Cyber Security Report: Data Security in Organizations - Analysis
VerifiedAdded on 2021/04/16
|7
|1273
|365
Report
AI Summary
This report delves into the realm of cyber security, emphasizing its critical role in protecting data within computing devices. It examines various techniques, including one-time passwords and firewalls, highlighting their significance in safeguarding networks and preventing unauthorized access. The research addresses the challenges faced in data collection and the methodologies employed, such as qualitative research and sample population selection. The report poses research questions concerning the reasons for implementing cyber security, its advantages, and the best techniques used. It presents hypotheses related to data security, filtering, and cryptography. The analysis involves correlation techniques to interpret collected data, offering a comprehensive overview of cyber security practices and their impact on data protection within organizations.

Running Head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author note
Cyber Security
Name of the Student
Name of the University
Author note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CYBER SECURITY
Table of Contents
Summary..........................................................................................................................................2
Research Problem............................................................................................................................2
Hypothesis.......................................................................................................................................3
Research Questions..........................................................................................................................3
Question 1....................................................................................................................................3
Question 2....................................................................................................................................3
Question 3....................................................................................................................................3
Hypothesis 1................................................................................................................................3
Hypothesis 2................................................................................................................................3
Hypothesis 3................................................................................................................................3
Research method..............................................................................................................................4
Selection of sample population........................................................................................................4
Collection of data.............................................................................................................................5
Analyzing the collected data............................................................................................................5
Reference.........................................................................................................................................6
Table of Contents
Summary..........................................................................................................................................2
Research Problem............................................................................................................................2
Hypothesis.......................................................................................................................................3
Research Questions..........................................................................................................................3
Question 1....................................................................................................................................3
Question 2....................................................................................................................................3
Question 3....................................................................................................................................3
Hypothesis 1................................................................................................................................3
Hypothesis 2................................................................................................................................3
Hypothesis 3................................................................................................................................3
Research method..............................................................................................................................4
Selection of sample population........................................................................................................4
Collection of data.............................................................................................................................5
Analyzing the collected data............................................................................................................5
Reference.........................................................................................................................................6

2CYBER SECURITY
Summary
Cyber security is a technological tool that has been used for the purpose of protecting the
data present in the computing devices. The technology has been gaining popularity since the
latter half of the last decade. Different techniques have been put into use for the protection of the
computing devices. One time password has been one of the most used technological tools that
are being used in the present scenario. The one time password technique provides robustness to
the networking system making the system inaccessible after a certain time of inactiveness in the
application. Installation of the firewall is also being used for protecting the networking system
from the unauthorized poachers that intend to access the data with the concern of the genuine
client. The cyber security tool protects the computing system from the harmful viruses that target
the computing devices that are not pre installed with the cyber security tool. The virus tends to
affect the computing device by making the encrypting the data of the device and making it
unavailable for the clients to use the same. The cyber security tools also protects the device from
the Trojan virus and the hackers who intend on gaining an unauthenticated access to the data for
which the permission is not granted.
Research Problem
Coping with the change
The exact data that is required in the task was not present in the sites. The data was to be
integrated from a huge number of websites to get the appropriate data. Information from several
sites has been made use of in order to get the proper data that is relevant to the project.
Improper access to the resources
Summary
Cyber security is a technological tool that has been used for the purpose of protecting the
data present in the computing devices. The technology has been gaining popularity since the
latter half of the last decade. Different techniques have been put into use for the protection of the
computing devices. One time password has been one of the most used technological tools that
are being used in the present scenario. The one time password technique provides robustness to
the networking system making the system inaccessible after a certain time of inactiveness in the
application. Installation of the firewall is also being used for protecting the networking system
from the unauthorized poachers that intend to access the data with the concern of the genuine
client. The cyber security tool protects the computing system from the harmful viruses that target
the computing devices that are not pre installed with the cyber security tool. The virus tends to
affect the computing device by making the encrypting the data of the device and making it
unavailable for the clients to use the same. The cyber security tools also protects the device from
the Trojan virus and the hackers who intend on gaining an unauthenticated access to the data for
which the permission is not granted.
Research Problem
Coping with the change
The exact data that is required in the task was not present in the sites. The data was to be
integrated from a huge number of websites to get the appropriate data. Information from several
sites has been made use of in order to get the proper data that is relevant to the project.
Improper access to the resources
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CYBER SECURITY
The websites and the resources that had proper data stored in them which are relevant with
the present topic are not free resources and the websites are paid websites which charges in hefty
amount to possess access to it. The paid sites were even sometime unable to provide the exact
data that is required for the project.
Hypothesis
Research Questions
Question 1
What are the reasons of implementation of the Cyber security in the organizations that need their
data to stay protected from the imposters?
Question 2
What are the advantages of Cyber Security if implanted in the organization?
Question 3
What are best techniques that are being used as the cyber security tool in the organizations to
protect their data from the imposters?
Hypothesis 1
H0: Cyber security does not help in keeping the data secured.
H1: Cyber Security helps in keeping the data secure.
Hypothesis 2
H0: Cyber security does not take into consideration the aspect of filtering data.
H1: Cyber security takes into consideration the aspect of filtering data.
Hypothesis 3
H0: Cryptography is not the best technique that is used for the cyber security process.
H1: Cryptography is the best process that is used for cyber security.
The websites and the resources that had proper data stored in them which are relevant with
the present topic are not free resources and the websites are paid websites which charges in hefty
amount to possess access to it. The paid sites were even sometime unable to provide the exact
data that is required for the project.
Hypothesis
Research Questions
Question 1
What are the reasons of implementation of the Cyber security in the organizations that need their
data to stay protected from the imposters?
Question 2
What are the advantages of Cyber Security if implanted in the organization?
Question 3
What are best techniques that are being used as the cyber security tool in the organizations to
protect their data from the imposters?
Hypothesis 1
H0: Cyber security does not help in keeping the data secured.
H1: Cyber Security helps in keeping the data secure.
Hypothesis 2
H0: Cyber security does not take into consideration the aspect of filtering data.
H1: Cyber security takes into consideration the aspect of filtering data.
Hypothesis 3
H0: Cryptography is not the best technique that is used for the cyber security process.
H1: Cryptography is the best process that is used for cyber security.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CYBER SECURITY
Research method
The methodology that has been used for the research of the project is Qualitative in
nature. Qualitative research methodology is a broad means of research process that intends to
complete the research of project using the means that are available through the literature
manifested in the respective topic of research title (Campanella, 2017). The qualitative research
is done by going through the sources of information that has been already generated by other
personnel on whom one individual can rely on referencing for the entire process (Issam, 2018).
Manual survey regarding the processing of the project is not taken into consideration for the
qualitative way of research methodology.
Selection of sample population
The selection process that has been in use is the sample population process. Random
sample technique is that sampling technique that includes the equity maintained in the sampling
process for choosing a sample (Sample & Allen, 2017). The technique of selecting the sample
with equity in probability in the selection process, the unbiased selection technology enables to
get the real time sample presentation of the data that represent the entire population (Arezzo &
Guagnano, 2018). If for any reason the sample does not represent the entire population then their
must e any kind of sampling error in the process that has been already performed (Sun, et al
2014). The process takes into consideration the APUS faculty and students. The sample
population size is 50.
Research method
The methodology that has been used for the research of the project is Qualitative in
nature. Qualitative research methodology is a broad means of research process that intends to
complete the research of project using the means that are available through the literature
manifested in the respective topic of research title (Campanella, 2017). The qualitative research
is done by going through the sources of information that has been already generated by other
personnel on whom one individual can rely on referencing for the entire process (Issam, 2018).
Manual survey regarding the processing of the project is not taken into consideration for the
qualitative way of research methodology.
Selection of sample population
The selection process that has been in use is the sample population process. Random
sample technique is that sampling technique that includes the equity maintained in the sampling
process for choosing a sample (Sample & Allen, 2017). The technique of selecting the sample
with equity in probability in the selection process, the unbiased selection technology enables to
get the real time sample presentation of the data that represent the entire population (Arezzo &
Guagnano, 2018). If for any reason the sample does not represent the entire population then their
must e any kind of sampling error in the process that has been already performed (Sun, et al
2014). The process takes into consideration the APUS faculty and students. The sample
population size is 50.

5CYBER SECURITY
Collection of data
The processes that have been used for collecting the data during the course of the project are
as follows: -
Collecting fresh data- during the course of the project, data collection has been the major
challenge as the data that has been implied in the project was not readily available
previously. Going through several literary articles has helped in collecting new data and
applying them in the project (Gorokh, et al 2015).
Using the data that has been previously collected- data implied on the project was already
been collected during performing some other project where the topics coincides with the
topics in the present project.
Surveys were being conducted in order to get data for the following process.
Analyzing the collected data
Analysis of information includes the terminology and the modulations that have been
implemented on the raw data to describe the facts which is required in the project. Detecting
pattern, hypothesis of data, explanation of the data is also a major function of analyzing the data.
Correlation technique is being used for the analysis of the data.
Collection of data
The processes that have been used for collecting the data during the course of the project are
as follows: -
Collecting fresh data- during the course of the project, data collection has been the major
challenge as the data that has been implied in the project was not readily available
previously. Going through several literary articles has helped in collecting new data and
applying them in the project (Gorokh, et al 2015).
Using the data that has been previously collected- data implied on the project was already
been collected during performing some other project where the topics coincides with the
topics in the present project.
Surveys were being conducted in order to get data for the following process.
Analyzing the collected data
Analysis of information includes the terminology and the modulations that have been
implemented on the raw data to describe the facts which is required in the project. Detecting
pattern, hypothesis of data, explanation of the data is also a major function of analyzing the data.
Correlation technique is being used for the analysis of the data.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6CYBER SECURITY
Reference
Sample, C., & Allen, B. (2017). The limits of weak selection and large population size in
evolutionary game theory. Journal of mathematical biology, 75(5), 1285-1317.
Arezzo, M. F., & Guagnano, G. (2018). Response-Based Sampling for Binary Choice Models
With Sample Selection. Econometrics, 6(1), 12.
Zhou, X., Bi, B., Zheng, L., Li, Z., Yang, H., Song, H., & Sun, Y. (2014). The prevalence and
risk factors for depression symptoms in a rural Chinese sample population. PloS
one, 9(6), e99692.
Campanella, C. (2017). DESIGN AND “RESTORATION”: THE ROOTS OF
ARCHITECTURE PORJECT FOR THE BUILT. In GEOMATICS & RESTORATION–
Conservation of Cultural Heritage in the Digital Era (pp. 669-672). ISPRS Internatiola
Society for Photogrammetry ad remote Sensing.
Issam, J. (2018). Palestine Red Crescent Society Information System.
Duzhyi, I. D., Gorokh, V. V., Trubilko, O. V., & Kharchenko, S. V. (2015). Software for medical
information system for audit and analysis of patients with gastrointestinal
bleedings. Цели и задачи, 78.
Reference
Sample, C., & Allen, B. (2017). The limits of weak selection and large population size in
evolutionary game theory. Journal of mathematical biology, 75(5), 1285-1317.
Arezzo, M. F., & Guagnano, G. (2018). Response-Based Sampling for Binary Choice Models
With Sample Selection. Econometrics, 6(1), 12.
Zhou, X., Bi, B., Zheng, L., Li, Z., Yang, H., Song, H., & Sun, Y. (2014). The prevalence and
risk factors for depression symptoms in a rural Chinese sample population. PloS
one, 9(6), e99692.
Campanella, C. (2017). DESIGN AND “RESTORATION”: THE ROOTS OF
ARCHITECTURE PORJECT FOR THE BUILT. In GEOMATICS & RESTORATION–
Conservation of Cultural Heritage in the Digital Era (pp. 669-672). ISPRS Internatiola
Society for Photogrammetry ad remote Sensing.
Issam, J. (2018). Palestine Red Crescent Society Information System.
Duzhyi, I. D., Gorokh, V. V., Trubilko, O. V., & Kharchenko, S. V. (2015). Software for medical
information system for audit and analysis of patients with gastrointestinal
bleedings. Цели и задачи, 78.
1 out of 7
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





