Cyber Security Report: Cloudreach Ltd. and Cyber Security Measures
VerifiedAdded on 2020/06/06
|19
|4187
|46
Report
AI Summary
This research project analyzes cyber security measures for Cloudreach Ltd., focusing on educating IT professionals to prevent cybercrime and protect confidential information. The report examines the background, scope, aims, and rationale of the study, followed by a literature review exploring the ethical considerations of data security and cybercrime. The research methodology includes deductive, inductive, and abductive approaches to data collection. The project activities are outlined in a Gantt chart, and the conclusion and recommendations address how Cloudreach Ltd. can improve its cyber security practices, emphasizing the importance of ethical behavior and data protection. The study highlights the significance of cyber security in safeguarding the company's data and maintaining its market position by addressing unethical practices and cybercrime.

RESEARCH PROJECT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Abstract:
Cyber security is crucial for any entity to prevent occurred frauds regarding sharing its
confidential information. Therefore, this report is to understand different aspects of cyber
security and ideas for securing information of Cloudreach Ltd. In addition to this, various tools
and techniques are introduced to educate IT professionals for cyber security and protecting
organisation from frauds through this assignment.
Cyber security is crucial for any entity to prevent occurred frauds regarding sharing its
confidential information. Therefore, this report is to understand different aspects of cyber
security and ideas for securing information of Cloudreach Ltd. In addition to this, various tools
and techniques are introduced to educate IT professionals for cyber security and protecting
organisation from frauds through this assignment.

TABLE OF CONTENTS
TITLE..............................................................................................................................................1
INTRODUCTION...........................................................................................................................1
Background.................................................................................................................................1
Scope...........................................................................................................................................2
Aims and objectives....................................................................................................................2
Rationale of the study..................................................................................................................3
LITERATURE REVIEW................................................................................................................3
RESEARCH METHODOLOGY.....................................................................................................5
PROJECT ACTIVITIES..................................................................................................................8
Gantt chart: ....................................................................................................................................10
CONCLUSION..............................................................................................................................11
RECOMMENDATIONS...............................................................................................................11
REFERENCE.................................................................................................................................13
APPENDICES...............................................................................................................................15
TITLE..............................................................................................................................................1
INTRODUCTION...........................................................................................................................1
Background.................................................................................................................................1
Scope...........................................................................................................................................2
Aims and objectives....................................................................................................................2
Rationale of the study..................................................................................................................3
LITERATURE REVIEW................................................................................................................3
RESEARCH METHODOLOGY.....................................................................................................5
PROJECT ACTIVITIES..................................................................................................................8
Gantt chart: ....................................................................................................................................10
CONCLUSION..............................................................................................................................11
RECOMMENDATIONS...............................................................................................................11
REFERENCE.................................................................................................................................13
APPENDICES...............................................................................................................................15

ILLUSTRATION INDEX
Illustration 1: Network diagram.....................................................................................................10
Illustration 2: Gantt chart...............................................................................................................11
Illustration 1: Network diagram.....................................................................................................10
Illustration 2: Gantt chart...............................................................................................................11
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

TITLE
“To educate IT professionals to prevent from cyber crime: A case study on Cloudreach
Ltd.”
INTRODUCTION
Cyber security refers to IT security which remains effective to protect computer systems
including hardware and software as well information from their damage. It is essential to prevent
confidential data of the organisation as per ethical considerations. The present report is based on
understanding different aspects to educate employees of the entity regarding cyber security for
Cloudreach Ltd. It is private sector organisation headquartered in London provides services of
travel booking sites to a million customers across UK and also known as investment portfolio
company. However, several authors' views on cyber security in context to ethical considerations
are to be expressed through this assignment. In addition to this, various approached used for
encouraging IT professionals to prevent from frauds and thefts of confidential data of the entity.
Along with this, various tools are to be presented for increasing employees' loyalty towards
company's confidential security in terms of data Securitization. Thus, students are able to
understand different aspects of cyber security and preventing frauds in data transmissions
through this report.
Background
Cloudreach Ltd is wide spread IT sector company provides consultancy to other web
services including planning and solutions for their effectiveness. In addition to this, it is cloud
computing consultancy which performs as advisor for Amazon web services, Salesforce etc. In
this regard, different tools for research methodology are to be described to aware IT
professionals towards reducing ethical issues occurred in business operations (Bell, 2014).
However, it is one of the member of Blackstone Group which is known for portfolio for proper
funding. Including this, it provides online travel booking sites services to million number of
customers internationally. In order to this, it has different offices in several countries of the globe
like; US, Canada, France, Switzerland etc. headquartered in London, UK. As per analysing its
financial position, it is identified that in last year, company's annual revenue was above 1 billion
which is effective and remains able to increase in further years for proper sustainability in global
“To educate IT professionals to prevent from cyber crime: A case study on Cloudreach
Ltd.”
INTRODUCTION
Cyber security refers to IT security which remains effective to protect computer systems
including hardware and software as well information from their damage. It is essential to prevent
confidential data of the organisation as per ethical considerations. The present report is based on
understanding different aspects to educate employees of the entity regarding cyber security for
Cloudreach Ltd. It is private sector organisation headquartered in London provides services of
travel booking sites to a million customers across UK and also known as investment portfolio
company. However, several authors' views on cyber security in context to ethical considerations
are to be expressed through this assignment. In addition to this, various approached used for
encouraging IT professionals to prevent from frauds and thefts of confidential data of the entity.
Along with this, various tools are to be presented for increasing employees' loyalty towards
company's confidential security in terms of data Securitization. Thus, students are able to
understand different aspects of cyber security and preventing frauds in data transmissions
through this report.
Background
Cloudreach Ltd is wide spread IT sector company provides consultancy to other web
services including planning and solutions for their effectiveness. In addition to this, it is cloud
computing consultancy which performs as advisor for Amazon web services, Salesforce etc. In
this regard, different tools for research methodology are to be described to aware IT
professionals towards reducing ethical issues occurred in business operations (Bell, 2014).
However, it is one of the member of Blackstone Group which is known for portfolio for proper
funding. Including this, it provides online travel booking sites services to million number of
customers internationally. In order to this, it has different offices in several countries of the globe
like; US, Canada, France, Switzerland etc. headquartered in London, UK. As per analysing its
financial position, it is identified that in last year, company's annual revenue was above 1 billion
which is effective and remains able to increase in further years for proper sustainability in global

market. Thus, Cloudreach is one of the most famous entity operates in IT sector provides secured
and satisfied services to its customers on large scale. However, through this research project
cyber security tact are presented for preventing frauds and thefts regarding data sharing (Dunnn,
2013). Thus, systematic research project is conducted to encourage IT professionals of the entity
for safe and secured job.
Scope
In current era, market position and competitive strategies of Cloudreach Ltd id quite
effective that views to get increased in future time period. However, it has wide scope as well
different offices in other countries of the world which forecast to increasing in its number in
large range. In addition to this, it aims to operate all business activities as safe and secured for
providing online booking sites and several facilities at high level (Flick, 2015). Therefore, it
scopes itself as increasing and growing entity in further years to achieve competitive advantages
and making place in global market for long time period.
Aims and objectives
The project report aims to consider cyber security for Cloudreach Ltd and encouraging its
employees to perform their work with honesty and loyalty (Gordon and et.al., 2015). In this
regard, its main aim and objectives can be understood as follows:
Aim:
To identify the unethical practices that are associated with cyber security: A case study
on Cloudreach Ltd.
Objectives of the project:
To identify extent which IT professionals are involved in unethical practices in respect to
stealing confidential data.
To find out extent to which IT professionals are used for cybercrime with informing them
about same.
To understand significance of cyber security for Cloudreach Ltd.
To recommend steps that firms can take to make educate employees about cyber-crime
and to prevent them from involving in illegal practices.
and satisfied services to its customers on large scale. However, through this research project
cyber security tact are presented for preventing frauds and thefts regarding data sharing (Dunnn,
2013). Thus, systematic research project is conducted to encourage IT professionals of the entity
for safe and secured job.
Scope
In current era, market position and competitive strategies of Cloudreach Ltd id quite
effective that views to get increased in future time period. However, it has wide scope as well
different offices in other countries of the world which forecast to increasing in its number in
large range. In addition to this, it aims to operate all business activities as safe and secured for
providing online booking sites and several facilities at high level (Flick, 2015). Therefore, it
scopes itself as increasing and growing entity in further years to achieve competitive advantages
and making place in global market for long time period.
Aims and objectives
The project report aims to consider cyber security for Cloudreach Ltd and encouraging its
employees to perform their work with honesty and loyalty (Gordon and et.al., 2015). In this
regard, its main aim and objectives can be understood as follows:
Aim:
To identify the unethical practices that are associated with cyber security: A case study
on Cloudreach Ltd.
Objectives of the project:
To identify extent which IT professionals are involved in unethical practices in respect to
stealing confidential data.
To find out extent to which IT professionals are used for cybercrime with informing them
about same.
To understand significance of cyber security for Cloudreach Ltd.
To recommend steps that firms can take to make educate employees about cyber-crime
and to prevent them from involving in illegal practices.

Rationale of the study
The research project is significant to consider ethical considerations for operating
business activities. In accordance to this, cyber security concept and different aspects are
introduced for encouraging IT professionals towards their job performances. Through this
projection, various tools are introduced for cyber security and protecting frauds. In this regard,
different ideas are generated for following on ethical considerations for Cloudreach Ltd and
securing its confidentiality regarding data protection (Hahn and et.al., 2013). Thus, this study is
rationale for understanding cyber security concept and building up trust between employees and
company for storing and securing its confidential information.
LITERATURE REVIEW
Professionals who disclose confidential data of entity
Knowles and et.al., (2015) expresses his views that there are some employees appeared
who do not consider organisation's ethical considerations regarding securing its confidential
information. In accordance to this, company's privacy get disturbed and misuse of its secrecy is
obtained. However, it is difficult to analyse unethical functions performed in context to business
operations. Including this, cyber crime is occurred when workers of the entity disclose the
privacy of entity and shares confidential data. It creates varieties of losses and different issues
which is unreliable to maintain its position and operating further operations. In addition to this, it
is considered that in the greed of earn more, some employees share company's confidential data
which remains unethical and has to face many issues in future time. Therefore, environment of
the organisation and business operations get disturbed. Through disclosing personal and secured
information of entity to other company's professionals bring different losses and issues.
On the contrary to this, Mead, Vasatka and Craig, (2015) present his views that unethical
considerations for data security and transactions affect entity's position also breaks trust towards
cyber information. It impacts on organisational environment and several factors which are
unreliable and disturbing for further planning. Thus, it is essential to educate employees towards
cyber security and encouraging employees to be loyal in sharing data. Accordingly, it is needed
to secure network access and focusing on data sharing tools. Including this, it is required for
organising training programs and aware employees with cyber security tools. It is necessary to
The research project is significant to consider ethical considerations for operating
business activities. In accordance to this, cyber security concept and different aspects are
introduced for encouraging IT professionals towards their job performances. Through this
projection, various tools are introduced for cyber security and protecting frauds. In this regard,
different ideas are generated for following on ethical considerations for Cloudreach Ltd and
securing its confidentiality regarding data protection (Hahn and et.al., 2013). Thus, this study is
rationale for understanding cyber security concept and building up trust between employees and
company for storing and securing its confidential information.
LITERATURE REVIEW
Professionals who disclose confidential data of entity
Knowles and et.al., (2015) expresses his views that there are some employees appeared
who do not consider organisation's ethical considerations regarding securing its confidential
information. In accordance to this, company's privacy get disturbed and misuse of its secrecy is
obtained. However, it is difficult to analyse unethical functions performed in context to business
operations. Including this, cyber crime is occurred when workers of the entity disclose the
privacy of entity and shares confidential data. It creates varieties of losses and different issues
which is unreliable to maintain its position and operating further operations. In addition to this, it
is considered that in the greed of earn more, some employees share company's confidential data
which remains unethical and has to face many issues in future time. Therefore, environment of
the organisation and business operations get disturbed. Through disclosing personal and secured
information of entity to other company's professionals bring different losses and issues.
On the contrary to this, Mead, Vasatka and Craig, (2015) present his views that unethical
considerations for data security and transactions affect entity's position also breaks trust towards
cyber information. It impacts on organisational environment and several factors which are
unreliable and disturbing for further planning. Thus, it is essential to educate employees towards
cyber security and encouraging employees to be loyal in sharing data. Accordingly, it is needed
to secure network access and focusing on data sharing tools. Including this, it is required for
organising training programs and aware employees with cyber security tools. It is necessary to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

emerge honesty and loyalty in professionals in context to data storing and sharing measurably. In
addition to this, it is also essential to aware employees with negative impacts of cyber crime
therefore they can perform their job securely and honestly. Thus, for cyber security, it is required
for an organisation to take strict steps towards frauds and emerging positive feelings towards
their performances.
Cyber-crime and IT professionals
In opinion of O'Leary, (2017) cyber-crime is a fraud that breaks trust towards employee
who takes step against ethics of the organisation. In this manner, employees take different wrong
steps that remains unfaithful for further activities. It occurs because of negligence of
organisation's rules and disclosing confidentiality of entity through sharing data to other
professionals and companies. Therefore, different issues are occurred regarding business
operations and other activities also disturbs environment of entity and its goodwill in market. It is
considered that some information are necessary to be secured for its effectiveness. However,
employees create cyber crime through sharing company's confidential information to other
businesses which is unethical. It affects entity's market position and several aspects for further
years regarding business operations. Therefore, various environmental factors get affected
because of cyber crime such as; environmental, technological, socio-cultural and so on. Thus,
cyber crime is an unreliable and unethical issues that impacts on company's efficiency negatively
due to taking up wrong steps by its professionals.
Oltramari and et.al., (2014) opposes that cyber crime is one of the unethical issue occur at
workplace which required to be control over. In this regard, several steps are necessary to be
taken such as strict rules on networking and accessing sites, aware each and every employee
towards side effects of this crime, using data sharing checking out tools that shows timing and
receiver of the information. Therefore, by applying these tools, cyber crime can be reduced as
well proper projection can be gained for effective business operations. In this regard, several
strategies are required to be planned to educate employees with fraud and theft of sharing data.
Apart from this, it is also needed for entity to encourage professionals towards providing
information related to sharing hidden data of the organisation. Therefore, IT professionals can
addition to this, it is also essential to aware employees with negative impacts of cyber crime
therefore they can perform their job securely and honestly. Thus, for cyber security, it is required
for an organisation to take strict steps towards frauds and emerging positive feelings towards
their performances.
Cyber-crime and IT professionals
In opinion of O'Leary, (2017) cyber-crime is a fraud that breaks trust towards employee
who takes step against ethics of the organisation. In this manner, employees take different wrong
steps that remains unfaithful for further activities. It occurs because of negligence of
organisation's rules and disclosing confidentiality of entity through sharing data to other
professionals and companies. Therefore, different issues are occurred regarding business
operations and other activities also disturbs environment of entity and its goodwill in market. It is
considered that some information are necessary to be secured for its effectiveness. However,
employees create cyber crime through sharing company's confidential information to other
businesses which is unethical. It affects entity's market position and several aspects for further
years regarding business operations. Therefore, various environmental factors get affected
because of cyber crime such as; environmental, technological, socio-cultural and so on. Thus,
cyber crime is an unreliable and unethical issues that impacts on company's efficiency negatively
due to taking up wrong steps by its professionals.
Oltramari and et.al., (2014) opposes that cyber crime is one of the unethical issue occur at
workplace which required to be control over. In this regard, several steps are necessary to be
taken such as strict rules on networking and accessing sites, aware each and every employee
towards side effects of this crime, using data sharing checking out tools that shows timing and
receiver of the information. Therefore, by applying these tools, cyber crime can be reduced as
well proper projection can be gained for effective business operations. In this regard, several
strategies are required to be planned to educate employees with fraud and theft of sharing data.
Apart from this, it is also needed for entity to encourage professionals towards providing
information related to sharing hidden data of the organisation. Therefore, IT professionals can

perform their work with honesty and loyalty with the fear of actions against cyber-crime. It will
be effective for organisation and its effectiveness.
Importance of cyber security
As per the point of view of Sommestad, Ekstedt and Holm, (2013) cyber security is
essential for any organisation to secure its confidential data and reducing frauds. In this regard,
several steps are to be taken up for ethical considerations and sustaining security of entity's
hidden information. It is essential to share confidentiality of organisation to only trust worthy
and reliable person. However, for selecting employees regarding job performance, it is needed to
analyse his/her attitude towards job and performance. Including this, it is necessary to focusing
on each and every employees' performance, his ethics and behaviour with other professionals.
Moreover, using cyber security tools are needed for building up trust of employees with
organisation as well securing confidentiality of organisation. Therefore, cyber security is vital to
sustain security of organisation and its information that are related with its market position and
recovery. Therefore, strict rules are required to be followed on for securing hidden information.
Besides this, it is needed for organisation to conduct program for aware employees with cyber
security concept and encouraging them for securing confidential information to prevent frauds.
Hence, it is identified that cyber security is vital for providing security to company through
securing its data effectively.
Vu and et.al., (2014) argues that there are several numbers of employees who perform at
workplace therefore focusing on all of those performances is quite difficult. Similarly, it remains
difficult for entity to encouraging all employees towards cyber security and following on all rules
strictly. However, different tools are required to be applied for controlling over sharing of data
and influencing all employees for taking care of security and company's confidentiality.
Therefore, it is quite needed for entity to aware all employees with significance of cyber security
and reducing crime related to organisation's confidentiality.
RESEARCH METHODOLOGY
Project report related to analysing tools for cyber security to prevent frauds and
controlling over sharing of confidential information for Cloudreach Ltd consists of several
be effective for organisation and its effectiveness.
Importance of cyber security
As per the point of view of Sommestad, Ekstedt and Holm, (2013) cyber security is
essential for any organisation to secure its confidential data and reducing frauds. In this regard,
several steps are to be taken up for ethical considerations and sustaining security of entity's
hidden information. It is essential to share confidentiality of organisation to only trust worthy
and reliable person. However, for selecting employees regarding job performance, it is needed to
analyse his/her attitude towards job and performance. Including this, it is necessary to focusing
on each and every employees' performance, his ethics and behaviour with other professionals.
Moreover, using cyber security tools are needed for building up trust of employees with
organisation as well securing confidentiality of organisation. Therefore, cyber security is vital to
sustain security of organisation and its information that are related with its market position and
recovery. Therefore, strict rules are required to be followed on for securing hidden information.
Besides this, it is needed for organisation to conduct program for aware employees with cyber
security concept and encouraging them for securing confidential information to prevent frauds.
Hence, it is identified that cyber security is vital for providing security to company through
securing its data effectively.
Vu and et.al., (2014) argues that there are several numbers of employees who perform at
workplace therefore focusing on all of those performances is quite difficult. Similarly, it remains
difficult for entity to encouraging all employees towards cyber security and following on all rules
strictly. However, different tools are required to be applied for controlling over sharing of data
and influencing all employees for taking care of security and company's confidentiality.
Therefore, it is quite needed for entity to aware all employees with significance of cyber security
and reducing crime related to organisation's confidentiality.
RESEARCH METHODOLOGY
Project report related to analysing tools for cyber security to prevent frauds and
controlling over sharing of confidential information for Cloudreach Ltd consists of several

approaches (Cyber Security, 2016). Different approaches used in present research project can be
understood as below:
Research approach: It shows tools and methods to be applied for conducting research
and data collection. However, there are several approaches of research methods used can be
expressed as: Deductive approach: In this approach, act findings are created against hypotheses and
assumptions. Therefore, research on collected findings is conducted that genertaes ideas
for further business operations (Bell, 2014). For the present report, analyst is to use
deductive approach in which he is planning to collect data through prepared report and
occurred issues in Cloudreach Ltd. Inductive approach: In this research approach, new theories and innovations are created
for effectiveness of organisation. In this regard, research to be incurred for operating
further business activities.
Abductive approach: Data collection process is done through puzzle and surprising facts
that affects research project and its succession. However, abductive approach is suitable
for gathering information through unique and other ways (Flick, 2015).
For the current research project, analyst is to apply deductive approach by which cyber
crime positions occurred in previous years as well reasons behind m can be obtained effectively.
For this purpose, proper projection can be conducted that will be helpful to reduce the issue and
aware IT professionals for Cloudreach Ltd towards securing its confidential information (Gordon
and et.al., 2015).
Research philosophy: Research philosophy are of different kinds including pragmatism,
positivism, interpretivism and realism that can be understood as: Pragmatism: In this research approach, data are collected through both qualitative and
quantitative methods. Therefore, mixing information are gained that emerges ideas for
further business operations (Hahn and et.al., 2013). Positivism: Information are gathered in quantitative form which respondents' views are
collected in measuring and ranking. Thus, for presenting them, effective presented is used
as per which decisions are made for future strategies and their implementations.
understood as below:
Research approach: It shows tools and methods to be applied for conducting research
and data collection. However, there are several approaches of research methods used can be
expressed as: Deductive approach: In this approach, act findings are created against hypotheses and
assumptions. Therefore, research on collected findings is conducted that genertaes ideas
for further business operations (Bell, 2014). For the present report, analyst is to use
deductive approach in which he is planning to collect data through prepared report and
occurred issues in Cloudreach Ltd. Inductive approach: In this research approach, new theories and innovations are created
for effectiveness of organisation. In this regard, research to be incurred for operating
further business activities.
Abductive approach: Data collection process is done through puzzle and surprising facts
that affects research project and its succession. However, abductive approach is suitable
for gathering information through unique and other ways (Flick, 2015).
For the current research project, analyst is to apply deductive approach by which cyber
crime positions occurred in previous years as well reasons behind m can be obtained effectively.
For this purpose, proper projection can be conducted that will be helpful to reduce the issue and
aware IT professionals for Cloudreach Ltd towards securing its confidential information (Gordon
and et.al., 2015).
Research philosophy: Research philosophy are of different kinds including pragmatism,
positivism, interpretivism and realism that can be understood as: Pragmatism: In this research approach, data are collected through both qualitative and
quantitative methods. Therefore, mixing information are gained that emerges ideas for
further business operations (Hahn and et.al., 2013). Positivism: Information are gathered in quantitative form which respondents' views are
collected in measuring and ranking. Thus, for presenting them, effective presented is used
as per which decisions are made for future strategies and their implementations.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Realism: In this process system, data are collected in particular form either quantitative
or qualitative. For this present report, information are to be collected in specific manner
through analysing presented performance of Cloudreach Ltd (Knowles and et.al., 2015).
Therefore, actual terms of data collection can be obtained regarding reducing cyber crime
and preventing frauds efficiently.
Interpretivism: For collecting data, under this approach, investigation is conducted on
finding out issues and reasons obtained behind its occurrences are determined. On the
basis of which further planning is proceeded for organisation's effectiveness (Mead,
Vasatka and Craig, 2015).
Therefore, for the current research project on cyber security for Cloudreach Ltd regarding
occurred cyber crime and aware IT professionals with security, realism approach is to be applied.
Research design: There are several designs are used for conducting research including
descriptive, experimental and correlation that can be understood as below: Descriptive approach: In this research approach, all positive and negative aspects are
involved that generates reasons behind occurred issues as well solutions to resolved them.
In this regard, all obtained problems and manner to solving out the issues are evolved that
affects further implementation. For the present research project on Cloudreach Ltd for
analysing occurred unethical data sharing and suggestions to improving them, descriptive
research design is to used (O'Leary, 2017). It will be effective to prevent frauds and
conducting cyber security for the organisation. Experimental design: In this research design structure, facts finding and identifying tools
are used for data collection and conducting research. However, it is effective for finding
out accuracy on fact findings and research project.
Correlation: It refers to observational approach in which data collection is done by
creating link between two or more substances (Sommestad, Ekstedt and Holm, 2013). For
example; creating correlation of selling items and gained profit of the entity. Therefore,
proper ideas are generated for further implementation and increasing efficiency of entity
effectively.
or qualitative. For this present report, information are to be collected in specific manner
through analysing presented performance of Cloudreach Ltd (Knowles and et.al., 2015).
Therefore, actual terms of data collection can be obtained regarding reducing cyber crime
and preventing frauds efficiently.
Interpretivism: For collecting data, under this approach, investigation is conducted on
finding out issues and reasons obtained behind its occurrences are determined. On the
basis of which further planning is proceeded for organisation's effectiveness (Mead,
Vasatka and Craig, 2015).
Therefore, for the current research project on cyber security for Cloudreach Ltd regarding
occurred cyber crime and aware IT professionals with security, realism approach is to be applied.
Research design: There are several designs are used for conducting research including
descriptive, experimental and correlation that can be understood as below: Descriptive approach: In this research approach, all positive and negative aspects are
involved that generates reasons behind occurred issues as well solutions to resolved them.
In this regard, all obtained problems and manner to solving out the issues are evolved that
affects further implementation. For the present research project on Cloudreach Ltd for
analysing occurred unethical data sharing and suggestions to improving them, descriptive
research design is to used (O'Leary, 2017). It will be effective to prevent frauds and
conducting cyber security for the organisation. Experimental design: In this research design structure, facts finding and identifying tools
are used for data collection and conducting research. However, it is effective for finding
out accuracy on fact findings and research project.
Correlation: It refers to observational approach in which data collection is done by
creating link between two or more substances (Sommestad, Ekstedt and Holm, 2013). For
example; creating correlation of selling items and gained profit of the entity. Therefore,
proper ideas are generated for further implementation and increasing efficiency of entity
effectively.

Hence, for the present project on cyber security for Cloudreach Ltd, descriptive research
design is to be used to prevent frauds and encouraging employees towards confidential data
sharing tool systematically (Vu and et.al., 2014).
Data collection: Research methods are conducted in two ways for data collection such
as; primary data collection and secondary data collection. In primary data collection, information
are gathered at first time which has no link with past performance and future operations. While,
on the other side, for secondary data collection, information are to be gathered through ready and
prepared materials for example; newspaper, analysing prepared reports of entity that shows its
performance (Dunn, 2013). However, for this present report on analysing cyber crime reasons
and creating solutions to solving them, secondary data collection method is to be applied.
Including this, information regarding cyber crime in Cloudreach Ltd is to collected through last
years' performance. On the basis of which several ideas can be generated for cyber security and
encouraging IT professionals towards preventing frauds and sharing confidential information.
Data analysis: Analyst collects data and almost positive outcomes are obtained related to
cyber security of confidential information of Cloudreach Ltd. It is recognised that employees are
loyal towards their performance and also confidential data saved with proper security. However,
strict rules are applied against cyber crime which is effective for securing its data (Cyber
Security, 2016). In addition to this, it is also good that all employees are almost aware with cyber
security concept which shows their honesty and strong work ethics towards their performances
and contribution in goal accomplishments. Therefore, it is identified that IT professionals of the
organisation are aware with ethical considerations also expressed reasons behind occurrence of
issues that affects organisation's effectiveness and sharing of confidential data. Thus, for creating
more awareness towards cyber security among employees, it is required to conduct training and
events therefore, both organisation and employees would be safe.
PROJECT ACTIVITIES
Cloudrech Ltd is to organise event for awareness of cyber security among IT
professionals to reduce frauds and thefts. For this purpose, research is to conducted for analysing
views of employees on current cyber crime and reasons behind its occurrences (Knowles and
design is to be used to prevent frauds and encouraging employees towards confidential data
sharing tool systematically (Vu and et.al., 2014).
Data collection: Research methods are conducted in two ways for data collection such
as; primary data collection and secondary data collection. In primary data collection, information
are gathered at first time which has no link with past performance and future operations. While,
on the other side, for secondary data collection, information are to be gathered through ready and
prepared materials for example; newspaper, analysing prepared reports of entity that shows its
performance (Dunn, 2013). However, for this present report on analysing cyber crime reasons
and creating solutions to solving them, secondary data collection method is to be applied.
Including this, information regarding cyber crime in Cloudreach Ltd is to collected through last
years' performance. On the basis of which several ideas can be generated for cyber security and
encouraging IT professionals towards preventing frauds and sharing confidential information.
Data analysis: Analyst collects data and almost positive outcomes are obtained related to
cyber security of confidential information of Cloudreach Ltd. It is recognised that employees are
loyal towards their performance and also confidential data saved with proper security. However,
strict rules are applied against cyber crime which is effective for securing its data (Cyber
Security, 2016). In addition to this, it is also good that all employees are almost aware with cyber
security concept which shows their honesty and strong work ethics towards their performances
and contribution in goal accomplishments. Therefore, it is identified that IT professionals of the
organisation are aware with ethical considerations also expressed reasons behind occurrence of
issues that affects organisation's effectiveness and sharing of confidential data. Thus, for creating
more awareness towards cyber security among employees, it is required to conduct training and
events therefore, both organisation and employees would be safe.
PROJECT ACTIVITIES
Cloudrech Ltd is to organise event for awareness of cyber security among IT
professionals to reduce frauds and thefts. For this purpose, research is to conducted for analysing
views of employees on current cyber crime and reasons behind its occurrences (Knowles and

et.al., 2015). In this regard, research is to be conducted in systematic way that process can be
expressed as below:
Plan Activities Estimated cost Time frame
Collecting data
through at secondary
level
At first, performance
of Cloudreach is to be
analysed by which
cyber crime and its
reasons can evaluate
which have happened
in the previous years.
300 3-4 weeks
Gaining IT
professionals views on
cyber security
Afterwards, employees
views are to be
collected as well
different tools can be
gained that become
cause of frauds
200 2 weeks
Checking out all
securities and aware
employees with cyber
security term
In this process, all
secured networks and
accessing sites are to
be evaluated as well
events are organised to
aware employees with
cyber security.
400-500 3-4 weeks
Evaluation and
controlling over cyber
crime
At last, taking care of
shared information and
analysing data tools
are applied for
200 Life long of entity.
expressed as below:
Plan Activities Estimated cost Time frame
Collecting data
through at secondary
level
At first, performance
of Cloudreach is to be
analysed by which
cyber crime and its
reasons can evaluate
which have happened
in the previous years.
300 3-4 weeks
Gaining IT
professionals views on
cyber security
Afterwards, employees
views are to be
collected as well
different tools can be
gained that become
cause of frauds
200 2 weeks
Checking out all
securities and aware
employees with cyber
security term
In this process, all
secured networks and
accessing sites are to
be evaluated as well
events are organised to
aware employees with
cyber security.
400-500 3-4 weeks
Evaluation and
controlling over cyber
crime
At last, taking care of
shared information and
analysing data tools
are applied for
200 Life long of entity.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

monitoring cyber
crime and considering
securities effectively.
Network diagram:
Gantt chart:
Illustration 1: Network diagram
crime and considering
securities effectively.
Network diagram:
Gantt chart:
Illustration 1: Network diagram

CONCLUSION
As per the project report, it is concluded that cyber security is essential for any entity to
protect frauds regarding sharing its confidential data. In this regard, different methods are
understood for cyber security and generating cyber securities among IT professionals of
Cloudreach Ltd. However, research methods and different approaches are presented for data
collection and organising event through this assignment. Including this, different tools are
expressed for effective research project and cyber security awareness to prevent entity's security
effectively through this report.
RECOMMENDATIONS
For conducting this research project on cyber security for Cloudreach Ltd, following
suggestions should be followed on can be understood as:
Data collection must be in ethical considerations as well actual issues obtained and
effective environment should be analysed.
Illustration 2: Gantt chart
As per the project report, it is concluded that cyber security is essential for any entity to
protect frauds regarding sharing its confidential data. In this regard, different methods are
understood for cyber security and generating cyber securities among IT professionals of
Cloudreach Ltd. However, research methods and different approaches are presented for data
collection and organising event through this assignment. Including this, different tools are
expressed for effective research project and cyber security awareness to prevent entity's security
effectively through this report.
RECOMMENDATIONS
For conducting this research project on cyber security for Cloudreach Ltd, following
suggestions should be followed on can be understood as:
Data collection must be in ethical considerations as well actual issues obtained and
effective environment should be analysed.
Illustration 2: Gantt chart

Employees' attitude and performance at workplace should be focused on therefore further
operations can be obtained.
Events should be organised to aware professionals with cyber security and taking care of
restricted confidential data sharing of Cloudreach Ltd.
Organisation should take strict action towards cyber crime for its effectiveness and
sustaining security.
operations can be obtained.
Events should be organised to aware professionals with cyber security and taking care of
restricted confidential data sharing of Cloudreach Ltd.
Organisation should take strict action towards cyber crime for its effectiveness and
sustaining security.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

REFERENCE
Books and Journal
Bell, J., 2014. Doing Your Research Project: A guide for first-time researchers. McGraw-Hill
Education.
Dunn Cavelty, M., 2013. From cyber-bombs to political fallout: Threat representations with an
impact in the cyber-security discourse. International Studies Review. 78(1). pp.105-122.
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research
project. Sage.
Gordon, L.A., and et.al., 2015. Externalities and the magnitude of cyber security
underinvestment by private sector firms: a modification of the Gordon-Loeb model.
Journal of Information Security. 5(1). pp.24.
Hahn, A., and et.al., 2013. Cyber-physical security testbeds: Architecture, application, and
evaluation for smart grid. IEEE Transactions on Smart Grid. 784(2). pp.847-855.
Knowles, W., and et.al., 2015. A survey of cyber security management in industrial control
systems. International journal of critical infrastructure protection. 8(6). pp.52-80.
Mead, J., Vasatka, J.E. and Craig, J.A., 2015. Cybersecurity system with differentiated capacity
to deal with complex cyber attacks. U.S. Patent Application.
O'Leary, Z., 2017. The essential guide to doing your research project. Sage.
Oltramari, A., and et.al., 2014. Building an Ontology of Cyber Security. In STIDS. 89(7). pp.90-
99.
Sommestad, T., Ekstedt, M. and Holm, H., 2013. The cyber security modeling language: A tool
for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal.
78(3). pp.363-373.
Vu, A.H., and et.al., 2014, September. CyberSAGE: a tool for automatic security assessment of
cyber-physical systems. In International Conference on Quantitative Evaluation of
Systems. 78(6).pp.384-387.
Books and Journal
Bell, J., 2014. Doing Your Research Project: A guide for first-time researchers. McGraw-Hill
Education.
Dunn Cavelty, M., 2013. From cyber-bombs to political fallout: Threat representations with an
impact in the cyber-security discourse. International Studies Review. 78(1). pp.105-122.
Flick, U., 2015. Introducing research methodology: A beginner's guide to doing a research
project. Sage.
Gordon, L.A., and et.al., 2015. Externalities and the magnitude of cyber security
underinvestment by private sector firms: a modification of the Gordon-Loeb model.
Journal of Information Security. 5(1). pp.24.
Hahn, A., and et.al., 2013. Cyber-physical security testbeds: Architecture, application, and
evaluation for smart grid. IEEE Transactions on Smart Grid. 784(2). pp.847-855.
Knowles, W., and et.al., 2015. A survey of cyber security management in industrial control
systems. International journal of critical infrastructure protection. 8(6). pp.52-80.
Mead, J., Vasatka, J.E. and Craig, J.A., 2015. Cybersecurity system with differentiated capacity
to deal with complex cyber attacks. U.S. Patent Application.
O'Leary, Z., 2017. The essential guide to doing your research project. Sage.
Oltramari, A., and et.al., 2014. Building an Ontology of Cyber Security. In STIDS. 89(7). pp.90-
99.
Sommestad, T., Ekstedt, M. and Holm, H., 2013. The cyber security modeling language: A tool
for assessing the vulnerability of enterprise system architectures. IEEE Systems Journal.
78(3). pp.363-373.
Vu, A.H., and et.al., 2014, September. CyberSAGE: a tool for automatic security assessment of
cyber-physical systems. In International Conference on Quantitative Evaluation of
Systems. 78(6).pp.384-387.

Online
Cyber Security. 2016. [online]. Available through:
<https://www.manageengine.com/products/desktop-central/secure-network>. [Accessed
on 21st July 2017].
Cyber Security. 2016. [online]. Available through:
<https://www.manageengine.com/products/desktop-central/secure-network>. [Accessed
on 21st July 2017].

APPENDICES
Appendix (A):
Ethical considerations:
Some main ethical considerations are required to be followed on for Cloudreach Ltd for
conducting research and implementing strategies as:
Reasons behind occurrence of cyber crime should be find out in proper critical way.
For data collection at secondary level, sites which are restricted should not be tried to
accessed.
Special restrictions over sharing confidential data should be followed on strictly.
Fraud employees who do not follow organisation's rules should be punished as per terms
and conditions.
Appendix (A):
Ethical considerations:
Some main ethical considerations are required to be followed on for Cloudreach Ltd for
conducting research and implementing strategies as:
Reasons behind occurrence of cyber crime should be find out in proper critical way.
For data collection at secondary level, sites which are restricted should not be tried to
accessed.
Special restrictions over sharing confidential data should be followed on strictly.
Fraud employees who do not follow organisation's rules should be punished as per terms
and conditions.
1 out of 19

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.