Understand the Challenges Encountered by Organizations

Added on -2020-02-18

| 16 pages| 3874 words| 89 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 4 of 16 pages

Running head: CYBER SECURITY CHALLENGES0Business Research
CYBER SECURITY CHALLENGES1Table of ContentsIntroduction................................................................................................................................3Project Objective........................................................................................................................4Project Scope..............................................................................................................................4Literature Review.......................................................................................................................5Reason for Cyber Attacks......................................................................................................5Lack of Security.................................................................................................................5Mobile Wallet.....................................................................................................................5Popularity of Social Sites...................................................................................................5Negligence..........................................................................................................................6Cyber Security Challenges for Business....................................................................................6Malware..................................................................................................................................6Inside Risk..............................................................................................................................7Hacktivism.............................................................................................................................7Phishing..................................................................................................................................7Dronejacking..........................................................................................................................8DDoS Attack..........................................................................................................................8The Internet of Things............................................................................................................8Machine Intelligence..............................................................................................................8Recent Cyber Attacks.................................................................................................................9Suggestions for Better Security..................................................................................................9Conclusion................................................................................................................................11References................................................................................................................................12Appendix..................................................................................................................................14
CYBER SECURITY CHALLENGES2List of FiguresFigure 1: Cyber Crimes Attacks...............................................................................................14Figure 2: Increase in Phishing..................................................................................................14Figure 3: Targets of Cyber attacks...........................................................................................15Figure 4: Various Cyber Attack Methods................................................................................15
CYBER SECURITY CHALLENGES3Introduction With the advancement in digital age, the infrastructure of industries is improving as well. Organisations are implementing modern technology in their processes to provide their customers more facilities. Generally, the core of such facilities is the internet based system. The popularity of the internet has provided new opportunities to business, to increase their number of customers by providing better services. Peoples prefer internet based services because it saves time, money and gives more options to consumers. Due to the popularity of its services, hackers are using the internet to attack the data of organisations and persons. Cybercrimes has become a matter of national security in many countries. Many governments are using internet based systems to secure their confidential data and leakage of such data canbe a significant threat to national security. Individuals are also using internet services to communicate and share personal data more thanever. It is important for peoples, companies, and government to protect their data from hackers; therefore, it is necessary to implement cyber security policies. This report will discuss the problems faced by organisations why maintain their cyber security. The report will take the example of cyber-attack on Sony Corporation and other organisations to understand the motives for cyber-attacks and reason of the failure of an organisation to maintain proper security measures.

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this