Cybersecurity Threats and Business Survival

Verified

Added on  2020/03/16

|16
|2503
|42
AI Summary
This assignment examines the growing threat of cyber attacks to businesses. It outlines a research proposal framework that delves into various aspects of cybersecurity challenges faced by businesses today. The proposal covers stages like literature review, methodology selection, and data analysis, emphasizing the need for robust cybersecurity measures to protect sensitive information and ensure business sustainability.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Challenges in Cybersecurity for Businesses 1
CHALLENGES IN CYBERSECURITY FOR BUSINESSES
by [Name]
Course
Professor’s Name
Institution
Location of Institution
Date

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Challenges in Cybersecurity for Businesses 2
TABLE OF CONTENTS
1.0 Introduction...........................................................................................................................................3
2.0 Project Objective...................................................................................................................................4
3.0 Project Scope.........................................................................................................................................4
4.0 Literature Review..................................................................................................................................5
4.1 Introduction.......................................................................................................................................5
4.2 Challenges in cybersecurity...............................................................................................................5
4.21 Phishing attacks...........................................................................................................................5
4.22 Network probes............................................................................................................................5
4.23 Brute force cracking....................................................................................................................6
4.24 Malware and ransomware............................................................................................................6
4.25 Structured Query Language (SQL) injection attacks...................................................................7
4.26 Man in the Middle (MITM) attacks.............................................................................................7
4.27 Denial-of-Service (DoS) attacks..................................................................................................7
4.3 Mitigation measures that offer effective security semantics for businesses.......................................8
4.31 Providing stronger authentication................................................................................................8
4.32 Accelerating efforts in managing traffic......................................................................................8
4.33 Testing vulnerability metrics and management............................................................................8
4.34 Upgrading security and validation testing....................................................................................8
4.4 Research gap......................................................................................................................................9
5.0 Research Questions...............................................................................................................................9
5.1 Primary Question...............................................................................................................................9
5.2 Secondary Questions.........................................................................................................................9
6.0 Research Design and Methodology.......................................................................................................9
6.1 Research design.................................................................................................................................9
6.2 Sampling..........................................................................................................................................10
6.3 Sample Size and target population...................................................................................................10
6.4 Data Collection Method...................................................................................................................10
6.5 Reliability........................................................................................................................................11
6.6 Validity............................................................................................................................................11
7. 0 Research Limitations..........................................................................................................................11
8.0 Time Schedule (Research plan)...........................................................................................................12
9.0 Conclusion...........................................................................................................................................12
Document Page
Challenges in Cybersecurity for Businesses 3
10.0 References.........................................................................................................................................13
11.0 Appendix...........................................................................................................................................15
11.1 Cybersecurity threats data..............................................................................................................15
11.2 Illustration of Man in the Middle (MITM) Attacks........................................................................16
Document Page
Challenges in Cybersecurity for Businesses 4
1.0 Introduction
In many businesses currently, cybersecurity is becoming a very important aspect of the
daily operations. Owing to the increasing level of technology, many businesses are taking their
operations online. Some store their data in the clouds and some adopting a virtual business
platform. Besides, in the quest to expand operations, businesses are opening new branches in
other countries, with central operations taking place in the head office. As such, these moves
expose these businesses to threats such as hacking which in most cases interfere with systemic
operations and loss of confidential data (Wang and Lu 2013). For example, Google lost some of
its confidential data and patent rights in their Headquarters in China in 2009 when hackers
infiltrated into their system. This research proposal introduces all possible vulnerabilities that
businesses are susceptible to in an operational business framework.
2.0 Project Objective
The primary objective of this proposal is to examine the challenges that businesses face
on cybersecurity.
The secondary objective of this research proposal include;
i. To examine ways through which business face threats online.
ii. To identify mitigation strategies for cybersecurity breaches and threats.
3.0 Project Scope

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Challenges in Cybersecurity for Businesses 5
This proposal highlights some of the challenges that businesses experience in the
cyberspace as well as highlighting measures which organizations and businesses can use to
safeguard their confidential data. Moreover, this project highlights fundamental practices that
businesses can adapt to stay safe on the internet to avoid sabotage of the organizational systems.
4.0 Literature Review
4.1 Introduction
This section reviews articles, theories, and current research on challenges on
cybersecurity on businesses. Besides, the section reviews relevant articles and trending research
on aspects related to cybersecurity.
4.2 Challenges in cybersecurity
Studies conducted has revealed an exponential rise in cybersecurity incidents like cyber
vandalism and loss or theft or damage of vital information that has severely harm businesses.
Some of the ways through which businesses suffer include;
4.21 Phishing attacks
Phishing attacks is a type of security breach in which a cyber vandal usually assume a
fraudulent form of a business and tries to lure the users into divulging their confidential or
important personal information (Pawar and Anuradha 2015). Moreover, phishing attack occurs
when a cyber attacker falsely claims to be someone else, assumes the entity of a genuine person,
and ultimately tricks the users.
4.22 Network probes
Document Page
Challenges in Cybersecurity for Businesses 6
This threat entails deliberate attempts or constant acts to gain unauthorized access to the
information systems of a business where access to such platforms is often restricted (Pawar and
Anuradha 2015). Essentially, it involves attempting to take advantage of a weak point in the
system to gain access. Such acts of sabotage usually sort the help of network monitor which
checks the real-time traffic on the network.
4.23 Brute force cracking
This process involves a cybercriminal such as a programmer employing techniques to
hack the system and gain access to restricted confidential business information (Elmaghraby and
Losavio 2014). Hackers use trial and error method in decoding encrypted data, such as personal
information, employee records, passwords, and bank details. It may at times involves
continuously guessing passwords until they succeed.
4.24 Malware and ransomware
Malware is a type of cybersecurity threat that particularly infiltrates the user's system and
can cause potential damage to the system of the business (Elmaghraby and Losavio 2014).
Malware and ransomware contain malicious content such as worms, adware, viruses, Trojans,
which attackers can deliberately introduce into the operational systems to steal, alter, or ruin
sensitive data of a business. Cyber-attackers often achieve this by enclosing malicious content in
email attachments. Thus, when a user clicks on these emails without knowing the nature of these
attachments, they are injected into the systems hence disrupting the operational efficiency of the
businesses.
Document Page
Challenges in Cybersecurity for Businesses 7
4.25 Structured Query Language (SQL) injection attacks
Cyber attackers often take advantage of the limitations of SQL and interfere with security
mechanisms of a business server to gain unauthorized access to the confidential and restricted
information. Cyber-attackers usually plan and program the server by running particular SQL
codes and snippets which enable them to get access to confidential and restricted information
(Shar and Tan 2013).
4.26 Man in the Middle (MITM) attacks
Man in the middle attacks is another popular form of cybersecurity challenge where the
cybercriminal obtains central control and mediates the communications as well as data transfers
between the two communicating parties over a network. For example, a cybercriminal performs
an act of eavesdropping, where he or she deliberately interjects himself as a proxy between real-
time ongoing transactions between the user and server. Consequently eliciting sensitive data
from both the communicating parties over the network.
4.27 Denial-of-Service (DoS) attacks
In this type of attack, the intruder floods the server with multiple requests and blocks the
entire network (Carl et al. 2006). DoS usually lead to congestion over the network, failure to
transmit or receive the packets in a network or rendering the network unavailable for any kind of
service altogether. Furthermore, the attacker blocks the server and overloads it in such a manner
that it prevents even the legitimate users from getting access to the network or its related
services. As such, it hampers all automatic operations of a business.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Challenges in Cybersecurity for Businesses 8
4.3 Mitigation measures that offer effective security semantics for businesses
4.31 Providing stronger authentication
Enhancing data security in a business is achievable by using advanced encryption and
decryption standards which offers security against all possible cyber threats. For example,
adopting efficient Secure Socket Layer (SSL) or TLS certificates help reduce intrusion incidents
and thus enhance security for crucial data (Beres et al. 2008).
4.32 Accelerating efforts in managing traffic
Putting in considerable efforts towards strengthening the network security issues and
better tracking as well as management of the internet traffic can help reduce insecurity
incidences. For example, using Linux based operating systems enable browsing through secure
protocols, by keeping default authentication services on.
4.33 Testing vulnerability metrics and management
Continuous monitoring of the systems' vulnerability metrics can be very important in
ascertaining the current operational strength and the kind of vulnerability management that is
desired (Beres et al. 2008). This is evaluated based on organizations' security and vulnerability
indicators towards a more secure and reliable setting essential for smooth business operations.
4.34 Upgrading security and validation testing
Businesses should put mechanisms of validating resources and information coming from
outside sources to ensure complete security and minimizing incidents of cyber-attacks (Knowles
Document Page
Challenges in Cybersecurity for Businesses 9
et al. 2015). Nonetheless, businesses must make provisions such as an upgrade to domain
validated sites and follow HTTP upgrade for enhanced security and safeguarding of information.
4.4 Research gap
Owing to the fact that several businesses, big and small are under constant threat of
cyber-attack, it is important to highlight ways through which such attacks are orchestrated and
offer mitigation strategies. This research, therefore, fills the gap of offering real-life exposure on
threats that have messed businesses such as Google in China.
5.0 Research Questions
5.1 Primary Question
i. What are the challenges in cybersecurity for businesses?
5.2 Secondary Questions
ii. What are the specific means through which business encounter insecurity?
iii. What are some of the cybersecurity mitigation strategies in businesses?
6.0 Research Design and Methodology
6.1 Research design
This research proposal will adopt the qualitative approach. Creswell (2013) observes that
qualitative research design allows the researcher to collect data on feelings, opinions and the
Document Page
Challenges in Cybersecurity for Businesses 10
actual occurrences in the field. Business owners will give an insight how hacking or data
breaches affect their operations. In addition, both primary and secondary data will be very
integral. Primary data will help get real threats of cybersecurity whereas secondary data will help
reveal the most common incidences as per the available statistics.
6.2 Sampling
This study will adopt non-probability sampling techniques where participants, who are
businesses and companies offering cybersecurity solutions will be selected by convenience
sampling technique within the locality. According to Creswell (2013), this is a sampling
technique where participants are chosen out of their convenient proximity and accessibility to the
researcher. Moreover, this sampling method serves to minimize time wastage besides enabling
the researcher to selectively pick the desired research participants depending on the two groups.
6.3 Sample Size and target population
In line with Sekaran and Bougie (2016), a sample size of between thirty and five hundred
qualify to represent a population in a research study. Therefore, this research proposal will
involve thirty-six participants. In particular, 20 respondents will be businesses, where their
employees will participate. While the remaining 16 will be companies that offer cybersecurity
solutions.
6.4 Data Collection Method

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Challenges in Cybersecurity for Businesses 11
This research proposal will use interview and questionnaires as the main method of
collecting primary data. On the other hand, secondary data will come from databanks and
companies offering cybersecurity solutions.
6.5 Reliability
Eriksson and Kovalainen (2015), assert that the ability to reproduce a research measures
its reliability. Moreover, this research took into consideration all the parameters of a research
proposal, paying close attention to ethics and using reliable sources in its development. As such,
this research contributes to other academic sources.
6.6 Validity
Research validity applies when the researcher apply their methods to stick to the
objectives of the research (Eriksson and Kovalainen 2015). More often, researchers have the
tendency of deviating from the real course of the research. In a complex study like this, this can
be a challenge but adequate measures are in place to stay on course by just looking into the ways
through which cybercriminals paralyze business operations.
7. 0 Research Limitations
This research involves identifying businesses that use systems to conduct business
activities. Therefore, choosing particular businesses may appear biased. Again, companies
offering cybersecurity solutions are different in size and technicalities which may offer varied
data. As such, a biased focus is necessary to achieve the objectives of the research.
Document Page
Challenges in Cybersecurity for Businesses 12
8.0 Time Schedule (Research plan)
Week Research proposal activity
Week 1 Preparing the research proposal and searching for materials
Week 2 Writing the introduction
Week 3 Writing the literature review
Week 4 Writing the methodology section
Week 5 Compilation and proofreading the proposal
9.0 Conclusion
Considering the fact that many businesses are embracing technology in doing business,
there has been a steep rise in the incidents of cyber threats and challenges that businesses face
today. As such, cybersecurity breaches pose major threats to sustainability and survival of
businesses. Since most businesses are offering their services online, it is imperative for the
business community to adopt practices that enhance cybersecurity. Such a move will ensure the
safeguarding of valuable information and prevent unauthorized access to the operating system
which often jeopardizes business activities.
Document Page
Challenges in Cybersecurity for Businesses 13
10.0 References
Beres, Y., Griffin, J., Shiu, S., Heitman, M., Markle, D. and Ventura, P., 2008, December.
Analysing the performance of security solutions to reduce vulnerability exposure window.
In Computer Security Applications Conference, 2008. ACSAC 2008. Annual (pp. 33-42). IEEE.
Creswell, J.W., 2013. Research design: Qualitative, quantitative, and mixed methods approaches.
Sage publications.
Carl, G., Kesidis, G., Brooks, R.R. and Rai, S., 2006. Denial-of-service attack-detection
techniques. IEEE Internet computing, 10(1), pp.82-89.
Eriksson, P. and Kovalainen, A., 2015. Qualitative methods in business research: A practical
guide to social research. Sage.
Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety,
security and privacy. Journal of advanced research, 5(4), pp.491-497.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Pawar, M.V. and Anuradha, J., 2015. Network security and types of attacks in
network. Procedia Computer Science, 48, pp.503-506
Sekaran, U. and Bougie, R., 2016. Research methods for business: A skill building approach.
John Wiley & Sons.

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Challenges in Cybersecurity for Businesses 14
Shar, L.K. and Tan, H.B.K., 2013. Defeating SQL injection. Computer, 46(3), pp.69-77.
Wang, W. and Lu, Z., 2013. Cyber security in the Smart Grid: Survey and challenges. Computer
Networks, 57(5), pp.1344-1371.
Document Page
Challenges in Cybersecurity for Businesses 15
11.0 Appendix
11.1 Cybersecurity threats data
Document Page
Challenges in Cybersecurity for Businesses 16
11.2 Illustration of Man in the Middle (MITM) Attacks
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]