Analyzing the Role of ICT in Silobreaker Cybersecurity Report

Verified

Added on  2020/03/23

|23
|4538
|219
Report
AI Summary
This report delves into the crucial role of Information and Communication Technology (ICT) within the Silobreaker Cybersecurity Organization. The report is divided into two key tasks: Task A provides a SWOT analysis, examining the strengths, weaknesses, opportunities, and threats associated with ICT services in Silobreaker, along with recommendations for improvement. It also outlines short, mid, and long-term goals and objectives for ICT in cybersecurity. Task B presents a research report on the role of ICT, including a literature review, research questions, and methodology, along with a discussion of research limitations. The report emphasizes the increasing importance of cybersecurity in the face of growing cyber threats and explores how ICT can enhance data protection, mitigate risks, and ensure the secure operation of organizations. The report highlights the importance of addressing cyber threats, the role of ICT in enhancing cybersecurity, and the need for strategic planning and continuous improvement in the cybersecurity landscape.
Document Page
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Running Head: Report
Contents
Introduction.................................................................................................................................................2
Task A.........................................................................................................................................................3
Role of ICT in Cyber Security.....................................................................................................................3
SWOT Analysis...........................................................................................................................................4
Strength...................................................................................................................................................6
Weakness.................................................................................................................................................6
Opportunities...........................................................................................................................................7
Threats.....................................................................................................................................................8
Recommendations for Silobreaker Cyber Security Organization providers.................................................9
Goals and Objectives.................................................................................................................................10
Task B (Silobreaker Cybersecurity)...........................................................................................................11
Literature Review......................................................................................................................................11
Research Questions...................................................................................................................................16
Research Design and Methodology...........................................................................................................17
Quantitative Approach:..........................................................................................................................17
Qualitative Approach:............................................................................................................................17
Research Limitations.................................................................................................................................19
Conclusion.................................................................................................................................................19
References.................................................................................................................................................20
1
Document Page
Running Head: Report
Introduction
The primary purpose of writing this report is to obtain the knowledge and understanding about
the ICT (Information and Communication Technology) and its role in the Siobreaker Silobreaker
Cyber Security Organization organization. This report is categorized into two tasks, namely Task
A and Task B. Task A is to identify the role of ICT using detailed SWOT Analysis (including
strength, weakness, opportunities and threats) of a current ICT services in the Silobreaker Cyber
Security Organization. Task A report also aims to review the goals and objectives of ICT in
cyber security in short, mid term and long term plan and providing the recommendations for
Silobreaker Cyber Security Organization providers. Task B includes the research report on the
role of ICT in Silobreaker Cyber Security Organization. The research report comprises of the
detailed evaluation and impact of new and current ICT services in the Silobreaker Cyber
Security Organization using literature review, research questions, research design and
methodologies, and research limitations. In the end, there is a conclusion of the complete
combined report of both Task A and Task B.
2
Document Page
Running Head: Report
Task A
Role of ICT in Cyber Security
The usage of Information Communication Technologies (ICTs) is expanding day by day and so
its impact on various organizations. With the adoption of new ICT services, Cybercrimes such as
spam, hacking, phishing, frauds are increasing at a fast pace. This is because, nowadays, the
mobile and internet services are an essential part of every individual’s routine live all around the
world. The outcome of this would be that more the usage of ICT services more will be the threats
to security of confidential content. So, there is a need of putting an emphasis on increasing the
cyber-security in the overseas market and ICT plays crucial role in enhancing the cyber-security
by removing the malicious attacks on the confidential and non-confidential data shared on the
computer networks. ICT prevents the multiplication of spam and viruses by denial of service
attacks. Therefore, ICT helps the cyber security to maintain and ensure the safety of the
information carried over on different communication networks (Beirut, 2009).
3
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Running Head: Report
SWOT Analysis
The below table comprises of the summary of SWOT Analysis (Strength, weakness,
opportunities and threats) of the Silobreaker Cyber Security Organization.
Organization: Silobreaker Cybersecurity service Date :
Description of current/new ICT service : Currently, ICT plays a vital role in different sectors
including health, agriculture, education, commerce, cyber security, etc. but there is a need to
address the long term goals to prevent espionage, cyber attacks, frauds, etc. It has been observed
that the Research and development of cyber security service in Silobreaker organization may
affect the long term challenges of ICT based on DICE (Design, Incentive, Concensus, and
Environment) structure, but this DICE structure may help in cloud computing federal initiatives
and other elements of cyber security services.
Strength:
Covering the large domestic area with
Financial strength
World class Research and development
department of UK university.
Advantage of UK aerospace industry.
Better cooperation between public and
private relations
Weakness:
Loose bonds between business and
educational organizations.
Poor understanding of the trading
features (Pierre Audoin Consultants,
2013).
Limited buyer knowledge.
Lack of officially recognizing or
accreditations for vendors to small and
4
Document Page
Running Head: Report
World class organizations and
knowledge.
medium scale enterprises or SME’s.
Feeling of small and medium scale
enterprises to be excluded from
government organizations.
Opportunities
Advanced or modern IT market in the
UK.
Potential increase in the investment
from commercial and government
sectors.
An enhancement in the sector due to
increase in the Foreign direct
investment
Potential of Small and Medial scale
enterprises.
Utilizing opportunities to legal
responsibilities.
Threats
Depending upon the overseas cyber
security firms
Better funding of overseas investors.
Brain drain
Competition with international markets.
Displacement by cloud computing
services.
5
Document Page
Running Head: Report
Strength
1. Covering the large domestic area with Financial strength: - UK comes in the third
largest position in the financial strength which is a big payout on developing cyber
security solutions. Using this strength UK can develop alliances with the other countries
and can make use of those financial accounts at the highest possible level.
2. World class Research and development department of UK university: - The courses
provided by the UK universities to the student related to the cyber security will help them
bring more connects with the suppliers by making students work in the professional
environments.
3. Advantage of the UK aerospace industry: - UK can take advantage of the UK
aerospace industry by providing them cyber security services as the UK comes in the top
5 list of defence exporters.
4. Better cooperation between public and private relations: - The sharing partnership of
various cyber security services providing organizations such as CPNI, CGP and CSISP
are biggest assets in the Silobreaker Cyber Security Organization.
5. World class organizations and knowledge: - UK is considered as a pool of the talent
due to its large SME’s contractors working worldwide on various cyber security projects
like CNI, KPMG, etc.
Weakness
1. Loose bonds between business and educational organizations: - Some of the Small
and medium Enterprises feels that the students in the universities are fresh and doesn’t
consider them as professionals. Thus, the cyber security sector needs to promote the
6
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Running Head: Report
values of cyber security in the educational institutions or universities (Pierre Audoin
Consultants, 2013).
2. Poor understanding of the trading features: - Lack in the understanding of the trading
feature due to the unformulated administrative management is one of the weaknesses
found in the Silobreaker Cyber Security Organization.
3. Limited buyer knowledge: - Due to the lack of the understanding in dealing with the
marketing, funding companies, management, many SME’s find the alternative sources
for getting some funds to promote themselves.
4. Lack of officially recognizing or accreditations for vendors to small and medium
scale enterprises or SME’s: - Deployment or implementation of security features by the
unqualified experts in the SME’s leads to lose confidence in the buyers.
5. Feeling of small and medium scale enterprises to be excluded from government
organizations: - SME’s feel excluded from the government organization to the increase
in the cost of sale irrespective of contract values and other factors.
Opportunities
1. Advanced or modern IT market in the UK: - UK market is open to other organizations
providing cyber security services and provide openness to the overseas market and comes
at the fifth position as a largest IT market. It provides services like SAAS, e-commerce
and social networking which can make their UK market more strong and competitive
with other cyber security providers.
7
Document Page
Running Head: Report
2. Potential increase in the investment from commercial and government sectors: - It
has been observed that due to the exploitation of the cyber crime, there are chances that
the commercial and government sectors can increase their investment in the near future.
3. An enhancement in the sector due to increase in the Foreign direct investment: -
Due to the strong business bonds between the UK and the US defence vendors, UK can
take an advantage to improve the foreign direct investment (Republic of Uganda, 2011).
4. Potential of Small and Medial scale enterprises: - This is to increase the knowledge of
the SME’s about the cyber crimes which may lead to increase the investment of the UK
market.
5. Utilizing opportunities for legal responsibility insurance: - This can be done by
providing the insurance to the SME’s and building a business alliance with them.
Threats
1. Depending upon the overseas cyber security firms: - The competitive cyber security
firms are from the overseas organizations from US or other countries. The big names in
the cyber security firms in the US include Apple, Microsoft, IMB, HP, etc.
2. Better funding of overseas investors: - Funding of the other countries to the startups
and other ventures is a threat to the Silobreaker Cyber Security Organization. Overseas
funding to the UK companies is more and thus can acquire the UK markets by their
strong marketing skills.
3. Brain drain: - Overseas students getting education from the UK university are a threat to
the Silobreaker Cyber Security Organization as they more likely to leave the country after
learning and may utilize the skills learned from the UK and increasing their potential in
8
Document Page
Running Head: Report
their own countries. This will increase the competition of Silobreaker Cyber Security
Organization with other countries.
4. Competition with international markets: - Promotion of the cyber security services
from the other countries to the UK market may lead to overtake the cyber security
organizations. Thus, cyber security must be maintained to remain competitive with other
countries.
5. Displacement by cloud computing services: - Nowadays, Small and medium
enterprises feel that the cloud computing services are more secure than using the separate
softwares or organization services which may lead to reduce the services provided by the
Silobreaker Cyber Security Organization.
Recommendations for Silobreaker Cyber Security Organization providers
After analyzing the factors of SWOT, below are some recommendations for Silobreaker Cyber
Security Organization providers in the form of points: -
Recognizing different competitors and skills from different markets.
Remaining up to date with the impact of cloud computing.
Developing a strong business alliance with other competitors for the mutual benefits.
Exploring the areas where the need of cyber security is more and competition is less.
Understanding the competitors (PR Newswire Europe Limited, 2017).
Merge with small and large scale organizations, etc.
9
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Running Head: Report
Goals and Objectives
This part is to understand the goals and objectives of using ICT in Cyber Security on the basis of
SWOT analysis and to create a long, mid and short term plan. This part is also written to analyze
the strategies we can implement to develop new opportunities by using the current or already
existing strengths of ICT.From the SWOT analysis, we evaluated thatICT provides various
services to the Cyber security and helping them to grow in the UK market (Salami & Adisa,
2013). Thus, we are combining all the factors which can be used as a short, mid or long term
plan. Here are some factors which are mentioned below, but is not limited to:
Managing and promoting the cyber security awareness.
Allow the cyber security organizations in the US market to compete with the overseas
market.
Providing engagement of more vendors or suppliers in domestic area.
Helping US market to make business alliance with the market overseas.
Providing professional talents to work with SME’s providing services in cyber
security (Hajj, 2014).
10
Document Page
Running Head: Report
Task B (Silobreaker Cybersecurity)
Literature Review
The literature review is written to understand the need of cyber security and why the cyber
attacks happen on the confidential or non-confidential information. We have analyzed and
evaluated in the SWOT analysis that more is the usage of internet networks, more there will be
chances of the threats or cyber crime on the information. According to a report, approx 80% of
the household users have network connectivity over internet. That is, the majority of the people
are using internet for different purposes. In a report, it has been analyzed that between the year
2010 and 2012, the internet users have been doubled to its percentage from approx 25% to 50%..
So, it is very essential to understand the cyber security and how to protect the data from
malware. Also, it’s very necessary to aware the organizations regarding the cyber attacks and
what actions the organizations must take during the cyber attacks. The literature review on the
role of ICT in Silobreaker Cyber Security Organization is conducted to understand the cyber
security and its concepts. ICT helps the cyber security companies in a number of ways, and to
protect the organizations from the denial of access, so that organizations can operate in a secure
and efficient manner (Lasa, 2012).
In co-existence with that, among the top four risks, cyber attacks have been identified as one of
them. Cyber attacks are done intentionally to gather or modify the information without having
actual access to the database or software.Cyber attacks are potentially increasing day by day due
to the exponential sharing of the information over the networks. So, there is a need to understand
how to safeguard the information from any kind of misuse or illegal action.
11
chevron_up_icon
1 out of 23
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]