Challenges and Strategies for Cyber Security in Organizations

Verified

Added on  2023/06/12

|14
|3716
|159
AI Summary
This report discusses the challenges faced by organizations in terms of cyber security and recommends strategies to overcome them. The literature review covers topics such as the meaning and concept of cyber security, challenges faced by organizations such as DDoS, IoT, Smartphone Malware, Hacktivists, and Ransomware, and strategies for overcoming these challenges such as encryption, physically securing computers and servers, maintaining a budget for cyber security, and training and development of the workforce. However, there is a gap in the literature regarding the effectiveness of these strategies and their implementation in real-world scenarios. Further research is needed to evaluate the practicality and success of these approaches in different organizational contexts.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Ruining Head: BUSINESS RESEARCH
BUSINESS RESEARCH
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
BUSINESS RESEARCH
Table of Contents
Introduction................................................................................................................................3
Project objective.....................................................................................................................3
Project scope...........................................................................................................................4
Literature Review.......................................................................................................................4
To analyze the meaning and concept of cyber security..........................................................4
To analyze the challenges faced by the organization by cyber security.................................5
DDoS..................................................................................................................................6
IoT.......................................................................................................................................6
Smartphone Malware..........................................................................................................7
Hacktivists..........................................................................................................................7
Ransomware........................................................................................................................8
To Recommend strategies for overcoming the challenges of cyber security.........................8
Literature gap........................................................................................................................10
Conclusion................................................................................................................................11
References................................................................................................................................12
Document Page
3
BUSINESS RESEARCH
Introduction
The use of internet services is increased as compared to previous years. Individuals imply
online goods and services to accomplish their various needs that are associated with
entertainment, shopping, and finance (Abomhara, 2015). In the current scenario, the use of
social media has been enhanced caused by higher online users. In addition, it is also found
that social media assist individuals to share their specific information with colleagues,
friends, and family. The online services are used by the public and private organization, and
people, which make them defenceless in context of the cyber security risks. The Internet
services develop higher probabilities of cybercrimes. There are certain issues that are faced
by the organization at the time of using online services like ransomware, malware, Internet of
thing and hacking (Anderson, et al., 2013). Organizations are defenceless to deal with online
issues and obtain a reliable outcome. The companies have to investigate information security
tools to eliminate the chance of cyber threats. This report discusses cyber security challenges
confronted by the organization as it would make totally vulnerable to the firm for managing
with cyber risk. Furthermore, this research report also presents approaches as it would
support to improve threats to cyber security.
Project objective
The main aim of this research report is to evaluate approaches or strategies for eliminating
the challenges of cyber security from the company. The following objectives will be used by
the researcher to attain their research aim:
To explore the concept of cyber security in the organization
To evaluate challenges of cyber security faced by the company
To suggested strategies for managing cyber security challenges
Document Page
4
BUSINESS RESEARCH
Project scope
This report will be effective in evaluating the challenges of cyber security face by the
organization. It supports the company to comprehend the situation that could be occurred in
lack of cyber security. This report aids researcher to understand cyber security issues faced
by the company in the current trends. In last, it supports research scholar to understand many
approaches for eliminating cyber security challenges.
Literature Review
Introduction
The literature review chapter aid the researcher to enhance their conceptual knowledge about
current research matter (Arabo and Pranggono, 2013). In this, many techniques will be used
by research scholar to obtain information about research matter. In the recent business
scenario, online facilities are used many companies to gain their profitability. The use of
internet services has been enhanced among business tycoon, individuals, and small
organizations. It is also evaluated that development in the online technique could enhance the
possibilities of cyber security threat in the working place. Consequently, it would negatively
impact on organizational performance. This literature review supports the research scholar to
enhance their theoretical knowledge towards challenges and approaches to cyber security
threat as it would be effective to obtain a positive outcome.
To analyze the meaning and concept of cyber security
Bandari et al. (2012) argued that people use online services to make a link between friends
and family. It supports small organizations and business tycoon to obtain business
opportunity as it would be effective for spreading their business. Through online methods,
organization and individual share their personal or private data among a large number of
individuals as it would create possibilities of cyber security threat. In addition, it is also found
that many individuals use the internet and personal computer to complete their task in the
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5
BUSINESS RESEARCH
least time. The lack of cyber security software could enhance the possibilities of cybercrime
at the working place.
In support of this, Campos et al. (2016) stated that individuals could conduct cybercrimes by
gathering personal data of people and organization to get unfair profit. It could support to
reduce the existing financial performance of the company. There are certain factors that could
affect probabilities of challenges of cyber security. It is also found that social media users are
defencelessness to manage cybercrimes due to lack of cyber security. In the current scenario,
the application of social media has been enhanced significantly between individuals and
firms. It is also found that there are approximate 2.9 billion individuals who use social media
to interact with others. In addition, companies use social media to complete their many tasks
related to the market research, feedback, data collection method, and advertising. Through
this, the organization could improve business process and obtain a reliable outcome.
In the favoured of Choo (2011), the social media is implied by many organizations because it
permits the firm to practice their marketing strategy on the social sites and get higher success.
The social media offer an opportunity to the organization for making their different image in
the market such as Oreo, Starbucks, Old spice, and Blue Heaven. The higher use of social
sites would create probabilities of cyber security risk. The hackers of organization target
account of online users to get their confidential data. There are many companies that
influenced by cybercrimes like PlayStation, HBO, and Yahoo.
To analyze the challenges faced by the organization by cyber security
According to Falk et al. (2016) financial institution and organization uses the mobile banking
services caused of higher competition level. It will also be imperative for gaining a number of
consumers.
Banking company has started to use the mobile banking services due to enhancing their
services and attract a large number of consumers. There are various sources which are used
Document Page
6
BUSINESS RESEARCH
by the company to manage their capital at the time of transferring money one place to other
like PayPal and mobile wallet. It will enable the company and consumers for the online
financial deal as it could create possibilities of the cyber threat.
Fonseca and Rosen (2017) argued that online transaction enable the company to share their
confidential information related to growth, product and services, and existing data on bank
portal. In the existing business scenario, a large number of financial institutions have failed to
secure their private information consumers that would increase the probabilities of
information leakage. From this, hackers could be capable to take advantages from those
companies caused of lack of reliable technique for managing cybercrime. Hacker could
collect the private information of customers and organizations to conduct unfair behavior.
Hackers gather private information of individuals and organizations to conduct inappropriate
behaviour at the working place. There are many cyber challenges that are confronted by a
company like IoT, DDoS, Hacktivists, Ransomware, and Smartphone Malware.
DDoS
Futter (2016) argued that DDoS (distributed denial of services) attract on the personal data of
online users and attract on many essential activities. Mostly, online hackers attract on the
personal computer of company subsequently, online hackers start to accesses another
computer that could be associated with the same server. Servers are unable to manage a
various range of traffic as it could offer a chance to the hacker for hacking their private data
of an organization. There are certain business activities that are influenced by DDoS such as
BBC, and DYN.
IoT
In support of this, Gomes et al. (2017) stated that the popularity of internet is enhanced hence
organization uses many technologies to link their potential consumers to the internet. A large
number of consumers or organizations use the internet as it would create possibilities of
Document Page
7
BUSINESS RESEARCH
cybercrime. Moreover, IoT technique is associated with the single server and it could be
breached by one technique as it could cause of higher possibilities of cyber security issues.
These tools help the hackers to get private data of online users thus it can be said that IoT
could also develop higher chance of cyber security crime. The internet of things device is
supportive to make the association with other tools and techniques. It would directly impact
on the performance of the organization.
Smartphone Malware
Joglekar and Pise (2016) smart malware tool enable online hackers to practice the private
information of consumers. In addition, it is also found that more than 44% of whole
population practices smartphone to convey their data on the specified portal to accomplish
their determined task. The popularity of smartphone could provide the opportunity to the
hacker for practicing the private information of others. The online hackers collect the private
information of online users and blackmail them to attain their needs. The popularity of the
mobile banking in the marketplace could offer an idea to the cybercriminals for focusing on
smartphone users as it would generate the higher probabilities of the cyber security challenge
for them. Initially, online cyber criminals could concentrate on the top management executive
and leader to obtain the private data for conducting unfair behaviour and obtaining higher
success. It is also found that ‘Plankton’ Malware support the cybercriminal to obtain
information of android phone users through a mobile application. ‘DroneKungFu’ is also
malware that facilitates the hackers to obtain information from Android users by back door. It
will leak the private information of users in the least time and cost.
Hacktivists
According to He (2016) Hacktivists would generate the probabilities of cyber security issue.
The online issues are occurred by the cybercrime to increase the unfair behaviour at the
working place. The online cybercrime could support the hackers to obtain money from others
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
BUSINESS RESEARCH
and enhance the possibilities of cyber-attracts. In the recent era, effective strategies are used
by a large number of consumers to mitigating their current issues. It would support to obtain
higher success.
In the favoured of Joglekar and Pise (2016) Hacktivism is harmful to the company because it
initially facilitates the hackers to make a negative image of the firm in the marketplace by
financially disabling the firm. Hacktivists attack on the private and public sector organization
for getting their private information which could be harmful to the nation’s safety. For
illustration, Sony Corporation is also influenced by Hacktivists that destroy their image and
financial condition (Pathak and Nanded, 2016).
Ransomware
In opposition to this, Johnson (2015) examined that Ransomware is a malware which could
attack on a single computer of company and leaders and make them totally defenceless to
imply their personal information appropriately. In the current scenario, the number of hackers
has been increased that could enable the hackers to obtain higher ransom for the company.
The ransom could form of asset or money of other people. It is found that there is lack of
possibilities that online cybercriminal will not contact back after getting their ransom. There
are different kinds of Ransomware such as Crypto Locker, Locky, and WannaCry. In
addition, Nissan motor and FedEx are influenced by the Ransomware.
To Recommend strategies for overcoming the challenges of cyber security
The approaches would support the company to eliminate challenges of cyber security and get
a valid and reliable result. There are certain approaches that could be used by the organization
and individuals to mitigate probabilities of cyber security threat at the working place. These
strategies like physically securing and encryption.
Kaplan et al. (2015) suggested that company use encryption strategy to defend their private
information of organization and secure the transaction between two gadgets. It is also found
Document Page
9
BUSINESS RESEARCH
that when a company uses IoT software in the home then it increases the probabilities of a
cyber-attack during transferring the information from one place to another place. In this, the
organization should imply the encrypting techniques as it makes more than one layers at the
time of transferring private information. But at the same time, organization do not imply this
technique caused by time-consuming feature.
In opposition to this, Kim et al. (2009) recommended that physically securing the computer
and servers could also be effective for eliminating the cybercrime threat. The company would
use many techniques such as biometric locks and a security camera to protect the computer
labs and personal computer as it would help them from inside challenges (Nemati, 2010). The
company should properly check the workforce caused by eliminating their personal data from
another party. It is also addressed that company should be confused for investing in the cyber
security data as it could facilitate the firm to protect their confidential data and make a
distinguish image in the market. Consequently, it could support to improve the financial
condition of the firm. The organization would also be capable to obtain a higher competitive
benefit.
As per the view of Manworren et al. (2016), an organization should maintain the budget for
cyber security because it would aid to develop the cyber security tools to assess the safety of
online information. A company should use antivirus, firewalls, security software as it would
reduce the possible hazard of cyber security. A company should implement different
password to keep the private information of a person and corporations. It is also identified
that certain companies use easy password, which generates the potential of cyber security
within an organization (Mohammed, et al., 2015). An individual and organization should
make strong password at the time of implementing banking products and services. A
corporation could develop the organizational culture as it would provide the security to keep
the depth data and builds unique picture amid the customers. It is also stated that company
Document Page
10
BUSINESS RESEARCH
may facilitate the instruction to their workforces to keep them in against the cyber security
risk. A company should exercise training and development technique by which they would
aware with a workforce with regards to cyber security threats and gets the reliable results
(McGettrick, et al., 2014).
Literature gap
This literature review will support to an investigator for obtaining the appropriate information
with regards to the impact of cyber security challenges on the business. This literature review
will aid to assess the existing research matter. This chapter also focuses on how cyber
security risk could directly affect the business performance.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
11
BUSINESS RESEARCH
Conclusion
With respect of the above interpretation, it can be concluded that higher demand for internet
services could develop higher probabilities of cyber security threat. The use of social network
sites, online banking, and mobile wallet could generate the higher probabilities of cyber
security threat cause of cyber security. It can also be illustrated that companies could face
many issues at the time of using an online tool like Smartphone malware, DDoS, Hacktivism,
and IoT. It is also found that there are many companies that are influenced by the cybercrime
like Sony, FedEx, DYN, BBC, and Bank of America. The company should critically evaluate
the cyber risk develop a reliable decision. The company should invest in cyber security due to
secure the confidential data of firm. The company should use encryption technique because it
helps the company to freely utilize their personal computer and obtain a reliable outcome. It
will also help the company to mitigate the probabilities of cybercrime from the company and
obtaining competitive advantages.
Document Page
12
BUSINESS RESEARCH
References
Abomhara, M., (2015) ‘Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks’, Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Anderson, R., Barton, C., Böhme, R., Clayton, R., Van Eeten, M.J., Levi, M., Moore, T. and
Savage, S., (2013) Measuring the cost of cybercrime. In The economics of information
security and privacy (pp. 265-300). USA: Springer Berlin Heidelberg.
Arabo, A. and Pranggono, B., (2013) Mobile malware and smart device security: Trends,
challenges, and solutions. In Control Systems and Computer Science (CSCS), 2013 19th
International Conference on (pp. 526-531). IEEE.
Bandari, R., Asur, S. and Huberman, B.A., (2012) ‘The pulse of news in social media:
Forecasting popularity’, ICWSM, 12, pp.26-33.
Campos, J., Sharma, P., Jantunen, E., Baglee, D., and Fumagalli, L. (2016) ‘The challenges
of cyber security frameworks to protect data required for the development of advanced
maintenance’, Procedia CIRP, 47, pp. 222-227.
Choo, K.K.R., (2011) ‘The cyber threat landscape: Challenges and future research
directions’, Computers & Security, 30(8), pp.719-731.
Falk, S., Römmele, A., and Silverman, M. (Eds.). (2016) Digital Government: Leveraging
Innovation to Improve Public Sector Performance and Outcomes for Citizens. UK: Springer.
Fonseca, B., and Rosen, J. D. (2017) Cyber security in the US: Major Trends and Challenges.
In The New US Security Agenda (pp. 87-106). UK: Palgrave Macmillan, Cham.
Futter, A. (2016) ‘War Games redux? Cyber threats, US–Russian strategic stability, and new
challenges for nuclear security and arms control’, European Security, 25(2), pp. 163-180.
Document Page
13
BUSINESS RESEARCH
Gomes, J. F., Iivari, M., Ahokangas, P., Isotalo, L., and Niemelä, R. (2017) ‘Cyber security
Business Models for IoT-Mobile Device Management Services in Futures Digital
Hospitals’, Journal of ICT Standardization, 5(1), pp.107-128.
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., and Gabrys, B. (2016, July)
‘The security challenges in the IoT enabled cyber-physical systems and opportunities for
evolutionary computing and other computational intelligence, In Evolutionary Computation
(CEC), 2016 IEEE Congress on(pp. 1015-1021). IEEE.
Joglekar, P., and Pise, N. (2016) ‘Solving Cyber Security Challenges using Big
Data’, International Journal of Computer Applications, 154(4) p. 1-4.
Johnson, T. A. (Ed.). (2015) Cyber security: Protecting critical infrastructures from cyber
attack and cyber warfare, UK: CRC Press.
Kaplan, J. M., Bailey, T., O'Halloran, D., Marcus, A., and Rezek, C. (2015) Beyond Cyber
security: Protecting Your Digital Business. UK: John Wiley and Sons.
Kim, G., Shin, B. and Lee, H.G., (2009) ‘Understanding dynamics between initial trust and
usage intentions of mobile banking’, Information Systems Journal, 19(3), pp.283-311.
Manworren, N., Letwat, J., and Daily, O. (2016) ‘Why you should care about the Target data
breach’, Business Horizons, 59(3), pp. 257-266.
McGettrick, A., Cassel, L. N., Dark, M., Hawthorne, E. K., and Impagliazzo, J. (2014,
March) ‘Toward curricular guidelines for cyber security’, In Proceedings of the 45th ACM
technical symposium on Computer science education (pp. 81-82). UK: ACM.
Mohammed, D., Mariani, R., and Mohammed, S. (2015) ‘Cyber security challenges and
compliance issues within the US healthcare sector’, International Journal of Business and
Social Research, 5(2), pp. 55-66.
Nemati, H.R. ed., (2010) Applied Cryptography for Cyber Security and Defense: Information
Encryption and Cyphering: Information Encryption and Cyphering. USA: IGI Global.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
14
BUSINESS RESEARCH
O'Malley, G., (2013) Hacktivism: Cyber Activism or Cyber Crime. Trinity CL Rev., 16,
p.137.
Pathak, D.P., and Nanded, Y.M., (2016) A dangerous trend of cybercrime: ransomware
growing challenge. International Journal of Advanced Research in Computer Engineering &
Technology (IJARCET) Volume, 5.
chevron_up_icon
1 out of 14
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]