Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: MANAGEMENT Challenges of Cyber security in business: A case study of Netbox Blue Company Name of the student: Name of the university: Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1 MANAGEMENT Abstract Cyberthreat is an obstacle in the processing of data from the internal to the external environment. Information leakage degrades the reputation of the companies like NetBoxBlue.Insuchascenario,latestandmodernsoftwareareneededfor securing the private information in zipped folders. Evaluations are needed in terms of meetings, audits and reviews for detecting the areas in which modifications are needed for enhancing the security in the information technology. This assignment sheds light on the strategies, which includes adherence to regulatory mechanisms for enhancing the standards of the operations.
2 MANAGEMENT Table of contents Introduction...................................................................................................................3 Topic selection..........................................................................................................3 Justification for the proposed research questions....................................................3 Research methodology.................................................................................................4 Hypothesis................................................................................................................4 Primary data sample size..........................................................................................4 Sampling approach...................................................................................................4 Summary of the findings...............................................................................................5 Conclusion....................................................................................................................8 References.................................................................................................................10
3 MANAGEMENT Introduction In the present business context, cyber security attains an important position in termsofenhancingtheprotectionoftheorganizationaldata.Regulatory mechanisms need to be followed for ensuring that the privacy in the information is maintained. However, it is striking that the rules and regulations are violated, leading tothecyberchallenges.Thechallengesactasanobstacleforensuringthe efficiency in the operations. Most of the companies have adopted security cookies and policies for strengthening the flexibility in the operations (Trim & Upton, 2016). This research aims to shed light on the challenges encountered in the process of executingthedataprocessingactivitiesthroughtheexampleofNetboxBlue Company. Topic selection Cybercrimes attain commonality in the current business context in terms of data leakages, compelling the companies and organizations to run in losses. This is a significant issue, which the assignment takes up for conducting further research. Rise in the cyber threats is an obstacle for the companies to apply innovation into the processes. Rise in the advanced technologies have enhanced the ease in terms of optimizing the operations (Green, 2016). One of the other reasons for conducting the research is to highlight the instances of the data breach, which stains the reputation of the companies like that of Netbox Blue. Within this, mention needs to be made of notifications regarding the financial loss, which adversely affects the operational efficiency. Justification for the proposed research questions The research questions in this context relate to the concepts, challenges and approaches towards ensuring cyber security. These parameters are important to considerintermsofsheddinglightontheorganizationalbehaviourtowards enhancing the security of the information and data of the companies like Netbox Blue. Along with this, it can also be said that the questions pertaining to the challenges in the cyber security is to be considered for adopting proper techniques for developing the strategies (Shackelford, 2016). The scope and arena of the research questions extends to the readers for disseminating essential information about data protection. Apart from this, it can also be said that the research questions
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
4 MANAGEMENT have been formed in a way which helps the businesspersons in developing the appropriate approach towards securing the data and the information. Research methodology For conducting this research, mixed method would be applied for diversifying the approaches towards the subject matter. In the primary method, the researcher would apply the means of survey on the employees of Netbox Blue Company. Along with this, 3 managers of the company would be interviewed for gaining an insight into the steps taken for managing the cyber threats. Apart from this, thematic analysis would be conducted for mapping the impact of the cyber threats on the enhancement of the organizational effectiveness. Positivismresearchphilosophywouldbeselectedfordevelopingthe scientific, objective and real knowledge related to the challenges of cyber security in the businesses of Netbox Blue Company. Deductive approach would be applied for deducingrelevantconclusionsandrecommendationstowardsimprovingthe standards and quality of cyber security (Papastergiou & Polemi, 2018). Explorative research design would be effective in terms of exploring the unexplored realms of the cyber security. Hypothesis H0- Cyber threats do not have any impact on the productivity of the Netbox Blue Company H1- Cyber threats adversely affects the productivity of the Netbox Blue Company The first hypothesis lacks mention, as it is not possible. Cyber threats always affects the productivity of the company. This negation puts the positive hypothesis on a higher pedestral. Primary data sample size For conducting this research, the sample size of 50 employees of Netbox Blue Company has been selected by the researcher for conducting the survey. Along with this, 3 managers of the company would be interviewed.
5 MANAGEMENT Sampling approach The employees of the company would be selected through the application of the simple random technique. The managers would be selected through the criterion of experience. Summary of the findings Internet acts as a primary sources for the companies and organizations to revolutionize the business. As a matter of specification, it has assisted the staffs to conduct offshore management for globalizing the operations. According to the recent trends, there has been a simultaneous increase in the rise of advanced software as well as cyber threats (Brewer, 2015). There is a need for evaluation of the security measures to maintain the efficiency in the security policies. The main areas in which the evaluation or risk assessment needs to be conducted is indirect attack through the means of hacking. Using Information Technology Data Protection (ITDP) has assisted the company staffs to deal with the challenges of cybercrime in an efficient and effective manner. In the evaluation process, conscious approach is laid to the unauthorized sources from which the data has been processed. In case of cloud computing, the coverage extends to that of the cybersecurity as well as physical. Meetings, audits andreviewsformanimportantcomponentoftheevaluationprocess.These meetings align with the integrated structure, acting as an agent for enhancing the efficiency in the operations. As per the arguments of Neal and Ilsever, (2016), damages from the hardware and software are also considered for assessing the extent to which the risk assessment is needed to be performed for ensuring the wellbeing of the clients and the customers. One of the other parameters in this context is that of evaluating the hazards through injecting and accessing the network of data codes. Mention can be made of the virtualization tool, which has helped the staffs of Netbox Blue Company to secure the information, which are processed for enhancing the scope and arena of the supply chain network. The approach of the network operator is important in terms of enhancing the visualization skills of the employees. Along with this, Iovan and Iovan, (2016) mentions about the virtualisation, which consists of the advantages and disadvantages of the security threats. This assessment, in turn, proves beneficial for
6 MANAGEMENT mapping the arenas in which the security is to be applied. The criteria considered in thiscontextisthatthepersonswithhigherself-confidenceproposeseffective measures to be implemented for enhancing the security measures. The level of growth in the parameter of information technology encounters simultaneousgrowthwiththatofthemarginsofthenetwork.Asamatterof specification, there are different kinds of threats, which the companies like Netbox Blue encounters. In this context, mention can be made of the example of the Australian economy, which is vulnerable to cyber threats. The major drive behind this is the number of people accessing the online sites. In the current context, Gonzalez- Granadillo et al., (2018) opines that criminal activities like hacking has increased to such an extent that it compels the companies to encounter severe losses. The instances of security breaches are not uncommon. The research brings the instances into the limelight by highlighting the adverse impact on the information security. This is applicable also in the plans for organizing the products and services. Intheevaluationprocess,theconsiderableparametersaretimeconsistency, advanced tools and quality. Preparation of security data and communication tools relates with the planning activities. In this context, mention can be made of liaison, cyber security and teamwork. Rational approach in this context is reflected from the ensuring whether the information are in perfect alignment with the needs, demands and requirements. Specific mention can be made of the arguments of Adebiaye, Alryalat and Owusu, (2016) who argues that communication tools, which helps the managers to establish contact with the clients and the customers. In this process, conscious approach needs to be attached towards the information, which is being processed from the internal to the external environment. Along with this, the evaluation has excavated the fact that implementation of security tools is a time consuming process, compelling the staffs to experience delay in delivering the orders according to the requirements of the clients and the customers. One of the striking issues is that cyber threats acts as obstacles in standardizing the processes. Perceiving from the perspective of the Australian government, ICT is one of the agents through which technological advancement finds its applicability in the workplace. In this context, maintenance of the standards is crucial for enhancing the
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
7 MANAGEMENT standards and quality of the transactions related to the data (Lehto & Neittaanmäki, 2015). Afterreviewingtheresearchpropositions,itcanbeinferredthatthe challenges faced by the businesses have altered the nature of the businesses in the workplace. Innovations in this context relates to the collaboration with the members of the engineers and the research and development team for adopting latest and modern software for protecting the data. Within this, mention needs to be made of the challenges, which the businesses face. Cyber espionage in cloud is one of the main challenge, which adversely affects the activity of the data processing. In this context, reliance on the virtual shortage is the main essence. According to the propositions of Williams et al., (2019), it has been found that cloud computing has been adopted by most of the companies. The attackers directly penetrate into the privatedatastoredbythecompany.Thehackersattackthehybridcloud technologies to gain an insight into the trade secrets, customer data and confidential data. Along with this, unknown IT assets on the networks is also a challenge for Netbox Blue Company. Improper networks aggravates the risks and complexities of attacks. Too much reliance on the attacks is problematic in terms of mapping the appropriate behaviour towards the mitigating the cyber security threats. Tracking the identity of the attackers is also difficult. This is a challenge in terms of securing the data processes and transferring it to the external environment. According to the statements of Cyber Security Intelligence Index, 60% of the attacks initiate from the internal environment (Adebiaye, Alryalat & Owusu, 2016). This highlights the trust issues in case of the users. In most of the cases, it has been found that provision of wrong information generates critical issues in sending emails to the clients and the customers. Information leakage is one of the other challenges in this context, which if doneintentionally,increasestheeaseoftheattackerstohackthepersonal information of the clients and the customers. Apart from this, mention can be made of the lack of security management issues, which is accounted as one of the essential challenges. Absence of skilled and efficient employees aggravates the difficulties in terms of handling the operations. Sometimes the staffs miss out the
8 MANAGEMENT reporting for the cyber security alerts, which compels the organizations like Netbox Blue to face delays in completing and submitting the projects within the stipulated time. One of the main factors in this context is that of recruiting the right candidate for fulfilling the task of data processing. In this case, Iovan and Iovan, (2016) mentionsaboutthetraininganddevelopmentprograms,whichwouldhelpin enhancing awareness about the detailed and expanded mechanisms of the supply chainnetwork.Strategicapproachisbeneficialintermsofachievingpositive outcomes. One of the strategies in this context can be implementation of the secured communication methods. Unsafe communication directly relates to the cyber threats. Insecure communication channels puts the security of the emails at stake. Apart from this, using secure passwords need to be included in the strategies. The passwords need to be sophisticated, so that it is easier to secure the password from the hackers. Evaluating the consequences of hacking the passwords is one of the effective steps for tracking the areas through which the hackers can penetrate into the private data and information of Netbox Blue Company. Along with this, Brewer, (2015) mentions about the secure backup plans, which are crucial for achieving maximum benefits of the available time. These plans are an agent in terms of retrieving the essential data, which is needed for enhancing the efficiency in the operations. Knowledge about the locations in which the data is stored is to be flexible, so that the lost data can be easily restored. In this context, one cloud data is not sufficient. Keeping alternatives would be a planned and reasoned action for averting the instances of data leakage, which can stall the processing of data from the internal to the external environment. Mobile application of risk assessment is beneficial in terms of enhancing the efficiency in the security and privacy of the operations. In case of the malware, the security threats are high, as it occupies the clients and the customers. Cybersecurity plansarenecessaryintermsofassessingthefeasibilityofthenewtoolsin managing the data processing activities. In this context, Shackelford, (2016) is of the view that social media is one of the digital platforms, where cyber threats can attain maximum risks. This is because large number of people post comments about the issues.
9 MANAGEMENT Conclusion Cybersecurity is one of the crucial challenges in the current business context. This issue aggravates the risks in the securing the data and information, which are stored for disseminating to the clients and the customers. Strategic management is reflected from developing strategies, so that positive outcomes can be achieved. Typical evidence of this lies in keeping backup plans, recruiting the right people and conductingtraininganddevelopmentprogramsfortheemployees.Toolsand techniques like risk assessment and problem solving cycle is effective in terms of mapping the scope and arena in which the hackers can penetrate into the personal data and information of Netbox Blue Company.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
10 MANAGEMENT References Adebiaye, R., Alryalat, H., & Owusu, T. (2016). Perspectives for cyber-deterrence: A quantitativeanalysisofcyberthreatsandattacksonconsumers.International Journal of Innovative Research in Science, Engineering and Technology, 5(7). Brewer, R. (2015). Cyber threats: reducing the time to detection and response. Network Security, 2015(5), 5-8. Gonzalez-Granadillo,G.,Dubus,S.,Motzek,A.,Garcia-Alfaro,J.,Alvarez,E., Merialdo, M., ... & Debar, H. (2018). Dynamic risk management response system to handle cyber threats. Future Generation Computer Systems, 83, 535-552. Green, J. S. (2016). Cyber Security: An Introduction for Non-technical Managers. Routledge. Iovan, S., & Iovan, A. A. (2016). FROM CYBER THREATS TO CYBER-CRIME. Journal of Information Systems & Operations Management, 10(2). Lehto, M., & Neittaanmäki, P. (Eds.). (2015). Cyber security: Analytics, technology and automation (Vol. 78). Springer. Neal, P., & Ilsever, J. (2016). Protecting information: Active cyber defence for the business entity: A prerequisite corporate policy. Academy of Strategic Management Journal, 15(2), 15. Papastergiou, S., & Polemi, N. (2018). MITIGATE: A dynamic supply chain cyber risk assessment methodology. In Smart Trends in Systems, Security and Sustainability (pp. 1-9). Springer, Singapore. Shackelford, S. J. (2016). Business and cyber peace: We need you!. Business Horizons, 59(5), 539-548. Trim, P., & Upton, D. (2016). Cyber security culture: Counteracting cyber threats through organizational learning and training. Routledge. Williams, M. L., Levi, M., Burnap, P., & Gundur, R. V. (2019). Under the corporate radar: Examining insider business cybercrime victimization through an application of routine activities theory. Deviant Behavior, 40(9), 1119-1131.