Literature Review: Cyber Security Challenges in Business Organizations
VerifiedAdded on 2020/07/23
|9
|2858
|89
Literature Review
AI Summary
This literature review examines the challenges of cyber security in business organizations. It analyzes various research papers and articles to highlight the issues faced by businesses in protecting their data and information systems. The review covers key aspects such as evolving security risks, the impact of cloud computing and remote data sharing, the rise of ransomware and other malware, internal threats, unauthorized access, and hacktivism. The review also points out potential gaps in the current research, such as the lack of focus on employee education regarding cyber security. The conclusion emphasizes the critical importance of cyber security in today's digital era, where organizations are increasingly reliant on technology and face constant threats from cyber criminals. The review suggests that businesses must invest in robust cyber security measures, continuous monitoring, and employee training to safeguard their vital data and maintain their reputation.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

LITERATURE REVIEW
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

ASSESSMENT 1: LITERATURE REVIEW
Introduction
In the literature review section of project, the researcher aims to analyse the articles
proposed and written by various authors in order to put weight on his or her research project. In
the present context, this literature review will analyse the reviews of various authors and
researchers regarding the challenges of cyber security in the business organisation. This will
assist the researcher to compare and contrast the articles and aid in deriving the final conclusion.
Information and technological advancement are rising rapidly and thus, many business
organisations are implementing them in the organisation. It not only helps in reducing time and
cost but also increases the effectiveness in quality of products and services. Though, there are
various drawbacks associated with it. One of which is cyber security. In this context, this
literature review will analyse the challenges faced by organisation in implementing cyber
security.
Scope and objective of literature review
Scope and objective of this literature review is to analyse the challenges faced by
business organisation in order to implement cyber security for their information technology in
their company. Due to the increase and advancement in information technology systems,
business managers are concentrating and investing more in order to make their organisation
advanced and high tech. Though, many hackers and data stealer develop certain spyware and
malware in order to steal vital data of the organisation. In this context, business managers faced
various challenges related with cyber security and this literature review will aid in contrasting
and comparing reviews of researchers related with the issue.
Cyber security
Cyber or computer security is the process of securing the vital data and information
which is stored in the database or hardware of the computer system from thefts and damage.
Lord (2017) defines Cyber Security as the body of technologies, processes and practices
designed to protect networks, devices, programs and data from attack, damage or unauthorized
access. Cyber security may also be referred as information technology security. In the rapid
rising of the globalisation as well as information and technology, business organisations are
investing a huge amount in order to digitalise their organisation that will help in reducing time
and efforts as well as help in promulgating the effectiveness in quality of goods and services.
1
Introduction
In the literature review section of project, the researcher aims to analyse the articles
proposed and written by various authors in order to put weight on his or her research project. In
the present context, this literature review will analyse the reviews of various authors and
researchers regarding the challenges of cyber security in the business organisation. This will
assist the researcher to compare and contrast the articles and aid in deriving the final conclusion.
Information and technological advancement are rising rapidly and thus, many business
organisations are implementing them in the organisation. It not only helps in reducing time and
cost but also increases the effectiveness in quality of products and services. Though, there are
various drawbacks associated with it. One of which is cyber security. In this context, this
literature review will analyse the challenges faced by organisation in implementing cyber
security.
Scope and objective of literature review
Scope and objective of this literature review is to analyse the challenges faced by
business organisation in order to implement cyber security for their information technology in
their company. Due to the increase and advancement in information technology systems,
business managers are concentrating and investing more in order to make their organisation
advanced and high tech. Though, many hackers and data stealer develop certain spyware and
malware in order to steal vital data of the organisation. In this context, business managers faced
various challenges related with cyber security and this literature review will aid in contrasting
and comparing reviews of researchers related with the issue.
Cyber security
Cyber or computer security is the process of securing the vital data and information
which is stored in the database or hardware of the computer system from thefts and damage.
Lord (2017) defines Cyber Security as the body of technologies, processes and practices
designed to protect networks, devices, programs and data from attack, damage or unauthorized
access. Cyber security may also be referred as information technology security. In the rapid
rising of the globalisation as well as information and technology, business organisations are
investing a huge amount in order to digitalise their organisation that will help in reducing time
and efforts as well as help in promulgating the effectiveness in quality of goods and services.
1

Lynn, (2010)contends that in today's era, cyber security plays a vital and important role as
unpredicted amount of data is stored in the computer systems of organisation. The data includes
employee’s information, organisation’s information, confidential information of business, etc.
Thus, in order to protect them from theft and damage, business managers must install effective
cyber security measures. Organisations transmit sensitive data across networks and to other
devices in the course of doing businesses as well as cyber security describes the discipline
dedicated to protecting that information and systems that are used to process or store it. Johnson,
(2015) argues that as increase in cyber-crimes and hacking activities, it is very important for the
organisation to enable efficient cyber security in their organisation.
Challenges in cyber security for business
According to Campos and et.al., (2016) in order to protect precious and vital data as well
as information that is stored in computer system, business managers and IT experts install
appropriate cyber security. Ever evolving security risks is the most difficult challenge faced in
cyber security. Traditionally, organisation and government focus on providing security on the
most confidential and essential data as well as eschewed remaining data and information
(Agudelo, Privman and Halámek, 2017). Today, this approach is insufficient as threats evolve
and transformed more rapidly than organisation can keep up with. Mazurczyk, Szczypiorski and
Tian, (2014) argued that due to increase in cloud computing and remote data sharing and storing,
cyber-crime has been increases tremendously. Data stealer and hackers target the information
system of organisations and gather all data very easily. Thus, it is very important for the
organisation to give importance to improve their cyber security technologies efficiently.
Cyber security is becoming an increasingly important issue for business worldwide with
the financial and reputational cost of data breaches as well as creating significant headaches for
unprepared boards. McGettrick and et.al., 2014 contends that while technology is helping
organisations to optimise their operations through various innovative means, number of cyber
security threats that companies must tackle have grown. In 2017, the biggest cyber security
challenge faced by organisation was the threat of Ransomware (Information Security, 2017).
Cyber criminals developed this malware and blocked the managers as well as authorities of
organisation to access stored information on their computer system. This malware impacts on the
cyber security of organisation very much. Dua and Du, (2016) sheds light on the issue and said
that ransomware typically prevents users from accessing important information and data on their
2
unpredicted amount of data is stored in the computer systems of organisation. The data includes
employee’s information, organisation’s information, confidential information of business, etc.
Thus, in order to protect them from theft and damage, business managers must install effective
cyber security measures. Organisations transmit sensitive data across networks and to other
devices in the course of doing businesses as well as cyber security describes the discipline
dedicated to protecting that information and systems that are used to process or store it. Johnson,
(2015) argues that as increase in cyber-crimes and hacking activities, it is very important for the
organisation to enable efficient cyber security in their organisation.
Challenges in cyber security for business
According to Campos and et.al., (2016) in order to protect precious and vital data as well
as information that is stored in computer system, business managers and IT experts install
appropriate cyber security. Ever evolving security risks is the most difficult challenge faced in
cyber security. Traditionally, organisation and government focus on providing security on the
most confidential and essential data as well as eschewed remaining data and information
(Agudelo, Privman and Halámek, 2017). Today, this approach is insufficient as threats evolve
and transformed more rapidly than organisation can keep up with. Mazurczyk, Szczypiorski and
Tian, (2014) argued that due to increase in cloud computing and remote data sharing and storing,
cyber-crime has been increases tremendously. Data stealer and hackers target the information
system of organisations and gather all data very easily. Thus, it is very important for the
organisation to give importance to improve their cyber security technologies efficiently.
Cyber security is becoming an increasingly important issue for business worldwide with
the financial and reputational cost of data breaches as well as creating significant headaches for
unprepared boards. McGettrick and et.al., 2014 contends that while technology is helping
organisations to optimise their operations through various innovative means, number of cyber
security threats that companies must tackle have grown. In 2017, the biggest cyber security
challenge faced by organisation was the threat of Ransomware (Information Security, 2017).
Cyber criminals developed this malware and blocked the managers as well as authorities of
organisation to access stored information on their computer system. This malware impacts on the
cyber security of organisation very much. Dua and Du, (2016) sheds light on the issue and said
that ransomware typically prevents users from accessing important information and data on their
2

computers or networks until a payment is made. The main purpose of cyber security is to ensure
the protection of the important information that is stored on the computer system of the
organisations. Organisations in today's world is are ample of issues related with data stealing,
cyber theft and unethical hacking activities (Wooderson and Ward, 2017). These issues create a
big challenge for the organisations in terms of improving cyber security efficiently. Cyber
criminals use malware like ransomware, worms, etc. in order to obtain information and data from
organisation. On this Andre, (2017) argues that not only hackers or external data stealer, there
are some internal sources that also participate in the cyber-crime activities. Another challenge
faced by the organisation is to protect the data from the unauthorized users. These can be internal
users like employees or workers as well as external users like other stakeholders. Many a times,
in an organisation, data has been leaked by internal source including employees or workers. It is
the duty and responsibility of management of organisation to provide access only to authorised
and trustworthy employees and department.
Lynn, (2010) said that another trend has been embarked by the hackers known as
Dronejacking in which cyber criminals take advantage of remote controlled drones in order to
steal the precious data and information from the organisation. The technology is so advance that
the drone only needs to land on the roof in order to access to the local wireless networks.
Johnson, (2015)argued that dronejacking is not possible where organisation has implemented
efficient cyber security measures. There are various challenges has been faced by the
organisation regarding protection and prevention of their vital data and information. As
technology is rising rapidly, many organisations improved and upgrade their cyber security
system and software in order give all round protection (Norris, Joshi and Finin, 2015).
As cyber security technology and preventative measures become more complex,
criminals will turn to social engineering in an effort to bypass such systems (Tisdale, 2015). This
involves manipulating or deceiving key individuals into divulging important data or financial
information, such as through phishing techniques. Hacktivism is another challenge faced by the
organisations. In this cyber criminals breaks into computer systems for politically or socially
charged reasons (Langmia, 2016). These are done deliberately in order to damage and degrade
the organisational reputation. In order to protect computer system from hacktivist, the
management of organisation needs to focus on improving the effectiveness in the cyber security
systems.
3
the protection of the important information that is stored on the computer system of the
organisations. Organisations in today's world is are ample of issues related with data stealing,
cyber theft and unethical hacking activities (Wooderson and Ward, 2017). These issues create a
big challenge for the organisations in terms of improving cyber security efficiently. Cyber
criminals use malware like ransomware, worms, etc. in order to obtain information and data from
organisation. On this Andre, (2017) argues that not only hackers or external data stealer, there
are some internal sources that also participate in the cyber-crime activities. Another challenge
faced by the organisation is to protect the data from the unauthorized users. These can be internal
users like employees or workers as well as external users like other stakeholders. Many a times,
in an organisation, data has been leaked by internal source including employees or workers. It is
the duty and responsibility of management of organisation to provide access only to authorised
and trustworthy employees and department.
Lynn, (2010) said that another trend has been embarked by the hackers known as
Dronejacking in which cyber criminals take advantage of remote controlled drones in order to
steal the precious data and information from the organisation. The technology is so advance that
the drone only needs to land on the roof in order to access to the local wireless networks.
Johnson, (2015)argued that dronejacking is not possible where organisation has implemented
efficient cyber security measures. There are various challenges has been faced by the
organisation regarding protection and prevention of their vital data and information. As
technology is rising rapidly, many organisations improved and upgrade their cyber security
system and software in order give all round protection (Norris, Joshi and Finin, 2015).
As cyber security technology and preventative measures become more complex,
criminals will turn to social engineering in an effort to bypass such systems (Tisdale, 2015). This
involves manipulating or deceiving key individuals into divulging important data or financial
information, such as through phishing techniques. Hacktivism is another challenge faced by the
organisations. In this cyber criminals breaks into computer systems for politically or socially
charged reasons (Langmia, 2016). These are done deliberately in order to damage and degrade
the organisational reputation. In order to protect computer system from hacktivist, the
management of organisation needs to focus on improving the effectiveness in the cyber security
systems.
3
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

Machine learning algorithms are helping businesses perform complicated data analysis
tasks on huge quantities of data at phenomenal speeds with minimal manual input. The
technology is used to detect fraud, predict the success of marketing campaigns and automate
consumer product suggestions, as well as numerous other innovative applications (Wagner,
2015). According to Wang and Wang (2018) with the growing development of Web, Cloud and
Internet applications in industry, one concern that potential users may have is the security of
data, remote machines, and operators. The cyber attacks are increasing tremendously and
business organisations are facing severe issues in order to protect their vital data and
information. These issues create a big challenges for the organisations in terms of improving the
cyber security efficiently. Cyber criminals uses malware like ransomware, worms, etc. in order
to obtain information and data from the organisation.
It is very important for the organisation to implement essential measures in order to
protect their vital data and information from cyber criminals. Campos and et.al., (2016)argued
that with the help of continuous monitoring and real-time assessment framework will help the
organisation to safeguard the data which is stored on their computers and information systems.
There are various challenges and areas of cyber security which includes network security,
application security, endpoint security, data security, identity management, database and
infrastructure security, cloud security, mobile security and end user education (Nolan, 2015).
Further, organisations faced challenges with fake ads and feedbacks that generated online on
different websites. Mazurczyk, Szczypiorski and Tian, (2014) study the issue and said that
organisations does not create those ads and they are created by cyber criminals in order to
trapped innocent customers. Fake feedbacks mislead the customers and they avoid to purchase
from the organisation. These cases are seen frequently in online shopping websites and
organisation. It is important for the management and organisation to consider the importance of
cyber security and work diligently in order to improve the cyber security systems. These areas
need to be cover by the management of the organisation in order to increase the effectiveness in
the cyber security effectively and efficiently (Hung, 2016).
Government and organisations needs to work abreast so that the cyber crime activities
can be reduced and data can be protected appropriately (Agudelo, Privman and Halámek, 2017).
Management must implement various cyber risk assessment methods that monitors and supervise
the flow of data appropriately. This will aid in increasing the effectiveness of the cyber security.
4
tasks on huge quantities of data at phenomenal speeds with minimal manual input. The
technology is used to detect fraud, predict the success of marketing campaigns and automate
consumer product suggestions, as well as numerous other innovative applications (Wagner,
2015). According to Wang and Wang (2018) with the growing development of Web, Cloud and
Internet applications in industry, one concern that potential users may have is the security of
data, remote machines, and operators. The cyber attacks are increasing tremendously and
business organisations are facing severe issues in order to protect their vital data and
information. These issues create a big challenges for the organisations in terms of improving the
cyber security efficiently. Cyber criminals uses malware like ransomware, worms, etc. in order
to obtain information and data from the organisation.
It is very important for the organisation to implement essential measures in order to
protect their vital data and information from cyber criminals. Campos and et.al., (2016)argued
that with the help of continuous monitoring and real-time assessment framework will help the
organisation to safeguard the data which is stored on their computers and information systems.
There are various challenges and areas of cyber security which includes network security,
application security, endpoint security, data security, identity management, database and
infrastructure security, cloud security, mobile security and end user education (Nolan, 2015).
Further, organisations faced challenges with fake ads and feedbacks that generated online on
different websites. Mazurczyk, Szczypiorski and Tian, (2014) study the issue and said that
organisations does not create those ads and they are created by cyber criminals in order to
trapped innocent customers. Fake feedbacks mislead the customers and they avoid to purchase
from the organisation. These cases are seen frequently in online shopping websites and
organisation. It is important for the management and organisation to consider the importance of
cyber security and work diligently in order to improve the cyber security systems. These areas
need to be cover by the management of the organisation in order to increase the effectiveness in
the cyber security effectively and efficiently (Hung, 2016).
Government and organisations needs to work abreast so that the cyber crime activities
can be reduced and data can be protected appropriately (Agudelo, Privman and Halámek, 2017).
Management must implement various cyber risk assessment methods that monitors and supervise
the flow of data appropriately. This will aid in increasing the effectiveness of the cyber security.
4

Pointing out potential gaps
The literature review is on the challenge in cyber security for business. In the above
literature review the opinions and research of various scholars and researcher has been analysed.
From the analysing of the literature review it can be understood that all the researcher shares the
same idea in terms of improving the cyber security measures in order to improve the protection
of data and information which is stored on computers and information systems. The similarities
found that they analyse the challenges of cyber security adequately and majority of challenges
and issues are interrelated with each other. Cyber criminals developed this malware and blocks
the managers and authorities of organisation to access the stored information on their computer
system. This malware impacts on the cyber security of the organisation very much. The
comparison can be identified in their opinion in order to eliminate the issue and upgrade the
cyber security systems. Cyber security is very essential and important for the organisation in
order to protect their vital data and information. In the era where organisations are digitising their
business premises by implementing various information technologies and systems there is a
constant challenge of protecting their data and information from hackers has been faced by the
business management. As cyber crime is increasing day by day and many hackers attacking big
organisations in order to degrade their reputation or earn in unethical manner.
Some researcher focused on investing more cyber security facilities while some scholars
focused on internal threats. These opinions of the authors and scholars aid the business
organisations so that they can improve their cyber security systems effectively and efficiently.
Though, researchers does not concentrate on providing education to the employees in order to
improve their knowledge regarding the cyber security. Thus, there are various issues and
challenges faced by the organisation in today's digital era. Authors and researchers analysed the
current consequences and suggests some effective measures that will aid the organisations to
boost up their potentials and increase their cyber security. Cyber security aims to protect the vital
data and information that stored in the computer system or cloud system from hackers, data
stealer, cyber criminals, etc.
Conclusion
From the above literature review, it can be concluded that cyber security is very essential
for the organisation. It not only protects the data and information which is precious for the
organisation but also safeguards the business organisation efficiently. In this context, the above
5
The literature review is on the challenge in cyber security for business. In the above
literature review the opinions and research of various scholars and researcher has been analysed.
From the analysing of the literature review it can be understood that all the researcher shares the
same idea in terms of improving the cyber security measures in order to improve the protection
of data and information which is stored on computers and information systems. The similarities
found that they analyse the challenges of cyber security adequately and majority of challenges
and issues are interrelated with each other. Cyber criminals developed this malware and blocks
the managers and authorities of organisation to access the stored information on their computer
system. This malware impacts on the cyber security of the organisation very much. The
comparison can be identified in their opinion in order to eliminate the issue and upgrade the
cyber security systems. Cyber security is very essential and important for the organisation in
order to protect their vital data and information. In the era where organisations are digitising their
business premises by implementing various information technologies and systems there is a
constant challenge of protecting their data and information from hackers has been faced by the
business management. As cyber crime is increasing day by day and many hackers attacking big
organisations in order to degrade their reputation or earn in unethical manner.
Some researcher focused on investing more cyber security facilities while some scholars
focused on internal threats. These opinions of the authors and scholars aid the business
organisations so that they can improve their cyber security systems effectively and efficiently.
Though, researchers does not concentrate on providing education to the employees in order to
improve their knowledge regarding the cyber security. Thus, there are various issues and
challenges faced by the organisation in today's digital era. Authors and researchers analysed the
current consequences and suggests some effective measures that will aid the organisations to
boost up their potentials and increase their cyber security. Cyber security aims to protect the vital
data and information that stored in the computer system or cloud system from hackers, data
stealer, cyber criminals, etc.
Conclusion
From the above literature review, it can be concluded that cyber security is very essential
for the organisation. It not only protects the data and information which is precious for the
organisation but also safeguards the business organisation efficiently. In this context, the above
5

literature review aid in analysing the challenges in cyber security that faced by the business
organisation and managers. As cyber security technology and preventative measures become
more complex, criminals will turn to social engineering in an effort to bypass such systems.
These challenges includes malware, spyware, internal threats and unethical hacking. In the era of
digital technology, each and every organisation aims to install effective information technology
in order to improve the effectiveness in the quality of products and services. Though, in order to
do that, business management faced many challenges which has been identified in the above
literature review. Further, the gaps has also been identified by the researcher.
6
organisation and managers. As cyber security technology and preventative measures become
more complex, criminals will turn to social engineering in an effort to bypass such systems.
These challenges includes malware, spyware, internal threats and unethical hacking. In the era of
digital technology, each and every organisation aims to install effective information technology
in order to improve the effectiveness in the quality of products and services. Though, in order to
do that, business management faced many challenges which has been identified in the above
literature review. Further, the gaps has also been identified by the researcher.
6
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

REFERENCES
Books and Journals
Agudelo, J., Privman, V. and Halámek, J., 2017. Promises and Challenges in Continuous
Tracking Utilizing Amino Acids in Skin Secretions for Active Multi‐Factor Biometric
Authentication for Cybersecurity. ChemPhysChem.
Andre, T., 2017. Cybersecurity an enterprise risk issue. Healthcare Financial
Management, 71(2), pp.40-46.
Campos, J., and et.al., 2016. The challenges of cybersecurity frameworks to protect data required
for the development of advanced maintenance. Procedia CIRP, 47, pp.222-227.
Dua, S. and Du, X., 2016. Data mining and machine learning in cybersecurity. CRC press.
Hung, H., 2016. Confronting Cybersecurity Challenges through US-Singapore Partnership.
Johnson, T.A. ed., 2015. Cybersecurity: Protecting critical infrastructures from cyber attack and
cyber warfare. CRC Press.
Langmia, K., 2016. Cybersecurity, Cyberculture, and Africa. In Globalization and
Cyberculture (pp. 107-113). Springer International Publishing.
Lynn, W.J., 2010. Defending a new domain: the Pentagon's cyberstrategy. Foreign
Affairs, 89(5), pp.97-108.
Mazurczyk, W., Szczypiorski, K. and Tian, H., 2014. Network forensics and challenges for
cybersecurity.
McGettrick, A., and et.al., 2014, March. Toward curricular guidelines for cybersecurity.
In Proceedings of the 45th ACM technical symposium on Computer science education (pp.
81-82). ACM.
Nolan, A., 2015. Cybersecurity and Information Sharing: Legal Challenges and Solutions.
Congressional Research Service.
Norris, D., Joshi, A. and Finin, T., 2015, June. Cybersecurity challenges to american state and
local governments. In 15th European Conference on eGovernment (pp. 196-202).
Academic Conferences and Publishing Int. Ltd..
Tisdale, S.M., 2015. CYBERSECURITY: CHALLENGES FROM A SYSTEMS,
COMPLEXITY, KNOWLEDGE MANAGEMENT AND BUSINESS INTELLIGENCE
PERSPECTIVE. Issues in Information Systems, 16(3).
Wagner, A.R., 2015. Cybersecurity: New Threats and Challenges.
7
Books and Journals
Agudelo, J., Privman, V. and Halámek, J., 2017. Promises and Challenges in Continuous
Tracking Utilizing Amino Acids in Skin Secretions for Active Multi‐Factor Biometric
Authentication for Cybersecurity. ChemPhysChem.
Andre, T., 2017. Cybersecurity an enterprise risk issue. Healthcare Financial
Management, 71(2), pp.40-46.
Campos, J., and et.al., 2016. The challenges of cybersecurity frameworks to protect data required
for the development of advanced maintenance. Procedia CIRP, 47, pp.222-227.
Dua, S. and Du, X., 2016. Data mining and machine learning in cybersecurity. CRC press.
Hung, H., 2016. Confronting Cybersecurity Challenges through US-Singapore Partnership.
Johnson, T.A. ed., 2015. Cybersecurity: Protecting critical infrastructures from cyber attack and
cyber warfare. CRC Press.
Langmia, K., 2016. Cybersecurity, Cyberculture, and Africa. In Globalization and
Cyberculture (pp. 107-113). Springer International Publishing.
Lynn, W.J., 2010. Defending a new domain: the Pentagon's cyberstrategy. Foreign
Affairs, 89(5), pp.97-108.
Mazurczyk, W., Szczypiorski, K. and Tian, H., 2014. Network forensics and challenges for
cybersecurity.
McGettrick, A., and et.al., 2014, March. Toward curricular guidelines for cybersecurity.
In Proceedings of the 45th ACM technical symposium on Computer science education (pp.
81-82). ACM.
Nolan, A., 2015. Cybersecurity and Information Sharing: Legal Challenges and Solutions.
Congressional Research Service.
Norris, D., Joshi, A. and Finin, T., 2015, June. Cybersecurity challenges to american state and
local governments. In 15th European Conference on eGovernment (pp. 196-202).
Academic Conferences and Publishing Int. Ltd..
Tisdale, S.M., 2015. CYBERSECURITY: CHALLENGES FROM A SYSTEMS,
COMPLEXITY, KNOWLEDGE MANAGEMENT AND BUSINESS INTELLIGENCE
PERSPECTIVE. Issues in Information Systems, 16(3).
Wagner, A.R., 2015. Cybersecurity: New Threats and Challenges.
7

Wang, L. and Wang, X.V., 2018. Challenges in Cybersecurity. In Cloud-Based Cyber-Physical
Systems in Manufacturing (pp. 63-79). Springer, Cham.
Wooderson, P. and Ward, D., 2017. Cybersecurity Testing and Validation (No. 2017-01-1655).
SAE Technical Paper.
Online
Information Security, 2017. The top 10 cyber security challenges for businesses. [Online].
Available through:<http://www.barclaysimpson.com/news/the-top-10-cyber-security-
challenges-for-businesses-news-801833525>
Lord, N., 2017. WHAT IS CYBER SECURITY? [Online]. Available
through:<https://digitalguardian.com/blog/what-cyber-security>
8
Systems in Manufacturing (pp. 63-79). Springer, Cham.
Wooderson, P. and Ward, D., 2017. Cybersecurity Testing and Validation (No. 2017-01-1655).
SAE Technical Paper.
Online
Information Security, 2017. The top 10 cyber security challenges for businesses. [Online].
Available through:<http://www.barclaysimpson.com/news/the-top-10-cyber-security-
challenges-for-businesses-news-801833525>
Lord, N., 2017. WHAT IS CYBER SECURITY? [Online]. Available
through:<https://digitalguardian.com/blog/what-cyber-security>
8
1 out of 9
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.