HI6008 Business Research on Cybersecurity Challenges

Added on - Mar 2020

Trusted by 2+ million users,
1000+ happy students everyday
Showing pages 1 to 4 of 19 pages
Running head: CYBERSECURITY CHALLENGES FOR BUSINESSES1Cybersecurity Challenges for BusinessesNameInstitution
CYBERSECURITY CHALLENGES FOR BUSINESSES2TABLE OF CONTENTS1.0 Introduction..............................................................................................................................42.0Project Objective.....................................................................................................................43.0 Project Scope............................................................................................................................44.0 Literature Review....................................................................................................................54.1 Introduction..........................................................................................................................54.2 Resasons for cyberattcks.....................................................................................................54.21 Lack of security...............................................................................................................54.22 Availability of mobile wallets.........................................................................................54.23 Popularity of Social Sites.................................................................................................64.24 Negligence.......................................................................................................................64.3 Cybersecurity Challenges for Business..............................................................................64.31 Malware...........................................................................................................................74.32 Inside risk.........................................................................................................................74.33 Hacking............................................................................................................................74.34 Phishing...........................................................................................................................84.35 Drone jacking...................................................................................................................84.36 DDoS Attack....................................................................................................................84.4 Recent Cyberattacks on companies...................................................................................84.41 Sony Pictures Entertainment............................................................................................84.42 GoDaddy..........................................................................................................................94.43 Yahoo...............................................................................................................................94.44 Morgan Stanley................................................................................................................94.5 Strategies to mitigate cybersecurity attacks......................................................................94.51 Dedicated Budget.............................................................................................................94.52 Physical Protection..........................................................................................................94.53 Encryption of Data.........................................................................................................104.54 Antivirus and passwords................................................................................................104.55 Security Culture.............................................................................................................104.6 Research gap......................................................................................................................105.0 Research Questions................................................................................................................115.1 Primary Question...............................................................................................................115.2 Secondary Questions.........................................................................................................116.0 Research Design and Methodology......................................................................................11
CYBERSECURITY CHALLENGES FOR BUSINESSES36.1 Research design..................................................................................................................116.2 Sampling.............................................................................................................................116.3 Sample size and the participants......................................................................................116.4 Data collection....................................................................................................................126.5 Research validity................................................................................................................126.6 Research reliability............................................................................................................127.0 Research limitation................................................................................................................138.0 Research plan.........................................................................................................................139.0 Conclusion..............................................................................................................................1310. Reference List..........................................................................................................................1511.1 Cyber-crime rate report..................................................................................................1811.2 Cyberattack targets.........................................................................................................1811.3 Top cybersecurity challenges in 2016............................................................................19
CYBERSECURITY CHALLENGES FOR BUSINESSES41.0 IntroductionIncrease in technology is pushing businesses to embrace internet as a medium ofconducting businesses. Big and small companies are setting up websites in the World Wide Webto tap the ever growing global market. However, with the increase, cyber vandals are also takingadvantage of the situation to sabotage businesses by stealing confidential information. Manycompanies have been brought down by acts of cyber-attacks. Therefore, cyber security is achallenge that most businesses are struggling to cope with (Singer & Friedman, 2014). In theGlobal scene, Google has suffered acts of cyberattack which show that cybersecurity is an issuewhich need redress. Furthermore, the last American elections also had cases of hacking into theirelections system. From those examples, it is clear that cybersecurity is very important forbusinesses.2.0Project ObjectiveThe general objective of this project is to examine the challenges of cybersecurity forbusinesses.On the other hand, the specific objectives of this project include;i.To identify ways through which cyber-attackers use to threaten businessesii.To examine strategies to mitigate the cybersecurity issues.3.0 Project ScopeThe usage of internet based services and their impact on security will be evaluated in thereport. The theories of technical experts to enhance cyber security will be discussed in the report.
Desklib Logo
You are reading a preview
Upload your documents to download or

Become a Desklib member to get access