ITC571 - Emerging Technology and Innovations: Cyber Security Report

Verified

Added on  2020/03/16

|7
|2654
|46
Report
AI Summary
This report, submitted by a student from Charles Sturt University, Melbourne, Victoria, as part of the ITC571 – Emerging Technology and Innovations course, focuses on cyber security. The report begins with an abstract highlighting the importance of cyber security in protecting computer networks and systems from cyber threats. It explores the significance and originality of the research, providing a literature review on the topic, and detailing the materials, methods, results, and discussions. The research employs a qualitative approach, specifically action research, to analyze the current state of cyber security, including data collection, analysis, and the identification of risks. The findings reveal in-depth analysis of awareness levels and present approaches to information security. The report concludes with the practical application of the research and its benefits for the scientific community and the beneficiaries, with the developed model and methodology receiving positive feedback and offering cost-effective solutions.
Document Page
Full Name
Student ID
Subject ITC571 – Emerging Technology and Innovations
Assignment No Final Report
Due Date
Lecturer’s Name Malka N. Halgamuge
Cyber security
- The paper title could be more specific than general.
Your Name
Your Email
School of Computing and Mathematics, Charles Sturt University, Melbourne, Victoria
Abstract- The computer networks and systems have been prone to the attacks from cyber security. Cyber
security safeguards them from the cyber threats. The threats are minimized by the security principles. The
research gas covered the significance, originality and the literature review on the area of cyber security. It
has also provided the material and methods along with the results and discussions.
Key Words— cyber security, security breaches, communication
1. INTRODUCTION
The cyber security involves the techniques and process used for protecting the computer networks and
system and the additional data. Cyber security safeguards them from the cyber threats. The threats are
minimized by the security principles.
Significance of the research:
The research is useful and interesting due to the various reasons. The cyber security has been
denoting the commitment that has been absent otherwise. Moreover, there has been an argument how the
companies could become proactive. The cyber security is not only the principle statements. It has been the
specific goals, decisions and objectives to manage the problems. It has been supplying the accountability to
the business stakeholders. Further is the highest-level contract for making the data safe. It is the first move
to help the companies come together for coordination.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Originality of the approach:
There have been solid lessons to be learnt from the compromises, accidents, mistakes and attack. Like the
personal lives the online activities are needed to grow up. They need to be much mature as per as the
security management is concerned. So eyes are to be kept for the new compromises. It must not be
forgotten to learn from the failures of the security.
Literature review:
("Google leads $100m cybersecurity investment", 2017)
Presently the cyber attacks seem to rise. For reducing these new methods are needed to be adopted. The
Google has initiated and invested a huge capital in the sector of cyber-security for reducing the threats.
("Cyber threats require an ongoing and relentless focus on security - Microsoft Enterprise", 2017)
The digitalization has been rising every day. Many people have been using the cloud for transferring the
data. Cyber security experts ate acquired by them forming groups to monitor the threats. The assimilation
of the machine learning and human vigilance has equaled the entire protection.
("Meeting the cybersecurity challenge", 2017)
The safeguarding of the threats to the entire organization is impossible. Hence the protection of data instead
of any interruption regarding innovation growth has been an important issue. Maximum of the large
companies have been investing huge money for strengthening the methods of Cyber security.
("Windows 10 for government agencies: helping protect, detect and respond to cyber-attacks - Microsoft
Enterprise", 2017)
The average expense of the breaches of security mentioned in the article has been huge. This has been even
after warning about the threat. The loss was about three trillion dollars to produce all the threats.
Document Page
("Cyber Security | Managed Security Services|TCS", 2017)
More than the security companies, the cybercrimes have been rising very fast. Hence many companies are
found to investigate large amount of data in the risk management and data security. They have been
founding to be work on the controlling of the security services. They have been assessing the threats for the
companies. They have been also delivering the technical support. These challenges could never be
prevented. However the article shows that there are scopes to decrease the threats. Hence focus s=must be
maintained to find the solutions for those threats.
("Commonwealth Bank of Australia years ahead of rivals on cyber security", 2017)
The Commonwealth Bank of Australia has been one of the popular banks in the nation. They are found to
take huge move in the attacks of cyber security and developed a strong wall of defense for the
organizations to access the threats inside. They have been developing the inbuilt features to stop the threats
generated by the hackers. The application has been consistently monitoring the security services and
securing the devices from the malware.
("Strengthening cybersecurity for federal government agencies - Microsoft Enterprise", 2017)
The rise in usage of the IOT devices has raised the digitalization and improving various security breaches
to government. They have been causing the vulnerabilities causing the loss of data. Currently the
waanycrypt has been a finest example of that. For reducing the cyber threats, Microsoft has provided few
cloud security solutions for securing the data. They have been possessing intelligent gaps in security. They
have been making improvements in that to collect the solutions for various kinds of threats regarding cyber
security. The assimilation of the human vigilance and artificial intelligence has been always the resource of
the organizations.
("Security Market Space | Micro Focus", 2017)
The HP has been one the popular providers of security in the market. They have been making latest trends
in the market through creating the security that has been micro focus for reducing the cyber threats. With
the help of that the data gas been focused at. Security is provided to the applications and powerful analytics
is developed to detect the unknown and known facts causing high loss to the organizations. It must be
ensured that every device are protected. Every time the security tests are performed on the services. As the
testing of the tracking of the system is complete, the system configuration changes to guard against those
threats. This Micro focus has been playing an important role in the security.
Research gap:
The limitation of the work is that the actual implementation of the information sharing has not been
the federal law. This has been due to the lack of the executive support. The research indicated that various
executives has been out of the loop as per as the issues of cyber security are concerned. The hole in the
work is the lack of awareness translating into the lack of support for the initiatives like the information
sharing. Though it has seemed that the sharing of the threat information has been effort to help the
competitors, the area that has not been the considered here is the enlightened sense of the needs of self
interest.
Aim of your research:
The aims are:
Document Page
 To promote the development of the jurisprudence of the cyber security laws.
 Conducting researches in the basis of the activities examining the developing legal trends regarding
the growth of cyber security laws.
 Finding the cyber threat landscapes in terms of the current emergent issues and recurring over time.
2. MATERIAL & METHODS
The qualitative research method has been conducted here. It is the action research and have attracted the
attention and achieved the acceptance of the scientific community regarding the information system. The
method’s application has been related directly to the scientific communities regarding the information
system. This application has been related directly to the aim pursued in the research. This has been defining
the security management and methodology model for the subject matter experts SMEs. This research has
been done through applying the method of action research in the participant variant. Here the critical
reference group has been putting the recommendations that have been made by the researchers into the
practice. It has been sharing impacts and outcomes of the researcher.
A. Data Collection:
The planning: As the issues related to the imposition of the cyber security systems are recognized,
the developing of the methodology must permit the creation with the minimum quantity of resources
adapted to the maturity and size of the company.
The action: This has defined the principal elements and then creating the model and applies that in the
determined case studies.
The observation: As the elements are applied, the results gas also evaluated. This would allow improving
the original proposals and defining a methodology eventually.
The reflection: The cyclical way of the action research method has been borne in mind here.
B. Data Inclusion Criteria:
This research has been done through applying the method of action research in the participant
variant. Here the critical reference group has been putting the recommendations that have been made by the
researchers into the practice. It has been sharing impacts and outcomes of the researcher.
Table 1: Selected Attribute Description
Attribute Name Data Type Description
The object being
researched
secondary The issue to be solved here along with the enhancing of the
cyber security of the information technologies.
The critical reference
group (CRG)
secondary This includes the people from where the research id carried out
and participating in the research.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
The fourth participant,
the beneficiary
secondary This has been consisting of the organizations benefiting from the
outcomes of the activities., The outcomes obtained after carrying
the research enhances the efficiency of the maintenance and
installation of the systems of information security management.
C. Data Analysis:
The data analysis has identified the risks resulting in the exponential growth in implementing cyber
security. It can provide the business with the comprehensive view of the internal and external risks. This is
done by alerting the decision makers regarding the hardware failures, unusual traffic patterns and potential
fraud. It has been converting the data into the actionable information. Thus it has been helping the business
to transmit the measures of the cyber-security from the reactive state to the proactive state.
III RESULTS
The study has revealed the indepth analysis of the awareness l;evels and the present approaches to
the information security. This has also included the fraud detecting in the organizations. Moreover, it has
measured the significance, present state and future plans of the initiative of the big data security analytics.
It is done around various sectors along with presenting the viewpoint of the numerous scopes, advantages
and challenges related to the initiatives. It has also outlines the range of technologies available presently to
address the challenges.
IV DISCUSSION
The main strength of the research is its practical application in the real world. It has permitted to
carry the actual technological transfer to the problem existing in the organizations. This has been needed to
get resolved by the scientific method known as the Action Research. It could be said that the action-
research method is demonstrated in the sector of cyber security management systems.
The main weakness is that the numerous events that took place in the research have been obliged to adapt
and modify the research.
As per as the contribution to the current literature is concerned, during this research the results are shared
obtaining with the scientific community.
V CONCLUSIONS
The outcomes obtained after applying the method has been the appropriate method to control the
security and the maturity level in the information system of the SMEs. The characteristics delivered by the
method and the orientation towards the SME have been received well by the SMEs. The applications have
been proving to be much positive. It has allowed the type of company for using the information security
management systems. The research method has allowed making enhancements to the methods, obtaining
Document Page
short-term outcomes and decreasing the expenses using the other methods. In this way it has satisfied the
business to a higher extent. The security maturity has the management model has been on the basis of the
methodology dominated and developed as the base schema. The results have been accepted by the critical
reference group. This also includes the benefits for the participants, the scientific ones for the researcher
and the practical one for the beneficiaries. The knowledge obtained could be applied quickly. The research
has been developed in the typical iterative and the cyclical process. This has combined the theory and
practice. Every future improvement to the model and methodology has been oriented in improving the
model. This is done without incurring the expenses. In conclusion it could be said that the report has
developed the value delivered by the qualitative methods of research. This is done by improving the
processes like cyber security management. This has been in regards to both retrieving the valid method and
applying the consistent process of improvement to that.
Document Page
REFERENCES
[1]"Google leads $100m cybersecurity investment", The Week UK, 2017. [Online]. Available:
http://www.theweek.co.uk/google/64386/google-leads-100m-cybersecurity-investment. [Accessed: 06-
Oct- 2017].
[2]"Cyber threats require an ongoing and relentless focus on security - Microsoft Enterprise", Microsoft
Enterprise - English (en-us), 2017. [Online]. Available:
https://enterprise.microsoft.com/en-us/articles/industries/government/cyber-threats-require-an-ongoing-
and-relentless-focus-on-security/. [Accessed: 06- Oct- 2017].
[3]"Meeting the cybersecurity challenge", McKinsey & Company, 2017. [Online]. Available:
https://www.mckinsey.com/business-functions/digital-mckinsey/our-insights/meeting-the-cybersecurity-
challenge. [Accessed: 06- Oct- 2017].
[4]"Windows 10 for government agencies: helping protect, detect and respond to cyber-attacks - Microsoft
Enterprise", Microsoft Enterprise - English (en-us), 2017. [Online]. Available:
https://enterprise.microsoft.com/en-us/articles/industries/government/windows-10-for-government-
agencies-helping-protect-detect-and-respond-to-cyber-attacks/. [Accessed: 06- Oct- 2017].
[5]"Windows 10 for government agencies: helping protect, detect and respond to cyber-attacks - Microsoft
Enterprise", Microsoft Enterprise - English (en-us), 2017. [Online]. Available:
https://enterprise.microsoft.com/en-us/articles/industries/government/windows-10-for-government-
agencies-helping-protect-detect-and-respond-to-cyber-attacks/. [Accessed: 06- Oct- 2017].
[6]"Cyber Security | Managed Security Services|TCS", Tcs.com, 2017. [Online]. Available:
https://www.tcs.com/cyber-security/managed-security-services. [Accessed: 06- Oct- 2017].
[7]"Commonwealth Bank of Australia years ahead of rivals on cyber security", Financial Review, 2017.
[Online]. Available: http://www.afr.com/business/banking-and-finance/financial-services/commonwealth-
bank-of-australia-years-ahead-of-rivals-on-cyber-security-20170529-gwfg3y. [Accessed: 06- Oct- 2017].
[8]"Commonwealth Bank of Australia years ahead of rivals on cyber security", Financial Review, 2017.
[Online]. Available: http://www.afr.com/business/banking-and-finance/financial-services/commonwealth-
bank-of-australia-years-ahead-of-rivals-on-cyber-security-20170529-gwfg3y. [Accessed: 06- Oct- 2017].
[9]"Cyber Security Enablement Services | TCS", Tcs.com, 2017. [Online]. Available:
https://www.tcs.com/cyber-security/cyber-security-enablement-services. [Accessed: 06- Oct- 2017].
[10]"Strengthening cybersecurity for federal government agencies - Microsoft Enterprise", Microsoft
Enterprise - English (en-us), 2017. [Online]. Available:
https://enterprise.microsoft.com/en-us/articles/industries/government/strengthening-cybersecurity-federal-
government-agencies/. [Accessed: 06- Oct- 2017].
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]