logo

Changing the Job Market and Business Strategy under Cyber Security Guidance

65 Pages15173 Words37 Views
   

Added on  2023-01-10

About This Document

This research paper explores the impact of cyber security on the job market and business strategy. It discusses the importance of protecting sensitive data and the implications of cyber attacks. The paper also provides solutions to mitigate the risk and enhance cyber security awareness. The research methodology includes secondary information collection and a survey. The findings and conclusions highlight the need for new skills, shared responsibility, and awareness campaigns in cyber security.

Changing the Job Market and Business Strategy under Cyber Security Guidance

   Added on 2023-01-10

ShareRelated Documents
Changing the job market
and business strategy under
cyber security guidance
Changing the Job Market and Business Strategy under Cyber Security Guidance_1
Contents
Contents
Introduction.....................................................................................................3
1.1. Outline..............................................................................................6
Literature review.............................................................................................7
1.2. Cyber-crime......................................................................................7
1.3. The cyber security history................................................................8
1.4. Intrusion detection approaches.......................................................12
1.5. Exciting new technologies - IoT....................................................13
1.6. Maltese authorities for cyber security and data breach..................15
Research methodology..................................................................................17
Research Analysis.........................................................................................19
1.7. General effects of cyber-attacks an insight from business
management perspective (reputational, operational, process disruptions....).....19
1.8. Level of awareness of cyber-attacks implications on business
performances.......................................................................................................19
1.9. New methods to mitigate the risk of the lack of knowledge required
for a successfully implementation of cyber security within public and private
entities 19
1.10. Cyberattack – national disaster. Case of – Malta, Iran, USA........20
1.11. Financial implications of having an attack in cyber security. From
Business point of view.........................................................................................24
1.12. Business awareness and attitude towards cyber security...............28
1.13. Online exposure and protection knowledge...................................29
1.14. Use of personal devices..................................................................32
1.15. Use of externally hosted web service ( cloud computing).............32
Changing the Job Market and Business Strategy under Cyber Security Guidance_2
1.16. Business perception of conflicting advice.....................................33
1.17. Business perception of importance of cyber security....................34
Findings and Conclusions.............................................................................37
Recommendations.........................................................................................40
1.18. New skills – Three solutions.........................................................40
1.19. Cybersecurity – a shared responsibility.........................................42
1.20. Understanding cyber threats actors................................................43
1.21. Awareness – Awareness campaigns..............................................48
1.22. Policy.............................................................................................49
1.22.1. Ex-post Regulations....................................................................50
1.22.2. Ex-ante Regulations....................................................................51
1.22.3. Maltese policies and regulatory framework................................52
Future Works.................................................................................................54
Changing the Job Market and Business Strategy under Cyber Security Guidance_3
List of Figures
List of Tables
List of Abbreviations
GDPR – General Data Pro....
IoT Internet of Things
WSN Wireless Sensor Networks
SBNL security breach notification laws
cybercrime-as-a-service (CaaS)
Introduction
The topic which has been selected for this research is cyber security. It is
one of the most important topic which needs to be explored in today’s time.
Cybersecurity is important because it encompasses everything that pertains to
protecting our sensitive data, personally identifiable information (PII), protected
health information (PHI), personal information, intellectual property, data, and
governmental and industry information systems from theft and damage
Changing the Job Market and Business Strategy under Cyber Security Guidance_4
attempted. Most of the organizations making use of internet makes sure that the
personal and private data of employees are been protected so that the trust exists
upon them.
I was really motivated to the project and find the end results on subject
matter. At first I was really anxious but then my seniors and my tutor supported
me. This has helped me in overcoming the problems which I faced during
making of report. Since the internet is being used in day to day life the chances
of cyber-attack is been increasing. This is one of the major problem which has
been faced in today’s time. The objective of the report is to analyze the
importance of cybersecurity so that cyber-attack incidences are been reduced.
There are various research methods which has been used in the research. Like
secondary information has been collected from the websites, journal articles,
blogs, books and journals. It was really easy for me to collect the information
from these sources. The advantage of using this research method was that it
saved lots of time. Reliable and authentic information has been gathered with
the help of these sources. The data was also collected by making use of The
Ipsos 2019 survey websites. The primary method of data collection was also
being used. This paper will consist of the introduction related to subject matter.
It will also provide literature review for the same. In this theoretical framework
related to the subject matter will be discussed. It will also provide the details
about the research methods which are being used.
- Importance of the topic (research)
- Your motivation (Statement of the problem)
- Objective
- Short research methods (how you did it)
- Short description of the research paper structure
Changing the Job Market and Business Strategy under Cyber Security Guidance_5
In this chapter, we will explain the problem definition and demonstrate the
methodology, objectives of our study, then, briefly mention the contributions.
Finally, we will outline the structure.
Since the encroachment of Internet into day to day lives of common people,
cyber-attacks have become inevitable. This inevitability of getting attacked, has
revolutionized the way people think about security and the rules and methods to
safeguard the business and national security.
(Quereshi S, 2003) observed that more and more the development rate in the
information technology sector is much higher than the other sectors of the world.
The increase in information technology development rate underlines the fact that
people need to build up its resources of skills, awareness and experience. The
transfer of technology has been a concern of development experts for over two
decades. The concern observed is between various nationalities and in some
countries between their own North and South territories.
The need of information technology is felt in every part of our lives and
important for us as the food is for humankind. (Johansson, 2018). The increasing
globalization of world economies is being fueled by a number of Information
technology infrastructure and applications. Without information technology some
of the services we have taken for granted would not exist. In 1995, only 1% of the
world’s population was online. Nowadays, fast forward 20 years, more than 3.5
billion people have internet connection, almost half of the humans on the planet.
The rate is increasing by approximately 10 people a second, making it now
virtually impossible to imagine life without internet (Nuwer, 2017). The UK’s
office for National statistics reported that nearly 93% of adults surveyed in UK
said that had used the internet in the previous three months. (ONS UK, May 2019).
This shows that almost all every person is using the internet and people belonging
Changing the Job Market and Business Strategy under Cyber Security Guidance_6
from every age group are engaged in using internet. This way the concept of cyber
security has become a big part of the security debate very quickly.
This work is set to analyze the concept of cyber security and the current
discourse which is used to frame the threats that are coming from various sectors.
The main question of the dissertation is therefore “What is the awareness level and
what are the implications of the gap between actual and perceived cyber threats to
various Maltese organizations and how does this gap influence the understanding
of cyber security concept?”. Following chapters will compare Maltese and foreign
companies....
The methodology used to answer the above questions was mainly obtained
by conducting a survey on the Internet via email, social media and through web-
based questionnaires such as Web monkey, by sending the web survey’s URL link
via email and social media. The internet provides various opportunities to conduct
surveys more efficiently and effectively than traditional ones. Web based surveys
provide opportunities to improve the quality of survey data which postal mail
survey cannot achieve. Few advantages of Web based surveys over the traditional
postage are that web survey applications can check the completeness of each reply
after each submission without the need of human intervention. The study also
suggests that the web-based questionnaires are of great potential value for a
research. In fact, the study shows that 90% of the users preferred to reply to the
questionnaire via the Web then the traditional way (Zhang, 2000).
1.1. Outline
This thesis is organized into seven chapters. The first chapter provides brief
introduction to thesis and explanation of its methodology. Then:
Chapter 2
Changing the Job Market and Business Strategy under Cyber Security Guidance_7
I structured the research focused on this chapter 3 more specialized on .......
Literature review
1.2. Cyber-crime
Cyber security has emerged as a response to technological innovations and
their involvement in changing the approach of economic, geographical and
political development (Hansen, Nissen Baum, 2009). The term cyber security is
often used interchangeably with the term information security (Von Solms, Von
Niekerk, 2013). The definition of cyber-crime given by Fomenko A in 2014 was
that Cyber Crime can be defined as the unlawful acts where the computer is used
wither as a tool or a target or both. Cybercrime is a broad term that is used to
define criminal activity in which computers or computer networks are tool, a target
or a place of criminal activity and is no doubt that it is the most rapidly
accelerating kinds of crime today. The term is a general term that covers crimes
like phishing, credit card frauds, bank robbery, illegal downloading, industrial
espionage, the circulation of pictures pertaining to child sexual abuse, scams
mainly operating through electronic mail, kidnapping children via chatrooms,
cyber terrorism, creation and distribution of virus, fraud involving online auctions ,
misusing financial services available on the internet.
Cyber threats have been a major issue for politicians and security experts
from the mid-1990s. President Obama on NYTimes in 2009 reported that the
defense and military networks are under constant attack by Alqeda and other
terrorist groups. He also described that attacks in today’s world are not only from a
few extremists in suicide vests using information technology as a weapon of mass
Changing the Job Market and Business Strategy under Cyber Security Guidance_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security: Exploring the Various Aspects and Solutions
|29
|8168
|290

Applications of Cyber-Security in Higher Education
|28
|7698
|11

Future of the Cybersecurity Profession - ITECH7000
|6
|1177
|32

Importance of Cyber Security in Retail Industry
|21
|7572
|72

The Cybersecurity Attacks : Assignment
|4
|454
|62

Cyber security Attacks | Assessment 1
|7
|1374
|30