logo

Challenges in Cybersecurity for Businesses

16 Pages2503 Words42 Views
   

Added on  2020-03-16

Challenges in Cybersecurity for Businesses

   Added on 2020-03-16

ShareRelated Documents
Challenges in Cybersecurity for Businesses 1CHALLENGES IN CYBERSECURITY FOR BUSINESSESby [Name]CourseProfessor’s NameInstitutionLocation of InstitutionDate
Challenges in Cybersecurity for Businesses_1
Challenges in Cybersecurity for Businesses 2TABLE OF CONTENTS1.0 Introduction...........................................................................................................................................32.0 Project Objective...................................................................................................................................43.0 Project Scope.........................................................................................................................................44.0 Literature Review..................................................................................................................................54.1 Introduction.......................................................................................................................................54.2 Challenges in cybersecurity...............................................................................................................54.21 Phishing attacks...........................................................................................................................54.22 Network probes............................................................................................................................54.23 Brute force cracking....................................................................................................................64.24 Malware and ransomware............................................................................................................64.25 Structured Query Language (SQL) injection attacks...................................................................74.26 Man in the Middle (MITM) attacks.............................................................................................74.27 Denial-of-Service (DoS) attacks..................................................................................................74.3 Mitigation measures that offer effective security semantics for businesses.......................................84.31 Providing stronger authentication................................................................................................84.32 Accelerating efforts in managing traffic......................................................................................84.33 Testing vulnerability metrics and management............................................................................84.34 Upgrading security and validation testing....................................................................................84.4 Research gap......................................................................................................................................95.0 Research Questions...............................................................................................................................95.1 Primary Question...............................................................................................................................95.2 Secondary Questions.........................................................................................................................96.0 Research Design and Methodology.......................................................................................................96.1 Research design.................................................................................................................................96.2 Sampling..........................................................................................................................................106.3 Sample Size and target population...................................................................................................106.4 Data Collection Method...................................................................................................................106.5 Reliability........................................................................................................................................116.6 Validity............................................................................................................................................117. 0 Research Limitations..........................................................................................................................118.0 Time Schedule (Research plan)...........................................................................................................129.0 Conclusion...........................................................................................................................................12
Challenges in Cybersecurity for Businesses_2
Challenges in Cybersecurity for Businesses 310.0 References.........................................................................................................................................1311.0 Appendix...........................................................................................................................................1511.1 Cybersecurity threats data..............................................................................................................1511.2 Illustration of Man in the Middle (MITM) Attacks........................................................................16
Challenges in Cybersecurity for Businesses_3
Challenges in Cybersecurity for Businesses 41.0 IntroductionIn many businesses currently, cybersecurity is becoming a very important aspect of the daily operations. Owing to the increasing level of technology, many businesses are taking their operations online. Some store their data in the clouds and some adopting a virtual business platform. Besides, in the quest to expand operations, businesses are opening new branches in other countries, with central operations taking place in the head office. As such, these moves expose these businesses to threats such as hacking which in most cases interfere with systemic operations and loss of confidential data (Wang and Lu 2013). For example, Google lost some of its confidential data and patent rights in their Headquarters in China in 2009 when hackers infiltrated into their system. This research proposal introduces all possible vulnerabilities that businesses are susceptible to in an operational business framework. 2.0 Project ObjectiveThe primary objective of this proposal is to examine the challenges that businesses face on cybersecurity. The secondary objective of this research proposal include; i.To examine ways through which business face threats online. ii.To identify mitigation strategies for cybersecurity breaches and threats. 3.0 Project Scope
Challenges in Cybersecurity for Businesses_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
HI6008 Business Research on Cybersecurity Challenges
|19
|3390
|236

Cybersecurity Threat Name of the Student
|11
|2321
|49

Network Security Management
|12
|3039
|83

Challenges in Cybersecurity in Business Assignment PDF
|12
|3096
|38

IT Risk Management
|13
|3585
|456

Cybersecurity Case Study of ABCT
|13
|4075
|87