Ask a question from expert

Ask now

HI6008 Cyber Attacks in Corporation - Report

14 Pages2665 Words87 Views
   

HI6008 Business Research (HI6008)

   

Added on  2020-05-28

HI6008 Cyber Attacks in Corporation - Report

   

HI6008 Business Research (HI6008)

   Added on 2020-05-28

BookmarkShareRelated Documents
Running head: RESEARCHResearch Methodology 2 Institution Name Student NameContents
HI6008 Cyber Attacks in Corporation - Report_1
RESEARCH2Contents.......................................................................................................................................................2Introduction.................................................................................................................................................3Project Objectives........................................................................................................................................3Project Scope...............................................................................................................................................3Literature Review........................................................................................................................................4Justification.............................................................................................................................................5Literature problems.................................................................................................................................6Gaps........................................................................................................................................................6Opportunities...........................................................................................................................................6Hypothesis...............................................................................................................................................6Research Questions.....................................................................................................................................6Research Design and Methodology.............................................................................................................6Time Schedule.............................................................................................................................................8Conclusion...................................................................................................................................................9References.................................................................................................................................................10Appendix...................................................................................................................................................11IntroductionThe introduction of digital technology has resulted in a rise in the use of smartphones as well as online services used by people and corporations. The use of smartphones has made it easier to 2 | P a g e
HI6008 Cyber Attacks in Corporation - Report_2
RESEARCH3access internet and online services by people. The use of internet-based services varies from assisting in performing operations such as banking, entertainment, communication, shopping andothers not mentioned. Modern companies have developed techniques to utilize this platform to offer their product and services directly to the consumers. With this, the use of intermediaries hasbeen drastically reduced resulting in lower operations cost. Despite the advantages brought by internet and smartphones, its increasing popularity is posing a threat to individuals and corporations. There has been an emergence of cybercriminals who attack companies and individuals to gain an unfair advantage. The remedy to this is the need for a cybersecurity software. In this research will concentrate on identifying and evaluating the challenges that cybersecurity has brought to the modern companies as well as individuals relying on the use of internet-based services. Afterwards, it will give a few recommendations that can assist minimize the issues identified.Project ObjectivesThe primary objective of the research is to evaluate the challenges that the modern companies face regarding cybersecurity as the use of the internet as well as online-based services goes up. Afterwards will conduct a literature review on the topic. The research will use information from companies that have faced cybercrime to understand and expound on the problem. The secondary target will then be to offer recommendations that can help firms enhance their cybersecurity.Project ScopeOne of the areas the report will cover is the vulnerability of corporations to cyber-attacks as well as the problems they face from the occurrence of cyber-attacks. The report will use various theories that have been designed by researchers on the issue, also, will illustrate several recommendations that canna assists fight cyber-crime.Literature ReviewThe past decade has seen the use of internet and online services grow tremendously among modern firms hence enabling provision of services via online platforms [CITATION Len10 \l 2057 ]. The increasing popularity has been a significant contributor to the growth of internet use as it also attracts companies online. Modern businesses rely on online platforms to perform several 3 | P a g e
HI6008 Cyber Attacks in Corporation - Report_3
RESEARCH4operations like recruitment, conducting surveys as well as customer interaction [CITATION Hol13 \l2057 ]. The use of internet has given small-scale entrepreneurs an equal opportunity to interact with the potential clients.There are firms like Uber, Facebook, and others whose entire services are provided online while others use the platform to improve the quality of their operations [CITATION Ede15 \l 2057 ]. The use and popularity of internet have enabled these firms to gain a competitive advantage. Due to the rapid growth of the use of the web, there is need to increase the capital allocated to cyber security [CITATION How09 \l 2057 ]. Cybercrimes have also increased with the increase in the use of the internet with online servers most prone to attack as they lack security guidelines. The attacks are directed towards gaining information regarding individuals and companies that can beused to cause financial as well as reputational damage.The number of glo0bal social media users have grown from 1.22 billion in 2011 to 2.26 billion in2017 this shows the rapid increase in social media popularity a factor which has fueled cybercrimes [CITATION Sán12 \l 2057 ]. Considering that the number is estimated to hit 3.02 billionby 2021 and with more users acting as an attraction to companies to the online platforms then cybersecurity is an issue of concern. Corporations like Oreo, old Spice have successfully implemented the social media marketing strategy to gain a competitive advantage in the market. On the other hand, several firms like HBO, Yahoo, BBC, and Sony have been hit with cyberattack issues.The increase in the use of mobile applications is also a contributor to cyber-attacks [CITATION Isl10 \l 2057 ]. As smartphones' usage increases so are the expansion of the mobile applications industry. Smartphones usage grew from 1.57 billion in 2014 to 2.32 billion in 2017; this number is projected to be around 2.87 billion globally by 2020, with this company like Facebook and WhatsApp are a potential target of cybercriminals. Most of the people who use social media havelittle information on cyber-crimes and end up avoiding the security features of the applications due to their complexity [CITATION Wri12 \l 2057 ].Below are several examples of online security problems faced by modern companies.DDoS4 | P a g e
HI6008 Cyber Attacks in Corporation - Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Challenges in Cyber Security For Business
|18
|4370
|325

HI6008 Business Research on Cybersecurity Challenges
|19
|3390
|236

Challenges in Cyber Security for Business - PDF
|13
|3118
|46

Challenges in Cyber Security Assignment PDF
|14
|3395
|193

Challenges and Strategies for Overcoming Cybersecurity Threats in Business
|14
|3661
|196

Business Research Method University Name Student Name Authors Note
|12
|2758
|38