Cyber Security Threats and Mitigation Strategies: Primark Case Study

Verified

Added on  2023/01/05

|21
|7572
|72
Report
AI Summary
This report examines the critical importance of cyber security within the retail industry, using Primark as a focused case study. The report begins by defining cyber security and its significance, highlighting the increasing threats faced by businesses. It analyzes the impact of cyber security incidents on the retail sector, with specific attention to Primark's experiences. The research includes an overview of the research, background, aims, objectives, and the structure of the report. A literature review explores the effects of cyber security incidents and the challenges Primark has faced, such as phishing attacks and data breaches. The methodology chapter details the research methods employed. Furthermore, the report formulates strategies for minimizing future cyber attacks on Primark, offering insights into how retailers can improve their security postures and protect sensitive data. The report also examines the design and implementation of cyber security measures and concludes with a discussion, recommendations, and references.
Document Page
Importance of Cyber Security
In Retail Industry
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
Topic: “Importance of Cyber Security in Business”........................................................................2
CHAPTER 1: INTRODUCTION....................................................................................................2
1.1 Overview of research........................................................................................................2
1.2 Background of the research..............................................................................................2
1.3 Research aim....................................................................................................................3
Research Objectives...............................................................................................................3
1.4 Contribution of your research...........................................................................................3
1.5 Structure of the report.......................................................................................................3
Chapter 2..........................................................................................................................................5
Literature Review.............................................................................................................................5
2.1 To determine the impact of cyber security incidents to retail industry............................5
2.2 To ascertain challenges encountered by Primark as a result of cyber security attack......6
2.3 To formulate strategies for minimising the probability of occurrence of future cyber
attacks on Primark..................................................................................................................7
Chapter 3........................................................................................................................................12
Research Methodology..................................................................................................................12
3.1 Methodology Utilised..............................................................................................................12
3.2 Summary..................................................................................................................................16
Chapter 4........................................................................................................................................17
Design and Implementation...........................................................................................................17
4.1 Methodology............................................................................................................................17
4.2 Summary..................................................................................................................................18
References......................................................................................................................................19
1
Document Page
Topic: “Importance of Cyber Security in Retail Industry”
CHAPTER 1: INTRODUCTION
1.1 Overview of research
Cyber security is defined as body of practices, technologies and processes for protecting
devices, programs, networks and data from any kind of damage, attack or unauthorised access. It
implies practice to defend servers, electronic systems, mobile devices, etc. from malicious
attacks. As per the statistics, it has been identified various cyber attacks have been carried out in
2020 across United Kingdom which have created adverse impact on overall operations of firm
(Al-Sartawi and Razzaque, 2020). This means that cyber security is crucial for firm and different
trends in terms of attacks that are being carried out needs to be analysed. It will enable to
formulate strategies that will further lead to prevent cyber attacks.
For understanding the significance of cyber security, Primark is considered which is Irish
fast fashion retailer with their headquarters in Ireland. It was founded by Arthur Ryan on 13th
June 1969 and renders their services in different countries. Their key products comprises of
cosmetics, clothing and housewares. Recently the cyber security attack has been carried out on
Primark where email was sent for winning £500 for filling up survey. Here, scam utilised logos
and images of Primark for convincing users legitimacy of email (Primark issues warning over
scam offering £500 vouchers | #onlinescams | #scams | #internetscams, 2020).
1.2 Background of the research
Cyber security is defined as protecting internet-connected systems like software,
hardware and information from cyber-threats. The practice is utilised via enterprises and
individuals for protection of unauthorised access for data centres along with computerised
systems. The rationale behind execution of cybersecurity is to render enhanced security posture
for networks, servers, mobile devices, data and computers from attackers who have one or other
malicious intent. Cyber attacks are formulated to render enhanced access, deletion or extortion of
sensitive information and make cyber security vital (Blum, 2020). The study is conducted to
identify impact and a different strategy to ensure that organisation along with individuals whose
information is stored is protected. Across UK, it has been found that near around 36.6 million
records have been breached which is a large number (List of data breaches and cyber attacks in
August 2020 – 36.6 million records breached, 2020). This makes it more important that
2
Document Page
individuals along with firms like Primark takes essential steps through which the overall
pessimistic impact cannot be eradicated.
1.3 Research aim
“To analyse the significance of cyber security in business.” A case study on Primark.
Research Objectives
To determine the impact of cyber security incidents to retail industry.
To ascertain challenges encountered by Primark as a result of cyber security attack.
To formulate strategies for minimising the probability of occurrence of future cyber
attacks on Primark.
1.4 Contribution of your research
In this study the impacts will be analysed which are created due to cyber attacks within
the retail industry. The emphasis will be made on the challenges that are being faced by Primark
after the attack has occurred and what all the reasons behind its occurrence. Furthermore, certain
strategies will be developed for eradication of the future probabilities. It becomes difficult to
identify that attack will occur but by continuously remaining updated with the technologies and
methodologies used firm can ensure up to certain extent that there systems are secured.
1.5 Structure of the report
This is critical section of research that assists readers to classify information associated
with chapters that will be covered within the study is defined as route map. The different
chapters will be used for having a conclusion and their overview is illustrated beneath:
Chapter 1: Introduction: This chapter will furnish basics about the topic that will be
covered in the dissertation. It comprises of the basis along with adequate information associated
with the topic that is considered. The reader will be able to have data related with background,
aims, objectives and contributions that are being made within the topic.
Chapter 2: Literature Review: This denotes second chapter that is dependent on study
carried out via authors. In this section of dissertation, various books, research papers, journals
articles, magazines and online mediums will be used for accessing adequate information. This
aids reader to identify the work that has been done by others as well as their point of view. Here,
emphasis will be laid on cyber security aspects and the different ways which have been carried
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
out along with their mitigation. Through this, the literature gap which prevails can be identified
in an adequate manner.
Chapter 3: Research Methodology: This chapter will provide details related with
methods that are used for carrying out research. It comprises of secondary and primary method to
gather data. Furthermore, philosophies, qualitative or quantitative and many other aspects
associated with research will be illustrated. This all will be illustrated in the context of cyber
security. It is a crucial method through which researcher can have support for working with
peculiar topic.
Chapter 4: Design and implementation: This involves interpretation of data associated
with the topic. The frequency table will be developed that will aid researcher to identify agreed
along with unagreed respondents with reference to cyber security concepts. Furthermore,
various graphs and tables will be used for carrying out analysis of data that is being attained.
Through this, adequate outcome can be attained by taking into consideration different
perspectives and conditions which might take place due to safety concerns.
Chapter 5: Discussion: The fifth activity will render assistance to investigator for
identification of primary as well as secondary information. Here, literature review will be used to
examine secondary information that is related with the topic. Furthermore, questionnaire will be
used for having primary data with reference to significance of cyber security along with benefits
that can be attained through its usage.
Chapter 6: Conclusion and Recommendation: This denotes last chapter which is
accountable for furnishing support to readers with respect to what is done and results that will be
acknowledged by conducting research. This chapter illustrates research findings along with
analysis up to certain extent. Along with this, some recommendations will be furnished for
organisation that will aid them to protect from any kind of cyber attacks in future.
4
Document Page
Chapter 2
Literature Review
The summary that has been published within specific area is referred to as literature
review. This is accountable for development of landscape for readers that will render absolute
understanding in context of improvements that have been carried out. The landscape renders
learner with relevant knowledge that is gathered from previous work conducted by authors
within peculiar field. Rationale behind opting for literature review is to assimilate wide range of
information so that insight can be attained and accordingly work can be conducted (Byrne,
2020). Different sources are being used for accumulation of information like articles, internet,
books, magazines, etc. This will lead them to deliver peculiar data and have optimistic results of
research. Basically, literature review is a systematic process which is being applied by
investigator for accomplishment of in-depth data related with current topic. In addition to this,
the gap that prevails in previous studies is conducted and through their identification, the further
work investigator needs to carry out will be identified. Within this section of dissertation, each
objective that is developed will be analysed in organised manner.
2.1 To determine the impact of cyber security incidents to retail industry
According to Hepfer and Powell (2020), cyber security implies process or state to protect
as well as recover programs, networks and devices from certain kind of cyber attacks. They
evolve danger to consumers, organisation and employees and are being designed for assessing or
destroying sensitive information as well as it might be for extortion of money. This further leads
to create a pessimistic impact on businesses along with this personal lives of individuals will also
be hampered like identity theft. The crime that is related with attaining financial or personal
information about other individuals to utilise their identity for carrying out frauds like having
unauthorised purchases or transaction is referred to as identity theft (Hepfer and Powell, 2020) .
The end result that will be attained via this is that there will be a definite damage on finances,
reputation and credits.
The strong cyber security system comprises of different layers in order to protect spread
of attacks. But this entirely does not depend on cyber defense technologies. It also depends on
the critical and analytical abilities that are being possessed by individuals. With evolution of
technology organisations are moving forward to digitalisation within their processes which acts
5
Document Page
as a reason behind occurrence of the attacks. This can be understood by taking an instance like
employees might not be technically sound which means that without appropriate knowledge they
might click on the links which they should not. It may lead to unidentified attacks and even after
doing so there is high probability that firm might not be able to know that are attacked. The
rationales behind going for technological shift is that the processes which employees have to
carry out manually will be conducted are automated and overall performance will be amplified.
But this makes them prone to wide range of attacks that involves, phishing, identity theft, virus,
malwares, Trojan horse and many others which creates the pessimistic impact on firm in context
of their performance, confidential information and their overall brand image.
The various attacks have been carried out in 2020, as due to the pandemic situation across
the country most of the firms have shifted for work from home which means that maximum of
the activities were carried out via online medium. This makes organisation more vulnerable to
attacks.
2.2 To ascertain challenges encountered by Primark as a result of cyber security attack.
According to Lloyd (2020), the assault that is being launched via cybercriminals through
usage of one or more systems against a network is defined as cyber attack. It is liable for
maliciously disabling computers, use breached systems like a launch point for carrying out
attacks or steal data. Cybercriminals opt for different methods for conducting cyber attacks that
involves phishing, denial of service, malware, ransomware and many more. Wide range of
attacks are carried out in order to attain details about individuals.
An instance can be taken into consideration with reference to cyber security attack that is
carried out on Primark. In this case, Primark has issued warning related with scam where
vouchers of worth £500 are being offered. The phishing attack utilised official branding for
promotion of fake surveys that leads to harvest sensitive data like payment that comprises of
account number of victim's bank (Lloyd, 2020). Email that is being sent promises that individual
have chance to win gift cards that are worth £500. When victim clicks on continue for free then
the fake website will be opened where sensitive data like PIN card, security code and account
details will be asked. In case, if addressee does not give respond then the message is sent that
comprises of final message and other details like your email has exclusively selected. The scam
is carried out via Facebook pages for legitimacy of scheme with usage of fake user that links
fake survey to page. The firm have responded that email campaign was not carried out by them
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
as well as voucher offer. It has been made clear that the voucher is not genuine and this will not
be accepted in stores. But before this various users have fallen into the trap set by the intruder for
having access to their personal and financial information.
2.3 To formulate strategies for minimising the probability of occurrence of future cyber attacks
on Primark.
As per Vozikis and et. al, (2020), it is identified that various firms are prone to cyber
attacks due to the reason that weak or poor measures are being taken up by them. Organisation
like Primark goes through various challenges within market and for dealing with them it is
necessary to handle plans as well as implement them for attaining security. For formulation of
strategies it becomes essential for Primark to acknowledge different factors which creates
pessimistic impact on the ways in which services are being delivered by them. For this analysis
is being conducted by usage of different frameworks, they are specified below:
SWOT Analysis:
The framework that is used for evaluation of competitive positioning of the organisation
as well as formulates strategic planning is defined as SWOT analysis. This will aid Primark to
conduct analysis of their strengths along with weakness. Furthermore, through this firm can
explore opportunities along with threats. With respect to Primark, SWOT analysis is specified
below:
Strengths:
Primark have rapidly grown in years and this has made them to expand their operations
in UK as well as other countries. In 2019 Primark had 350 stores present in 11 countries
across America and Europe.
50,000 people are employed by the firm from all over the world which enables them to
serve their customers in an affirmative manner. This also allow them to have wide range
for apparels that comprises of childrenwear, menswear, womenswear, lingerie,
accessories, homewear and hosiery.
The profits of firm have increased with constant currency and this has also amplified
their reach (Abraham, Chatterjee and Sims, 2019). Primark have enhanced their presence
across 7 countries by furnishing sustainable goods.
7
Document Page
Firm is dependent on mouth of word promotions instead carrying out any kind of
advertising campaigns. This implies that they make more investments on their other
activities instead of having any kind of marketing approach.
Primark have strong presence in Europe and thus they are known by Penneys in Ireland.
They have opted for cost leadership strategy for offering their customers with affordable
prices.
Weaknesses: Because of restricted economic growth across EU, Primark is held back in context of
overall profit that they can attain.
By outsourcing manufacturing of apparels, there can be inconsistencies within quality that is
offered by firm to their potential customers (Anwar and et. al., 2017). Primark do not offer their services via online platform. In 2013, they have tested
electronic commerce through ASOS but partnership did not go well. Furthermore, the
shipping and cost was high which makes online trading not apt for the firm.
Opportunities: Primark can continue to emphasise in Europe by expanding their operations across cities
such as Berlin, Vienna, Madrid, Lisbon, etc. They can also have stores in Middle East
like in South Africa, India, China and many more. By carrying out extensive research, Primark can also analyse the markets of North-east
America for carrying out further expansion. They can conduct their operations like selling of products via online medium.
Threats: Primark have all their stores across Europe which implies their sales depend on EU
economy and it is on low growth trajectory. The organisation does not have presence within emerging markets and supply chain is
also vulnerable to certain natural disasters as well as other incidents (Culot and et. al.,
2019).
In context of technology, firm is not having adequate measures for protecting themselves
from any kind of cyber attacks. This makes them more prone to different online attacks.
8
Document Page
Pestle Analysis:
The tool that is used for identification of macro forces that are being experienced by
organisation while delivering their services within the marketplace is referred to as pestle
analysis. Primark admires the significance of analysis in creation of strategies and in this context
their Pestle analysis is specified beneath:
Political factors: The operations conducted by firm are subject to policies and regulations
formulated by government and this involves tariffs, political stability, employment laws,
etc. Brexit have deteriorated the pound which have created impact on retail sector of UK.
Furthermore, high VAT makes it difficult for Primark to keep low prices for their
customers (DeCoste, 2017).
Economic factors: The economic influence of Brexit on retailers is due to rise in
inflation which results within fall of pound that leads to cause hike within import prices
due to which Primark have to increase cost of their products. In addition to this, covid-19
has adversely hit the economic growth of the company as sales did not took place.
Social factors: The social trends which prevails across UK is growing obesity and this
has been found that obese female shoppers prefer not to go to certain retailers as they lack
plus size range. This leads Primark to have opportunities within the marketplace.
Furthermore, people prefer to have access to services easily and for this they opt for
online shopping through which they can avoid spending unnecessary time in activities
that can be done easily.
Technological factors: The shopping habits as well as expectations of people are
changing rapidly which is driven by e-commerce. This implies that seamless online
experience is becoming necessity for each retailer (Ettredge, Guo and Li, 2018). With the
increasing impact of Covid-19 people have opted for social distancing and this means
that people hardly visit any store and need to have shopping via online mediums. This
makes it important for Primark to have their strong presence but will evolution of
technology and lack of relevant knowledge this leads to open up channels for certain
cyber attacks which will further have pessimistic impact on the organisation.
Legal factors: This illustrates alterations within regulations, laws and policies to which
organisation are legally bounded. Across UK, the regulations comprises of anti-
9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
discrimination laws which are accountable for governing labour relations within
workplace. Furthermore, Primark need to ensure that while opting for technology while
rendering their services, they need to adhere to data privacy policies so that information
of their assets is kept confidential and third person do not have access to this.
Environmental factors: Primark supports different community projects, local charitable
firms and they have also opted for paper bags instead of plastic bags for minimising their
influence on the environment. They are working with partners with respect to making
improvements to combat critical sustainability challenges (Jeyaraj and Zadeh, 2020).
Like they review the chemical that utilise for colouring materials from which clothes are
made via zero discharge of hazardous chemicals. Primark is also member of SAC
(sustainable apparel coalition) for enhancing sustainability of supply chain.
The above section illustrates different aspects that are acknowledged by Primark while
delivering their services in different marketplace. This makes it essential that adequate measures
are being taken up by them to sustain within the market. Further, with covid-19 firms have
completely digitalised their processes but these leaves room for ample of cyber attacks (Jideani,
2018). For dealing with them Primark needs to make sure that they have strong systems for
dealing with such kind of situations. The certain strategies that can be adopted by Primark for
dealing with cyber attacks in future are illustrated beneath: Identification of threats: Threats such as unauthorised access to system needs to be
handled immediately before any kind of information is lost. Firms have information
related with employees, customers, suppliers, their financial information, strategies, etc.
stored within the system. In case, if it is leaked then this might ruin companies. Intruder
tends to determine ways that will lead them to invade privacy as well as steal data which
is important (Vozikis and et. al, 2020). Thus, it is important that relevant access to
provided to individuals. Beware about cybercrimes: It is important for organisation to think like an attacker in
order to understand what they can do. This will enable Primark to make sure that firm
possess relevant plans and strategies to deal with certain attacks. Firm have to maintain
records of all the details which seems attractive to criminals and which is not.
10
Document Page
Furthermore, proper risk assessment must also be conducted on regular basis for ensuring
effectual solution. Keep eye on employees: Human resources are crucial assets of organisation as they
possess deep insight into business and also have information related with operations that
have to be conducted. Primark needs to inspire their employees as well as discourage
from spreading any kind of vital information. In addition to this, backup of all the
messages that are interchanged among employees needs to be kept and must be assessed
to acknowledge if any kind of information related with attacks is carried out or nor. This
may be in encrypted form and there is possibility that it is not recognised (Yang, 2020).
Furthermore, the links they click on or information they share on any platform must be
taken into consideration.
Utilisation of two-factor authentication: This is efficacious way for preventing cyber
attacks by making sure that multi-factor authentication is enabled by firm for application
that makes use of internet. Assigning login passwords to employees of Primark will not
serve the purpose and in case if passwords are compromised by phishing or any other
attack then it will become easy for cyber criminals to have access to systems. Through
multi-factor authentication, employees have to give various details rather than single
information. This will lead Primark to have higher standards of authentication.
11
chevron_up_icon
1 out of 21
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]