Challenges of Business Cybersecurity: Strategies to Improve Cybersecurity in Business
Verified
Added on 2022/11/04
|13
|2987
|58
AI Summary
This research paper discusses the challenges of business cybersecurity and strategies to improve cybersecurity in business. It covers the meaning and concept of cybersecurity, challenges of cybersecurity in business, and strategies to improve cybersecurity in business.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running Head: RESEARCH RESEARCH
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RESEARCH2 Table of Contents Introduction......................................................................................................................................3 Project aim and Objectives..............................................................................................................3 Project scope....................................................................................................................................3 Literature review..............................................................................................................................4 Meaning and concept of Cyber Security......................................................................................4 Challenges of Cyber Security in Business...................................................................................5 Strategy to improve Cyber Security in Business.........................................................................6 Conclusion.......................................................................................................................................8 References........................................................................................................................................9
RESEARCH3 Introduction The organization used ITDP (information technology data protection) as well as information security for dealing with the cybercrime. Moreover, data security is a major problem in IT industry (Alkhalil and Ramadan, 2017). In addition, it is illustrated that the internet is becoming higher faster growth in the development of business development in both private as well as business performance. The internet is imperative in improving business development for both government organization as well as private. But, it could be imperative in developing threat of information structure. For data protection, the information tool creates several tools in area of cybersecurity. In addition, it is illustrated that cybersecurity is imperative issue in computer as well as information tool (Alkhalil and Ramadan, 2017). Moreover, the information protection should be evaluated by each organization to maintain as well as securing their information. Moreover, the tool era, each organization desires to mitigate cyber matter as well as increasing its operational effectiveness. Moreover, higher choose of internet, the privacy as well as protection highly needed by the organization. In age of 2006, privacy, as well as personal information, is enhancing in Australia. The information can be confronted by diverse forms such as direct as well as indirect attack. This information could be secured by the business for securing the business information (Ali, et al., 2017). Project aim and Objectives This study is emphasized on evaluating challenges of business cybersecurity. The following research objectives will be practiced to meet the research aim: To discovers conceptual understanding about cybersecurity To evaluate the challenges of cybersecurity in the business
RESEARCH4 To suggested cybersecurity approaches in business Project scope This study has a higher scope of the business as it increases knowledge about cybersecurity. It is imperative for readers to enhance the depth understanding of cybersecurity issues in the business. Moreover, this report also widens the scope for data tool business for developing the increasing about diverse approach to increase the cybersecurity in the performance of business. Literature review Meaning and concept of Cyber Security Levy et al. (2016) depicted that cybersecurity is determined as process, tools, and practices that are required to keep programs, data from damages as well as unauthorized evaluation. With respect to computing perspective, security considers both cybersecurity as well as physical. For improving cybersecurity, there is required to manage efforts by information structure. It is illustrated that cybersecurity is computer protection structure from damages of its hardware, software, as well as information. It prevents information by theft as well as disruption of services that they offered. On the other side, Lin and Bergmann (2016) examined that cybersecurity considers the physical evaluating from hardware’s as well as maintaining against the hazard that may come by evaluating the injection and accessing networks of data code. IT security could be vital and securing information through effective tools. In the current period, the internet is a vital technique for both business well as individual’s users but their security is becoming a crucial issue. Security is an imperative component that makes confidence among individuals internet that is needed for any kind of business to increase commercial growth.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
RESEARCH5 Arabo (2015) illustrated thatvirtualizationtool is practiced byNetbox Blue Companyto secure the information networking procedure. It is imperative for cloud computing in the organization. This tool is practiced in network operator approach in the visualization of network acts. Through this method, it isopinedthat virtualization discusses diverse advantages as well as measures of security threats that require to build reliance on the consumers towards the computing structure by disputing threats. It also assures that person could have self-confidence in the application of security that could enhance the IT organization productivity. On the other side, Shackelford (2016) illustrated that level of growth relies on network of digital structure as well as goods and services. Moreover, the business depends on variety of cyber threats because online sites are accessed by the huge number of people that can threaten the Australian consistency economy. It is illustrated that criminal activity is becoming a major issue in the current era. It is illustrated that there is wide range of security breaches that have a negative impact on the information communication tools structure. It is examined that the number of cybercrime has been increased which could be secure and prevent acts of information tool. The cybercrime could affect the higher growth of the business. On the other hand, Tweneboah-Koduah et al. (2017) maintaining the time consistency, advanced tool, and product quality service is the key issue for the organization. Therefore, the organization should practice secure data as well as communication tool from begging as well as over its lifetime. It is also examined that there are different information tool organization that uses liaison, cybersecurity, as well as team coordination to make sure that all information tool that practices the cybersecurity to make sure all the information are together as well as did not copy share from anywhere. It is examined that Netbox Blue Pty Ltd is a profit of company that enables standard for data as well as communication tool as well as offers security of networks.
RESEARCH6 Abomhara (2015) depicted that cybersecurity tool takes higher time to secure the data caused by long derivation instandardization. Moreover, the Australian government could make a higher profit by considering ICT standard that should be considered by Technology Company to maintain cybersecurity in the organization. Challenges of Cyber Security in Business Yang and Wen (2017) depicted that a wide area of mobile tools is practiced by number of a person in Australia that creates possibilities of occurring security risk. In the current era, people changed information of smartphone from another as it affects the overall performance of the organization. There is lack of privacy of maintaining thieves with higher target malware as well as attracts occupy in the mobile apps. Moreover, there is also issue of stolen as well as lost as the organization requires to create new tools as well replacing old with new tools by practicing cybersecurity plan. On the other side, Benmamoun et al. (2016) stated that social media is practiced by an individual that might develop an individual cyber threat. Selection of social media might create the cyberattack threat in the organization. For eliminating the risk, the organization should evaluate the policies as well as process about cybersecurity as well as create more tool for networking monitor, data leakage prevention, as well as log evaluation. Liyanage et al. (2018)argued that a large number of organization practices could compute to data security. It is imperative to secure the effectiveness to secure the time as well effectiveness of business procedure. Moreover, well structural design as well as operational security plan for managing the risk of cloud computing. It is evaluated thatNetbox Blue Pty Ltd could face different cloud computing issues because the data security stored data from the cloud.
RESEARCH7 Therefore, there is requisite to practice effective approaches as it could decline the company goodwill. In support of this, Sadeghi et al. (2015) stated that the organization should protect the structure than data. Moreover, business could create the procedure to secure the data that could be imperative to develop equal image among the consumers. Moreover, it is examined that new tool and structure will develop the issues in business to control cybercriminal acts. It would support to improve issues of security. It is evaluated that development of new tool the structure named as iPhone, iPad, and Android. It might develop new threats. Hence, the organization should practice imperative cybersecurity rules to creative cyber issues in organization. Moreover, the internet of thing is an effective tool that assists to the organization for meeting the organizational task. In addition, it is examined that internet of tool infrastructure becomes a conventional business of threats. Strategy to improve Cyber Security in Business As per the opinion of He et al. (2016) privacy by design is an effective approach for keeping privacy by keeping the security into design specification as well as, designing of new process and system rather than trying to eliminate it. It can be evaluated that designing procedures, projects as well as, products and system with privacy support for eliminating the risk and developing trust between individuals with respect to firm. In addition to this, potential concerns can be evaluated at initial phase as it will be simpler in order to eliminate the cyber threat with reducing expenses. Netbox Blue Pty Ltd practices European Committee related to Electrotechnical Standardization were, company has permitted to execute the privacy through designing.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
RESEARCH8 In favor to this, Teoh and Mahmood (2017) evaluated that company can use set of standard in order to manage the confidential as well as, personal data protection concerns from primary stage in designing and development of security technologies and services. Moreover, TC cyber technology can be implemented by firm for keeping privacy. This technology could be implemented for creating the technical report as well as, formation of high-level controlled eco- system. It is also beneficial for organization to meet the requirement of security design as well as, interacting by securing IT networks as well as, attached systems. Pereira et al. (2017) stated that TC cyber technology offers privacy confirmation and assurance as it can be advantageous for maintaining the confidentiality of data. This technology facilitates the identity management as well as, scheme protection system with the purpose of avoiding crime and theft. It is evaluated that sharing of cyber threat intelligence could be main technology for eliminating the cyber concerns from firm. TC cyber technology can be implemented for developing technical report as well as, describing and exchange cyber threat information in standardized and structured manner. It would facilitate as well as, keeping global overview of cybersecurity practices in technical manner. On the other hand, Patrick and Fields (2017) evaluated that metrics and statistics can be implemented by a firm for evaluating the cybersecurity. The lack of static tool of assessing the day could develop quality concerns as well as, constructing questionable outcomes. It could develop obstacles in development of contextual along with usable cyber threat intelligence. Tisdale (2015) illustrated that reference model with information security indicator can be implemented by an organization in order to measure the data security risk. This model illustrates the security data and event management strategy. It considers data security ecosystem along with, security operation centers. Through application of this technology, firm can create ISO
RESEARCH9 compliant measurement design related to cybersecurity. It makes competent to organization for developing communication between spreading to exposure tool as well as, can constructing the approach to develop secure SOC. The firm can update key performance security indicator because it could be advantageous for evaluating the security maturity. In support of this, Cameron and Marcum (2019) addressed that TC cyber technology could be implemented for addressing different features of security like lawful interception and data retention. This can be beneficial for assuring originator and integrity regarding security approval. In such a manner, company addresses the security challenges in around the role of international business as well as, virtual component of law enforcement tools. Conclusion Throughout the above interpretation, it could be concluded that cybersecurity is illustrated as the process, practices, and technology that is designed for keeping computer program, data and network through unauthorized damages and access. It could be concluded that cybersecurity entails controlling to physical access through hardware along with, protecting data networking process.It can be summarized that keeping the timing of constancy, advanced technologies as well as, quality of products and services are some challenges for firm. Hence, firm should protect information and communication technology from initiating the business as well as, all over their existence. It can be concluded that there is no privacy related to eliminating thieves through targeted malware as well as, application of mobile. Moreover, social media is highly used by an individual that can create personal cyber threat concerns. Cloud computing can develop the business in order to secure the information. In addition to this, application of new system and
RESEARCH10 platform at workplace can develop concern for firm in terms of managing cybercriminal practices.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
RESEARCH11 References Abomhara, M., 2015. Cybersecurity and the internet of things: vulnerabilities, threats, intruders and attacks.Journal of Cyber Security and Mobility,4(1), pp.65-88. Ali, W., Dustgeer, G., Awais, M. and Shah, M.A., 2017, September. IoT based smart home: Security challenges, security requirements, and solutions. In2017 23rd International Conference on Automation and Computing (ICAC)(pp. 1-6). IEEE. Alkhalil, A. and Ramadan, R.A., 2017. IoT data provenance implementation challenges.Procedia Computer Science,109, pp.1134-1139. Arabo, A., 2015. Cybersecurity challenges within the connected home ecosystem futures.Procedia Computer Science,61, pp.227-232. Benmamoun, M., Sobh, R., Singh, N. and Moura, F.T., 2016. Gulf Arab E‐Business Environment: Localization Strategy Insights.Thunderbird International Business Review,58(5), pp.439-452. Cameron, E.A. and Marcum, T.M., 2019. Why Business Schools Must Incorporate Cybersecurity into The Business Curriculum: Preparing the Next Generation for Success.Journal of Higher Education Theory and Practice,19(4). He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y. and Gabrys, B., 2016, July. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In2016 IEEE Congress on Evolutionary Computation (CEC)(pp. 1015-1021). IEEE. Levy, J., Yu, P. and Prizzia, R., 2016. Economic Disruptions, Business Continuity Planning and Disaster Forensic Analysis: The Hawaii Business Recovery Center (HIBRC) Project. InDisaster Forensics(pp. 315-334). Springer, Cham.
RESEARCH12 Lin, H. and Bergmann, N., 2016. IoT privacy and security challenges for smart home environments.Information,7(3), p.44. Liyanage, M., Ahmad, I., Abro, A.B., Gurtov, A. and Ylianttila, M. eds., 2018.A Comprehensive Guide to 5G Security. John Wiley & Sons. Patrick, H. and Fields, Z., 2017. A need for cybersecurity creativity. InCollective Creativity for Responsible and Sustainable Business Practice(pp. 42-61). IGI Global. Pereira, T., Barreto, L., and Amaral, A., 2017. Network and information security challenges within Industry 4.0 paradigm.Procedia Manufacturing,13, pp.1253-1260. Sadeghi, A.R., Wachsmann, C. and Waidner, M., 2015, June. Security and privacy challenges in industrial internet of things. In2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC)(pp. 1-6). IEEE. Shackelford, S.J., 2016. Business and cyber peace: We need you!.Business Horizons,59(5), pp.539-548. Teoh, C.S. and Mahmood, A.K., 2017, July. National cyber security strategies for digital economy. In2017 International Conference on Research and Innovation in Information Systems (ICRIIS)(pp. 1-6). IEEE. Tisdale, S.M., 2015. Cybersecurity: Challenges from a Systems, Complexity, Knowledge Management and Business Intelligence Perspective.Issues in Information Systems,16(3). Tweneboah-Koduah, S., Skouby, K.E. and Tadayoni, R., 2017. Cyber security threats to IoT applications and service domains.Wireless Personal Communications,95(1), pp.169- 185.
RESEARCH13 Yang, S.C. and Wen, B., 2017. Toward a cybersecurity curriculum model for undergraduate business schools: A survey of AACSB-accredited institutions in the United States.Journal of Education for Business,92(1), pp.1-8.