights the limitations of traditional security measures and emphasizes the need for innovative real-time solutions to combat emerging cyber threats. The document draws upon scholarly research and industry perspectives to provide a comprehensive understanding of the complexities and future directions in cybersecurity.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Challenges in Cyber Security Business of Thales Group
Name of the Student:
Name of the University:
Author’s Note
Challenges in Cyber Security Business of Thales Group
Name of the Student:
Name of the University:
Author’s Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Contents
Introduction......................................................................................................................................2
Scope and Objectives.......................................................................................................................3
Literature review and comparative study........................................................................................4
Quality of Source and article used...................................................................................................7
Gap in Literature..............................................................................................................................8
Conclusion.......................................................................................................................................8
Reference List................................................................................................................................10
Contents
Introduction......................................................................................................................................2
Scope and Objectives.......................................................................................................................3
Literature review and comparative study........................................................................................4
Quality of Source and article used...................................................................................................7
Gap in Literature..............................................................................................................................8
Conclusion.......................................................................................................................................8
Reference List................................................................................................................................10
2CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Introduction
In this era of globalization, cyber security business is very popular and there are different
areas of expansion in this business venture. The cyber security specialist works in co-ordination
with the different teams to identify the different types of security gaps which are to be addressed.
The cyber security professionals provide an effective solution for mitigating the various kinds of
risks which are essential to be taken before starting the project (Machi and McEvoy 2016). In
this paper we will discuss the challenges which are faced by the Thales Group. It will also
highlight the gap in the research work. This will help to continue the studies in the future by
identifying the gap correctly. The literature review will be drawn from those studies which are
related to the topic. This will help to make an in-depth comparison of the various literatures and
a critical analysis of this literature review will also be done.
Thales is a cyber security company in Australia and it has different branches in many
countries. It can be considered as a global leader in cyber security business. The company has
more than 1500 cyber security experts and they handle different kinds of securities in different
countries. The company provides cryptographic security in varied fields such as banking and
insurance, satellite network transportation, high technologies, military and government
infrastructures. The company works in collaboration and partnership with the many other
companies. Australia was the main target for malware in 2016 and these cyber security agencies
had to play an important role in such a critical situation. Thales also developed various programs
in cyber risk management which helps to fulfill the objectives, compliances, industry standards
and policies ( thalesgroup.com 2017).
Introduction
In this era of globalization, cyber security business is very popular and there are different
areas of expansion in this business venture. The cyber security specialist works in co-ordination
with the different teams to identify the different types of security gaps which are to be addressed.
The cyber security professionals provide an effective solution for mitigating the various kinds of
risks which are essential to be taken before starting the project (Machi and McEvoy 2016). In
this paper we will discuss the challenges which are faced by the Thales Group. It will also
highlight the gap in the research work. This will help to continue the studies in the future by
identifying the gap correctly. The literature review will be drawn from those studies which are
related to the topic. This will help to make an in-depth comparison of the various literatures and
a critical analysis of this literature review will also be done.
Thales is a cyber security company in Australia and it has different branches in many
countries. It can be considered as a global leader in cyber security business. The company has
more than 1500 cyber security experts and they handle different kinds of securities in different
countries. The company provides cryptographic security in varied fields such as banking and
insurance, satellite network transportation, high technologies, military and government
infrastructures. The company works in collaboration and partnership with the many other
companies. Australia was the main target for malware in 2016 and these cyber security agencies
had to play an important role in such a critical situation. Thales also developed various programs
in cyber risk management which helps to fulfill the objectives, compliances, industry standards
and policies ( thalesgroup.com 2017).
3CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Scope and Objectives
The study carried out in this paper will highlight the challenges which are faced by
Thales group in managing cyber security. It will primarily study in details about the fields here
cyber security programs are used. The study will also highlight the major problems which are
faced by Thales group in the operation of its business. In the entire Asia Pacific region, Australia
had the highest number of downloads of malware and thus it was the main target for different
cyber and criminal attacks (thalesgroup.com 2017). This was due to higher growth of technology
accompanied with higher economic growth. This study will also help in the identification of the
critical data and provide backup to different fields which was threatened by malware. This area
of study is very important as it will help to analyze the challenges and the problems in one of the
leading businesses. Thales also helps the government to protect important documents.
The main objectives of the literature review in context of the various challenges which are
faced by Thales Group are as follows:
To analyze and identify the problems and challenges faced by the earlier researchers in
conducting the research successfully (Neuman, 2016).
To study and compare the different articles which are submitted by the earlier researchers
on the same area of study (Machi and McEvoy 2016).
To find out the gaps and the shortcomings in conducting the research successfully so that
it becomes easier for the detailed study and thus the research can be carried out
successfully (Booth, Sutton and Papaioannou 2016).
To find out new methods and procedures for conducting the study successfully in the
future (Van den Bergh et al. 2013).
Scope and Objectives
The study carried out in this paper will highlight the challenges which are faced by
Thales group in managing cyber security. It will primarily study in details about the fields here
cyber security programs are used. The study will also highlight the major problems which are
faced by Thales group in the operation of its business. In the entire Asia Pacific region, Australia
had the highest number of downloads of malware and thus it was the main target for different
cyber and criminal attacks (thalesgroup.com 2017). This was due to higher growth of technology
accompanied with higher economic growth. This study will also help in the identification of the
critical data and provide backup to different fields which was threatened by malware. This area
of study is very important as it will help to analyze the challenges and the problems in one of the
leading businesses. Thales also helps the government to protect important documents.
The main objectives of the literature review in context of the various challenges which are
faced by Thales Group are as follows:
To analyze and identify the problems and challenges faced by the earlier researchers in
conducting the research successfully (Neuman, 2016).
To study and compare the different articles which are submitted by the earlier researchers
on the same area of study (Machi and McEvoy 2016).
To find out the gaps and the shortcomings in conducting the research successfully so that
it becomes easier for the detailed study and thus the research can be carried out
successfully (Booth, Sutton and Papaioannou 2016).
To find out new methods and procedures for conducting the study successfully in the
future (Van den Bergh et al. 2013).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
4CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Literature review and comparative study
“A study of cyber security challenges and its emerging trends on latest technologies”
According to Reddy and Reddy (2014), cyber security measures and privacy of data are
the important issues which are to be taken care of by an organization. There are various attacks
on the smart phone everyday and the emerging technologies have to help them not to increase in
a rapid scale. There are also various attacks on the web application system which are used to
extract different types of private information or sometimes for the distribution of malicious
software. The cyber criminals try to distribute the different malicious viruses into the system
through legitimate web servers. The web servers are trying to protect the criminals in stealing
various kinds of software. Cloud computing is also one of the most important challenges for the
cyber security personnel. When there is large number of applications in the cloud system, various
policy measures must be evolved quickly so that it helps in preventing the loss of data. The cloud
services rev trying to build up their own security system but there are various issues which are
associated. Thus, the cyber security professionals must take care of this cloud computing system.
The cyber security professionals must adopt various kinds of techniques for proper security of
the database. There are certain ethics which must also be followed while the business
professionals are running these businesses. The Advanced Persistent Threat (APT) has also
helped the network security personnel in web filtering or identifying the hackers. The network
securities must help in the integration of different types of security system in order to identify the
hackers. Encryption can also be used to secure and protect the data and the data can be
transferred via the network. Encryption helps to protect the data at the initial level and also to
secure the data. It also helps in the prevention of leakage of information.
“Challenges at the Intersection of Cyber Security and Space Security”
Literature review and comparative study
“A study of cyber security challenges and its emerging trends on latest technologies”
According to Reddy and Reddy (2014), cyber security measures and privacy of data are
the important issues which are to be taken care of by an organization. There are various attacks
on the smart phone everyday and the emerging technologies have to help them not to increase in
a rapid scale. There are also various attacks on the web application system which are used to
extract different types of private information or sometimes for the distribution of malicious
software. The cyber criminals try to distribute the different malicious viruses into the system
through legitimate web servers. The web servers are trying to protect the criminals in stealing
various kinds of software. Cloud computing is also one of the most important challenges for the
cyber security personnel. When there is large number of applications in the cloud system, various
policy measures must be evolved quickly so that it helps in preventing the loss of data. The cloud
services rev trying to build up their own security system but there are various issues which are
associated. Thus, the cyber security professionals must take care of this cloud computing system.
The cyber security professionals must adopt various kinds of techniques for proper security of
the database. There are certain ethics which must also be followed while the business
professionals are running these businesses. The Advanced Persistent Threat (APT) has also
helped the network security personnel in web filtering or identifying the hackers. The network
securities must help in the integration of different types of security system in order to identify the
hackers. Encryption can also be used to secure and protect the data and the data can be
transferred via the network. Encryption helps to protect the data at the initial level and also to
secure the data. It also helps in the prevention of leakage of information.
“Challenges at the Intersection of Cyber Security and Space Security”
5CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
According to Baylon (2014), there are certain security concerns which are faced by the
cyber security personnel. There are certain challenges are associated with the growing number
of militarization and it includes various economic factors which are contributing in this field.
There is lack of inadequacy of data in the various documents in cyber spheres. The use of dual
technology in the military field is preventing other technologies in implementing the adequate
measures which are used for verification of the other feasible and non-feasible technologies. In
case of cyber domain in defensive activities, there must be a penetration of a wide network area.
There are certain important steps which are to be followed in carrying out the cyber security
activities. Moreover, the most important challenge for cyber security personnel is to prevent the
attack because it is very easier and cheaper to attack the network of a particular country. It is
vital to identify the different kinds of patches which are involved in identification of all the
important vulnerabilities. The term cyber security space is misunderstood because it includes
offensive and punishable actions in the military domain. There is an important boundary which
helps to distinguish between the military weapon and the civilian usage. Some important
hardware and software which are used to transform the missile in case of cyber warfare must be
taken care of by the cyber security professionals. It is crucial to attain control of the critical
infrastructure because there are certain malicious codes and if they attack the vital system, it will
cause a massive explosion and there will be a great disaster. The various social networking sites
such as Facebook and Twitter may also be considered as a weapon and threat because they are
used to criticize the government on a large scale. Though the cyber space sector is expanding
tremendously, but they are interconnected with the space security. It is important to analyze and
identify the cyber threats in various space assets and satellites. These rely on the various ground
stations, satellites and other space assets which are dependent on the internet. They also rely on
According to Baylon (2014), there are certain security concerns which are faced by the
cyber security personnel. There are certain challenges are associated with the growing number
of militarization and it includes various economic factors which are contributing in this field.
There is lack of inadequacy of data in the various documents in cyber spheres. The use of dual
technology in the military field is preventing other technologies in implementing the adequate
measures which are used for verification of the other feasible and non-feasible technologies. In
case of cyber domain in defensive activities, there must be a penetration of a wide network area.
There are certain important steps which are to be followed in carrying out the cyber security
activities. Moreover, the most important challenge for cyber security personnel is to prevent the
attack because it is very easier and cheaper to attack the network of a particular country. It is
vital to identify the different kinds of patches which are involved in identification of all the
important vulnerabilities. The term cyber security space is misunderstood because it includes
offensive and punishable actions in the military domain. There is an important boundary which
helps to distinguish between the military weapon and the civilian usage. Some important
hardware and software which are used to transform the missile in case of cyber warfare must be
taken care of by the cyber security professionals. It is crucial to attain control of the critical
infrastructure because there are certain malicious codes and if they attack the vital system, it will
cause a massive explosion and there will be a great disaster. The various social networking sites
such as Facebook and Twitter may also be considered as a weapon and threat because they are
used to criticize the government on a large scale. Though the cyber space sector is expanding
tremendously, but they are interconnected with the space security. It is important to analyze and
identify the cyber threats in various space assets and satellites. These rely on the various ground
stations, satellites and other space assets which are dependent on the internet. They also rely on
6CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
other cyber networks for different kinds of functions and thus they become vulnerable to
different cyber attacks. The internet enabled critical information is dependent on the satellites for
operation and information and thus it is more attractive for various kinds of cyber attacks. There
might also be various kinds of disruption in internet communication from different
communication satellites which will hinder the services from GPS satellites or other important
infrastructure which are dependent on them.
“On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security
Education”
According to Berg et al. (2014), with the development of cyberspace, the focus on the
various kinds of information security such as availability of information, integrity and
confidentiality needs to be taken care of. Various risks are to be taken in the management of
cyber security business focuses on the different layers of cyberspace. The cyber risk is a broad
area of the IT dependent risks and there are many cyber actors in various domains which gets
exposure while performing the cyber activities. The organizations also need to co-operate with
the supply chain networks, various actors at the global stage, critical infrastructure and many
others. It is also important to assess and identify the various kinds of cyber risks and also
determine the acceptable level of all these risks. A specific design must be set to find out
repressive and preventive measures for reducing them at an acceptable level.
“Emerging Security challenges of Cloud Virtual infrastructure”
According to Ibrahim, Hamlyn-Harris and Grundy (2016), there are certain challenges
which are changing the cloud computing system. The security responsibility in cloud computing
is not a single sided measure. The security software needs to be properly handled because it is
other cyber networks for different kinds of functions and thus they become vulnerable to
different cyber attacks. The internet enabled critical information is dependent on the satellites for
operation and information and thus it is more attractive for various kinds of cyber attacks. There
might also be various kinds of disruption in internet communication from different
communication satellites which will hinder the services from GPS satellites or other important
infrastructure which are dependent on them.
“On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security
Education”
According to Berg et al. (2014), with the development of cyberspace, the focus on the
various kinds of information security such as availability of information, integrity and
confidentiality needs to be taken care of. Various risks are to be taken in the management of
cyber security business focuses on the different layers of cyberspace. The cyber risk is a broad
area of the IT dependent risks and there are many cyber actors in various domains which gets
exposure while performing the cyber activities. The organizations also need to co-operate with
the supply chain networks, various actors at the global stage, critical infrastructure and many
others. It is also important to assess and identify the various kinds of cyber risks and also
determine the acceptable level of all these risks. A specific design must be set to find out
repressive and preventive measures for reducing them at an acceptable level.
“Emerging Security challenges of Cloud Virtual infrastructure”
According to Ibrahim, Hamlyn-Harris and Grundy (2016), there are certain challenges
which are changing the cloud computing system. The security responsibility in cloud computing
is not a single sided measure. The security software needs to be properly handled because it is
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
7CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
affecting the performance of the security software. It is difficult to trap the various kinds of
activities because it requires a huge amount and thus it is an important challenge for the cyber
security personnel. The capacity to detect the zero threat is also a major challenge for them.
These security threats are trying to increase the creativity and complexity because it is difficult to
trap and predict the hackers. It is important to monitor those activities on a real time basis
because there are different types of cloud computing activities and it becomes difficult to keep a
close monitoring of all the activities. There are certain techniques that focus on the protected
behavioral system rather than focusing on the threat. This is considered as a potential approach
and it will help in detecting the zero threat with a low rate of negative and positive approaches.
Quality of Source and article used
Name of the
author(s)
Date Findings
Reddy and Reddy 2014 The author has stated that there are certain
important cyber security and privacy measures
which are to be taken care of the organization.
Baylon 2014 There are certain security concerns which are to
be faced by the security personnel.
Berg et al. 2014 Various risks are to be taken in the management
of cyber security business focuses on the different
layers of cyberspace
Ibrahim, Hamlyn-
Harris and Grundy
2016 There are certain challenges which are changing
the cloud computing system. There are certain
techniques that focus on the protected behavioral
affecting the performance of the security software. It is difficult to trap the various kinds of
activities because it requires a huge amount and thus it is an important challenge for the cyber
security personnel. The capacity to detect the zero threat is also a major challenge for them.
These security threats are trying to increase the creativity and complexity because it is difficult to
trap and predict the hackers. It is important to monitor those activities on a real time basis
because there are different types of cloud computing activities and it becomes difficult to keep a
close monitoring of all the activities. There are certain techniques that focus on the protected
behavioral system rather than focusing on the threat. This is considered as a potential approach
and it will help in detecting the zero threat with a low rate of negative and positive approaches.
Quality of Source and article used
Name of the
author(s)
Date Findings
Reddy and Reddy 2014 The author has stated that there are certain
important cyber security and privacy measures
which are to be taken care of the organization.
Baylon 2014 There are certain security concerns which are to
be faced by the security personnel.
Berg et al. 2014 Various risks are to be taken in the management
of cyber security business focuses on the different
layers of cyberspace
Ibrahim, Hamlyn-
Harris and Grundy
2016 There are certain challenges which are changing
the cloud computing system. There are certain
techniques that focus on the protected behavioral
8CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
system rather than focusing on the threat
Gap in Literature
There are various scholars and authors who have pointed out the challenges in cyber
security measures. These challenges are faced by all the organizations that are running various
businesses. The cyber security professionals must adopt various kinds of techniques for proper
security of the database. The cyber risk is a broad area of the IT dependent risks and there are
many cyber actors in various domains which gets exposure while performing the cyber activities.
Conclusion
Thus, it can be said that there are certain security challenges and it is impossible to take
various security measures until there is any improvement in the virtual environment. The
traditional security measures in the virtual environment may not match up because of the ever
changing and dynamic nature of the various cyber security measures. There must be a provision
for new security solutions which must provide real time decisions o protection of various kinds
of threats. The disruptive and the latest technology associated with the various kinds of cyber
tools and threats are very challenging for the organization.
system rather than focusing on the threat
Gap in Literature
There are various scholars and authors who have pointed out the challenges in cyber
security measures. These challenges are faced by all the organizations that are running various
businesses. The cyber security professionals must adopt various kinds of techniques for proper
security of the database. The cyber risk is a broad area of the IT dependent risks and there are
many cyber actors in various domains which gets exposure while performing the cyber activities.
Conclusion
Thus, it can be said that there are certain security challenges and it is impossible to take
various security measures until there is any improvement in the virtual environment. The
traditional security measures in the virtual environment may not match up because of the ever
changing and dynamic nature of the various cyber security measures. There must be a provision
for new security solutions which must provide real time decisions o protection of various kinds
of threats. The disruptive and the latest technology associated with the various kinds of cyber
tools and threats are very challenging for the organization.
9CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Reference List
Baylon, C., 2014. Challenges at the Intersection of Cyber Security and Space
Security. International Security.
Booth, A., Sutton, A. and Papaioannou, D., 2016. Systematic approaches to a successful
literature review. Sage.. Systematic approaches to a successful literature review. Sage.
Ibrahim, A.S., Hamlyn-Harris, J. and Grundy, J., 2016. Emerging security challenges of cloud
virtual infrastructure. arXiv preprint arXiv:1612.09059.
Machi, L.A. and McEvoy, B.T., 2016. The literature review: Six steps to success. Corwin Press.
Neuman, W. L. (2016). Understanding research. Pearson.
Reddy, G.N. and Reddy, G.J., 2014. A Study of Cyber Security Challenges and its emerging
trends on latest technologies. arXiv preprint arXiv:1402.1842.
thalesgroup.com 2017. Thales Group. [online] Available at:
https://www.thalesgroup.com/en/global/activities/security/critical-information-systems-and-
cybersecurity [Accessed 8 Sep. 2017].
Van den Berg, J., Van Zoggel, J., Snels, M., Van Leeuwen, M., Boeke, S., van de Koppen, L.,
Van der Lubbe, J., Van den Berg, B. and De Bos, T., 2014. On (the Emergence of) Cyber
Security Science and its Challenges for Cyber Security Education. In Proceedings of the NATO
IST-122 Cyber Security Science and Engineering Symposium (pp. 13-14).
Reference List
Baylon, C., 2014. Challenges at the Intersection of Cyber Security and Space
Security. International Security.
Booth, A., Sutton, A. and Papaioannou, D., 2016. Systematic approaches to a successful
literature review. Sage.. Systematic approaches to a successful literature review. Sage.
Ibrahim, A.S., Hamlyn-Harris, J. and Grundy, J., 2016. Emerging security challenges of cloud
virtual infrastructure. arXiv preprint arXiv:1612.09059.
Machi, L.A. and McEvoy, B.T., 2016. The literature review: Six steps to success. Corwin Press.
Neuman, W. L. (2016). Understanding research. Pearson.
Reddy, G.N. and Reddy, G.J., 2014. A Study of Cyber Security Challenges and its emerging
trends on latest technologies. arXiv preprint arXiv:1402.1842.
thalesgroup.com 2017. Thales Group. [online] Available at:
https://www.thalesgroup.com/en/global/activities/security/critical-information-systems-and-
cybersecurity [Accessed 8 Sep. 2017].
Van den Berg, J., Van Zoggel, J., Snels, M., Van Leeuwen, M., Boeke, S., van de Koppen, L.,
Van der Lubbe, J., Van den Berg, B. and De Bos, T., 2014. On (the Emergence of) Cyber
Security Science and its Challenges for Cyber Security Education. In Proceedings of the NATO
IST-122 Cyber Security Science and Engineering Symposium (pp. 13-14).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
10CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Van den Bergh, J., Beliën, J., De Bruecker, P., Demeulemeester, E. and De Boeck, L., 2013.
Personnel scheduling: A literature review. European Journal of Operational Research, 226(3),
pp.367-385.
Van den Bergh, J., Beliën, J., De Bruecker, P., Demeulemeester, E. and De Boeck, L., 2013.
Personnel scheduling: A literature review. European Journal of Operational Research, 226(3),
pp.367-385.
1 out of 11
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.