Literature Review: Challenges of Cybersecurity in Business - HI6008

Verified

Added on Ā 2022/11/04

|13
|2987
|58
Report
AI Summary
This report, submitted for the HI6008 Business Research Project, presents a literature review on the challenges of cybersecurity in business. It explores the meaning and concept of cybersecurity, highlighting the importance of data protection in the face of growing cyber threats. The report examines the challenges faced by businesses, including mobile tool vulnerabilities, social media risks, and cloud computing issues. It delves into strategies for improving cybersecurity, such as privacy by design, TC cyber technology, and the use of metrics and statistics. The analysis covers various aspects of cybersecurity, including data security, network protection, and the role of government standards. The report concludes with a summary of the key findings and emphasizes the need for proactive measures to protect businesses from cyber threats. The report includes an introduction, project aim and objectives, project scope, literature review, challenges, and proposed strategies, along with a conclusion and references.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someoneā€™s learning journey. Share your documents today.
Document Page
Running Head: RESEARCH
RESEARCH
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
RESEARCH 2
Table of Contents
Introduction......................................................................................................................................3
Project aim and Objectives..............................................................................................................3
Project scope....................................................................................................................................3
Literature review..............................................................................................................................4
Meaning and concept of Cyber Security......................................................................................4
Challenges of Cyber Security in Business...................................................................................5
Strategy to improve Cyber Security in Business.........................................................................6
Conclusion.......................................................................................................................................8
References........................................................................................................................................9
Document Page
RESEARCH 3
Introduction
The organization used ITDP (information technology data protection) as well as
information security for dealing with the cybercrime. Moreover, data security is a major problem
in IT industry (Alkhalil and Ramadan, 2017). In addition, it is illustrated that the internet is
becoming higher faster growth in the development of business development in both private as
well as business performance. The internet is imperative in improving business development for
both government organization as well as private. But, it could be imperative in developing threat
of information structure. For data protection, the information tool creates several tools in area of
cybersecurity.
In addition, it is illustrated that cybersecurity is imperative issue in computer as well as
information tool (Alkhalil and Ramadan, 2017). Moreover, the information protection should be
evaluated by each organization to maintain as well as securing their information. Moreover, the
tool era, each organization desires to mitigate cyber matter as well as increasing its operational
effectiveness. Moreover, higher choose of internet, the privacy as well as protection highly
needed by the organization. In age of 2006, privacy, as well as personal information, is
enhancing in Australia. The information can be confronted by diverse forms such as direct as
well as indirect attack. This information could be secured by the business for securing the
business information (Ali, et al., 2017).
Project aim and Objectives
This study is emphasized on evaluating challenges of business cybersecurity. The following
research objectives will be practiced to meet the research aim:
ļ‚· To discovers conceptual understanding about cybersecurity
ļ‚· To evaluate the challenges of cybersecurity in the business
Document Page
RESEARCH 4
ļ‚· To suggested cybersecurity approaches in business
Project scope
This study has a higher scope of the business as it increases knowledge about
cybersecurity. It is imperative for readers to enhance the depth understanding of cybersecurity
issues in the business. Moreover, this report also widens the scope for data tool business for
developing the increasing about diverse approach to increase the cybersecurity in the
performance of business.
Literature review
Meaning and concept of Cyber Security
Levy et al. (2016) depicted that cybersecurity is determined as process, tools, and
practices that are required to keep programs, data from damages as well as unauthorized
evaluation. With respect to computing perspective, security considers both cybersecurity as well
as physical. For improving cybersecurity, there is required to manage efforts by information
structure. It is illustrated that cybersecurity is computer protection structure from damages of its
hardware, software, as well as information. It prevents information by theft as well as disruption
of services that they offered.
On the other side, Lin and Bergmann (2016) examined that cybersecurity considers the
physical evaluating from hardwareā€™s as well as maintaining against the hazard that may come by
evaluating the injection and accessing networks of data code. IT security could be vital and
securing information through effective tools. In the current period, the internet is a vital
technique for both business well as individualā€™s users but their security is becoming a crucial
issue. Security is an imperative component that makes confidence among individuals internet
that is needed for any kind of business to increase commercial growth.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
RESEARCH 5
Arabo (2015) illustrated that virtualization tool is practiced by Netbox Blue Company to
secure the information networking procedure. It is imperative for cloud computing in the
organization. This tool is practiced in network operator approach in the visualization of network
acts. Through this method, it is opined that virtualization discusses diverse advantages as well as
measures of security threats that require to build reliance on the consumers towards the
computing structure by disputing threats. It also assures that person could have self-confidence in
the application of security that could enhance the IT organization productivity.
On the other side, Shackelford (2016) illustrated that level of growth relies on network of
digital structure as well as goods and services. Moreover, the business depends on variety of
cyber threats because online sites are accessed by the huge number of people that can threaten
the Australian consistency economy. It is illustrated that criminal activity is becoming a major
issue in the current era. It is illustrated that there is wide range of security breaches that have a
negative impact on the information communication tools structure. It is examined that the
number of cybercrime has been increased which could be secure and prevent acts of information
tool. The cybercrime could affect the higher growth of the business.
On the other hand, Tweneboah-Koduah et al. (2017) maintaining the time consistency,
advanced tool, and product quality service is the key issue for the organization. Therefore, the
organization should practice secure data as well as communication tool from begging as well as
over its lifetime. It is also examined that there are different information tool organization that
uses liaison, cybersecurity, as well as team coordination to make sure that all information tool
that practices the cybersecurity to make sure all the information are together as well as did not
copy share from anywhere. It is examined that Netbox Blue Pty Ltd is a profit of company that
enables standard for data as well as communication tool as well as offers security of networks.
Document Page
RESEARCH 6
Abomhara (2015) depicted that cybersecurity tool takes higher time to secure the data
caused by long derivation in standardization. Moreover, the Australian government could make a
higher profit by considering ICT standard that should be considered by Technology Company to
maintain cybersecurity in the organization.
Challenges of Cyber Security in Business
Yang and Wen (2017) depicted that a wide area of mobile tools is practiced by number of
a person in Australia that creates possibilities of occurring security risk. In the current era, people
changed information of smartphone from another as it affects the overall performance of the
organization. There is lack of privacy of maintaining thieves with higher target malware as well
as attracts occupy in the mobile apps. Moreover, there is also issue of stolen as well as lost as the
organization requires to create new tools as well replacing old with new tools by practicing
cybersecurity plan.
On the other side, Benmamoun et al. (2016) stated that social media is practiced by an
individual that might develop an individual cyber threat. Selection of social media might create
the cyberattack threat in the organization. For eliminating the risk, the organization should
evaluate the policies as well as process about cybersecurity as well as create more tool for
networking monitor, data leakage prevention, as well as log evaluation.
Liyanage et al. (2018) argued that a large number of organization practices could
compute to data security. It is imperative to secure the effectiveness to secure the time as well
effectiveness of business procedure. Moreover, well structural design as well as operational
security plan for managing the risk of cloud computing. It is evaluated that Netbox Blue Pty Ltd
could face different cloud computing issues because the data security stored data from the cloud.
Document Page
RESEARCH 7
Therefore, there is requisite to practice effective approaches as it could decline the company
goodwill.
In support of this, Sadeghi et al. (2015) stated that the organization should protect the
structure than data. Moreover, business could create the procedure to secure the data that could
be imperative to develop equal image among the consumers. Moreover, it is examined that new
tool and structure will develop the issues in business to control cybercriminal acts. It would
support to improve issues of security. It is evaluated that development of new tool the structure
named as iPhone, iPad, and Android. It might develop new threats. Hence, the organization
should practice imperative cybersecurity rules to creative cyber issues in organization. Moreover,
the internet of thing is an effective tool that assists to the organization for meeting the
organizational task. In addition, it is examined that internet of tool infrastructure becomes a
conventional business of threats.
Strategy to improve Cyber Security in Business
As per the opinion of He et al. (2016) privacy by design is an effective approach for
keeping privacy by keeping the security into design specification as well as, designing of new
process and system rather than trying to eliminate it. It can be evaluated that designing
procedures, projects as well as, products and system with privacy support for eliminating the risk
and developing trust between individuals with respect to firm. In addition to this, potential
concerns can be evaluated at initial phase as it will be simpler in order to eliminate the cyber
threat with reducing expenses. Netbox Blue Pty Ltd practices European Committee related to
Electrotechnical Standardization were, company has permitted to execute the privacy through
designing.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
RESEARCH 8
In favor to this, Teoh and Mahmood (2017) evaluated that company can use set of
standard in order to manage the confidential as well as, personal data protection concerns from
primary stage in designing and development of security technologies and services. Moreover, TC
cyber technology can be implemented by firm for keeping privacy. This technology could be
implemented for creating the technical report as well as, formation of high-level controlled eco-
system. It is also beneficial for organization to meet the requirement of security design as well
as, interacting by securing IT networks as well as, attached systems.
Pereira et al. (2017) stated that TC cyber technology offers privacy confirmation and
assurance as it can be advantageous for maintaining the confidentiality of data. This technology
facilitates the identity management as well as, scheme protection system with the purpose of
avoiding crime and theft. It is evaluated that sharing of cyber threat intelligence could be main
technology for eliminating the cyber concerns from firm. TC cyber technology can be
implemented for developing technical report as well as, describing and exchange cyber threat
information in standardized and structured manner. It would facilitate as well as, keeping global
overview of cybersecurity practices in technical manner.
On the other hand, Patrick and Fields (2017) evaluated that metrics and statistics can be
implemented by a firm for evaluating the cybersecurity. The lack of static tool of assessing the
day could develop quality concerns as well as, constructing questionable outcomes. It could
develop obstacles in development of contextual along with usable cyber threat intelligence.
Tisdale (2015) illustrated that reference model with information security indicator can be
implemented by an organization in order to measure the data security risk. This model illustrates
the security data and event management strategy. It considers data security ecosystem along
with, security operation centers. Through application of this technology, firm can create ISO
Document Page
RESEARCH 9
compliant measurement design related to cybersecurity. It makes competent to organization for
developing communication between spreading to exposure tool as well as, can constructing the
approach to develop secure SOC. The firm can update key performance security indicator
because it could be advantageous for evaluating the security maturity.
In support of this, Cameron and Marcum (2019) addressed that TC cyber technology
could be implemented for addressing different features of security like lawful interception and
data retention. This can be beneficial for assuring originator and integrity regarding security
approval. In such a manner, company addresses the security challenges in around the role of
international business as well as, virtual component of law enforcement tools.
Conclusion
Throughout the above interpretation, it could be concluded that cybersecurity is
illustrated as the process, practices, and technology that is designed for keeping computer
program, data and network through unauthorized damages and access. It could be concluded that
cybersecurity entails controlling to physical access through hardware along with, protecting data
networking process.It can be summarized that keeping the timing of constancy, advanced
technologies as well as, quality of products and services are some challenges for firm. Hence,
firm should protect information and communication technology from initiating the business as
well as, all over their existence.
It can be concluded that there is no privacy related to eliminating thieves through targeted
malware as well as, application of mobile. Moreover, social media is highly used by an
individual that can create personal cyber threat concerns. Cloud computing can develop the
business in order to secure the information. In addition to this, application of new system and
Document Page
RESEARCH 10
platform at workplace can develop concern for firm in terms of managing cybercriminal
practices.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
RESEARCH 11
References
Abomhara, M., 2015. Cybersecurity and the internet of things: vulnerabilities, threats, intruders
and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Ali, W., Dustgeer, G., Awais, M. and Shah, M.A., 2017, September. IoT based smart home:
Security challenges, security requirements, and solutions. In 2017 23rd International
Conference on Automation and Computing (ICAC) (pp. 1-6). IEEE.
Alkhalil, A. and Ramadan, R.A., 2017. IoT data provenance implementation
challenges. Procedia Computer Science, 109, pp.1134-1139.
Arabo, A., 2015. Cybersecurity challenges within the connected home ecosystem
futures. Procedia Computer Science, 61, pp.227-232.
Benmamoun, M., Sobh, R., Singh, N. and Moura, F.T., 2016. Gulf Arab Eā€Business
Environment: Localization Strategy Insights. Thunderbird International Business
Review, 58(5), pp.439-452.
Cameron, E.A. and Marcum, T.M., 2019. Why Business Schools Must Incorporate
Cybersecurity into The Business Curriculum: Preparing the Next Generation for
Success. Journal of Higher Education Theory and Practice, 19(4).
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y. and Gabrys, B., 2016, July. The
security challenges in the IoT enabled cyber-physical systems and opportunities for
evolutionary computing & other computational intelligence. In 2016 IEEE Congress on
Evolutionary Computation (CEC) (pp. 1015-1021). IEEE.
Levy, J., Yu, P. and Prizzia, R., 2016. Economic Disruptions, Business Continuity Planning and
Disaster Forensic Analysis: The Hawaii Business Recovery Center (HIBRC) Project.
In Disaster Forensics (pp. 315-334). Springer, Cham.
Document Page
RESEARCH 12
Lin, H. and Bergmann, N., 2016. IoT privacy and security challenges for smart home
environments. Information, 7(3), p.44.
Liyanage, M., Ahmad, I., Abro, A.B., Gurtov, A. and Ylianttila, M. eds., 2018. A
Comprehensive Guide to 5G Security. John Wiley & Sons.
Patrick, H. and Fields, Z., 2017. A need for cybersecurity creativity. In Collective Creativity for
Responsible and Sustainable Business Practice (pp. 42-61). IGI Global.
Pereira, T., Barreto, L., and Amaral, A., 2017. Network and information security challenges
within Industry 4.0 paradigm. Procedia Manufacturing, 13, pp.1253-1260.
Sadeghi, A.R., Wachsmann, C. and Waidner, M., 2015, June. Security and privacy challenges in
industrial internet of things. In 2015 52nd ACM/EDAC/IEEE Design Automation
Conference (DAC) (pp. 1-6). IEEE.
Shackelford, S.J., 2016. Business and cyber peace: We need you!. Business Horizons, 59(5),
pp.539-548.
Teoh, C.S. and Mahmood, A.K., 2017, July. National cyber security strategies for digital
economy. In 2017 International Conference on Research and Innovation in Information
Systems (ICRIIS) (pp. 1-6). IEEE.
Tisdale, S.M., 2015. Cybersecurity: Challenges from a Systems, Complexity, Knowledge
Management and Business Intelligence Perspective. Issues in Information Systems, 16(3).
Tweneboah-Koduah, S., Skouby, K.E. and Tadayoni, R., 2017. Cyber security threats to IoT
applications and service domains. Wireless Personal Communications, 95(1), pp.169-
185.
Document Page
RESEARCH 13
Yang, S.C. and Wen, B., 2017. Toward a cybersecurity curriculum model for undergraduate
business schools: A survey of AACSB-accredited institutions in the United
States. Journal of Education for Business, 92(1), pp.1-8.
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]