Ask a question from expert

Ask now

HI6008 Business Research on Cybersecurity Challenges

19 Pages3390 Words236 Views
   

HI6008 Business Research (HI6008)

   

Added on  2020-03-16

HI6008 Business Research on Cybersecurity Challenges

   

HI6008 Business Research (HI6008)

   Added on 2020-03-16

BookmarkShareRelated Documents
Running head: CYBERSECURITY CHALLENGES FOR BUSINESSES 1Cybersecurity Challenges for BusinessesNameInstitution
HI6008 Business Research on Cybersecurity Challenges_1
CYBERSECURITY CHALLENGES FOR BUSINESSES 2TABLE OF CONTENTS1.0 Introduction..............................................................................................................................42.0 Project Objective.....................................................................................................................43.0 Project Scope............................................................................................................................44.0 Literature Review....................................................................................................................54.1 Introduction..........................................................................................................................54.2 Resasons for cyberattcks.....................................................................................................54.21 Lack of security...............................................................................................................54.22 Availability of mobile wallets.........................................................................................54.23 Popularity of Social Sites.................................................................................................64.24 Negligence.......................................................................................................................64.3 Cybersecurity Challenges for Business..............................................................................64.31 Malware...........................................................................................................................74.32 Inside risk.........................................................................................................................74.33 Hacking............................................................................................................................74.34 Phishing...........................................................................................................................84.35 Drone jacking...................................................................................................................84.36 DDoS Attack....................................................................................................................84.4 Recent Cyberattacks on companies...................................................................................84.41 Sony Pictures Entertainment............................................................................................84.42 GoDaddy..........................................................................................................................94.43 Yahoo...............................................................................................................................94.44 Morgan Stanley................................................................................................................94.5 Strategies to mitigate cybersecurity attacks......................................................................94.51 Dedicated Budget.............................................................................................................94.52 Physical Protection..........................................................................................................94.53 Encryption of Data.........................................................................................................104.54 Antivirus and passwords................................................................................................104.55 Security Culture.............................................................................................................104.6 Research gap......................................................................................................................105.0 Research Questions................................................................................................................115.1 Primary Question...............................................................................................................115.2 Secondary Questions.........................................................................................................116.0 Research Design and Methodology......................................................................................11
HI6008 Business Research on Cybersecurity Challenges_2
CYBERSECURITY CHALLENGES FOR BUSINESSES 36.1 Research design..................................................................................................................116.2 Sampling.............................................................................................................................116.3 Sample size and the participants......................................................................................116.4 Data collection....................................................................................................................126.5 Research validity................................................................................................................126.6 Research reliability............................................................................................................127.0 Research limitation................................................................................................................138.0 Research plan.........................................................................................................................139.0 Conclusion..............................................................................................................................1310. Reference List..........................................................................................................................1511.1 Cyber-crime rate report..................................................................................................1811.2 Cyberattack targets.........................................................................................................1811.3 Top cybersecurity challenges in 2016............................................................................19
HI6008 Business Research on Cybersecurity Challenges_3
CYBERSECURITY CHALLENGES FOR BUSINESSES 41.0 IntroductionIncrease in technology is pushing businesses to embrace internet as a medium of conducting businesses. Big and small companies are setting up websites in the World Wide Web to tap the ever growing global market. However, with the increase, cyber vandals are also taking advantage of the situation to sabotage businesses by stealing confidential information. Many companies have been brought down by acts of cyber-attacks. Therefore, cyber security is a challenge that most businesses are struggling to cope with (Singer & Friedman, 2014). In the Global scene, Google has suffered acts of cyberattack which show that cybersecurity is an issue which need redress. Furthermore, the last American elections also had cases of hacking into theirelections system. From those examples, it is clear that cybersecurity is very important for businesses. 2.0 Project ObjectiveThe general objective of this project is to examine the challenges of cybersecurity for businesses. On the other hand, the specific objectives of this project include;i.To identify ways through which cyber-attackers use to threaten businessesii.To examine strategies to mitigate the cybersecurity issues. 3.0 Project ScopeThe usage of internet based services and their impact on security will be evaluated in the report. The theories of technical experts to enhance cyber security will be discussed in the report.
HI6008 Business Research on Cybersecurity Challenges_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Challenges in Cybersecurity for Businesses
|16
|2503
|42

Challenges in Cybersecurity in Business Assignment PDF
|12
|3096
|38

Network Security Management
|12
|3039
|83

Challenges in Cyber Security For Business
|18
|4370
|325

Cyber Security: Exploring the Various Aspects and Solutions
|29
|8168
|290

Human Behaviour in Cybersecurity: Impact on Data Security
|68
|13665
|232