Ask a question from expert

Ask now

Cyber Security in Business Organizations - Report

15 Pages3318 Words119 Views
   

Added on  2020-04-01

About This Document

This report is on "types of cybersecurity". This is a report on the research of the topic challenges affecting cybersecurity in business organizations in Australia. The report gives instructions about how the research was carried out and the findings. It contains ten main sections which are the introduction part, project objective, project scope section, literature review section, the research questions section, research design and methodology part, research limitations section, research plan section, conclusion part, and lastly the reference section. We will discuss here the internet of things.

Cyber Security in Business Organizations - Report

   Added on 2020-04-01

BookmarkShareRelated Documents
CHALLENGES FOR CYBER SECURITY IN BUSINESSESNameInstitutional AffiliationDate1
Cyber Security in Business Organizations - Report_1
CHALLENGES FOR CYBER SECURITY IN BUSINESSESEXECUTIVE SUMMARYThis is a report on the research of the topic “challenges affecting cyber security in business organizations in Australia”. The report gives instructions about how the research was carried out and the findings. It contains ten main sections which are: the introduction part, project objective, project scope section, literature review section, the research questions section, research design and methodology part, research limitations section, research plan section, conclusion part and lastly the reference section. Every section of the report has important details about the report to indicate its progress.2
Cyber Security in Business Organizations - Report_2
Table of ContentsINTRODUCTION.....................................................................................................................................1RESEARCH AIM AND OBJECTIVE....................................................................................................2PROJECT SCOPE....................................................................................................................................2RESEARCH JUSTIFICATION...............................................................................................................2LITERATURE REVIEW.........................................................................................................................3Types of Cyber security Risks..............................................................................................................3Cyber Thefts........................................................................................................................................3Cyber Espionage..................................................................................................................................4Internet of Things................................................................................................................................4RESEARCH QUESTIONS AND HYPOTHESIS...................................................................................5Primary Question..................................................................................................................................5Secondary Question...............................................................................................................................5RESEARCH DESIGN AND METHODOLOGY....................................................................................5Qualitative Research Method...............................................................................................................5Research Method Validity....................................................................................................................6Sampling method...................................................................................................................................6Data Collection Method........................................................................................................................6RESEARCH LIMITATIONS...................................................................................................................6RESEARCH PLAN...................................................................................................................................7CONCLUSION..........................................................................................................................................7REFERENCES..........................................................................................................................................83
Cyber Security in Business Organizations - Report_3
INTRODUCTIONCyber security is a technological process and practices that is designed to protect computers and its components from theft or damage. It is responsible for protecting the computers software and hardware devices, computer networks and programs as well as computer data from being damaged by unauthorized personnel. Therefore, cyber security are the measures that are implemented with the aim of protecting computer data and components (Choo, 2014). Over the last decades, business organizations have been depending highly on computers and technology toconduct their operations. A large number of businesses are now using computers and other technological improved equipment to carry out their operations on finances, administering, procurement and purchases, sales and marketing to name a few (Kostyuk, 2014). However, over the recent years, there has been an increase in cyber security breach and attack. This has led to theft and damage of business information and any data that is stored in the computer software. The main types of breaches or attacks include theft, unauthorized access to data and compromise of the organizational data with an aim of selling the information to competitors, destroying or damaging the businesses image, gaining a leverage for the business and for some people just fun to breach cyber security.RESEARCHAIM AND OBJECTIVEAimThe project’s main aim was to identify and analyze some of the common cyber security challenges for businesses in Australia.ObjectiveThe main objective of the project was to discuss and evaluate the common cyber securities that challenge business organizations in AustraliaPROJECT SCOPEThe research was stated to only address the cyber security challenges affecting businesses in Australia. The research was limited to include the business organizations that have used the modern technology for many years, e.g. computers to store data and carry out most of their 4
Cyber Security in Business Organizations - Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Security Assignment (DOC)
|6
|1749
|101

Challenges of Business Cybersecurity: Strategies to Improve Cybersecurity in Business
|13
|2987
|58

Cyber Security in the Business Organisation
|9
|2858
|89

Cyber Security Assignment- Business Research Methodology
|15
|3900
|51

Challenges in Cybersecurity in Business Assignment PDF
|12
|3096
|38

Challenges in Cyber Secuirty (pdf)
|9
|1701
|86