Increasing use of internet also increases risk of cyber threat. Huawei Company is also exposed to some security threats that are faced by its supply chain system. This research would explore these risks and would identify solutions to beat them. For assessing the security threats that would be identified for the company, the research would make use of the NIST framework.
The key objective of the organization is to make its end points secure. For this level of security, the organization already uses some procedures like USB port protection using BitLocker. The supply chain system of the organization consists of a number of propriety applications that are developed for the company and the third party solutions integrated together to take care of its supply chain operations (Veracode, 2017). However, the IT infrastructure has resulted into certain security challenges that even the USB locker is unable to prevent as the data still passes through a network causing leakage of data. Security issues that the organization is currently facing include (DHS, 2009):
The objective of this research project is to identify the security risks faced by the organization and come up with the recommendations to resolve them such that the security posture of the company can be improved.
Following activities are included in the scope of the research project:
Key concerns of the organization is its supply chain which is facing cyber security risks that needs to be addressed by improving the security posture of the supply chain of the organization. USB encryption is a major problems wit the Huawei Company as one of the security risks. Several surveys were carried out on the company representatives to understanding what kinds of problems did they face with he USB level protection and it was found that the techniques used for the USB and enterprise level security protection was not effective enough. The organization systems failed to encrypt the data that was flowing through the network of the organization. Moreover, the organization also failed to secure the end points of the systems.
As a result of the security problems, the environment of the company became hostile. TO solve this issue the company implemented BitLocker for its USB protection. The encryption had to be efficient such that it enhanced the company’s capability to prevent the cyber crimes from happening in the company through end point attacks.
The organization is currently using third party solutions that are integrated with the devices used in the company and with other software. The time that is taken to capture the data became easy and thus, data was stored efficiently. This also allows the organization to enhance its control over the data that was flowing through the network. However, the integration of the application s with third party solutions did arise security issues that are required to be addressed. The organization is facing risk of losing the privacy and security of the network data. This is mainly because the security settings of individual solutions were not always as per the company policy demands. This has resulted into entry of cyber worms in the system affecting the security and efficiency of the system.
In addition to the encryption of USB, company needs more controls over the USB access as threats can modify the access control of this end point. However, currently the company does not have any solid control over the access to USB nor does it have a control over the data that flows through the network beyond certain level. Unauthorized users can enter into the network and access the data that flows over the company network. This also poses additional risks as these entrants can spread the attacks in the network.
Moreover, there are risks of unidentified devices connecting to the organizational systems which can again pose the cyber threats to the supply chain system of the company thereby reducing efficiency of the system operations. The organization lacks any effective data protection system and in the case of a malware attack, company risks losing a large amount of its data.
The company was working on the reverse engineering methods for virus attack prevention but it is only in the developing phase but once it is developed, it can be expected to bring more security benefit stop the organization specially for the data recovery.
Some problems that can be identified with the company’s security capability include lack of effective emergency response system, absence of breach indicators, lack of effective disk encryption, lack of application control and ineffective mobile management system.
The aim of this research is to identify current security problems of Huawei Company and come up with the methods to resolve them such that appropriate recommendations can be made to enhance the security in the company. To achieve this aim, following research questionnaire required to be answered in this research:
A research methodology can be formulated based on the assumptions of the philosophical constructs that are relevant that are structured through the exploration of ontology that identifies existence of knowledge and epistemology which helps in understanding it. As per these philosophies, there can be two approaches a researcher can take including positivism and interpretive. Positivists say that there exists a true knowledge that can be empirically explored while interpretevists say that multiple perspectives of people form an illusion of reality. When both approaches are combined, they can be used for building theories. As this research assumes the existence of a reality and needs empirical testing of the problems faced by the organization, positivis approach would be taken in the research.
For this, the researcher would make use of standard steps of identifying the research questions, selecting research design collecting data, interpreting data, analysing it, and collating findings to derive a conclusion (HP Enterprise, 2015).
The research is required to explore how the company systems are working and what are the challenges or gaps in the system that need improvement. As per the research already conducted by other researchers on the organization, some useful insights were delivered. These included considerations of specific challenges that were faced by the organization and the measures that were taken by the company for improving its security. The researchers also exposed the challenges that organization faced while adopting the security enhancement techniques in the organization. However, with this insight forming the base of the inquiry, a deeper inquiry is required to be made on how the identified problem can be solved and thus, the research needs a primary data exploration which would be done by using interview process (Infrascale, 2014).
Secondary Research: Past journals, research reports, books, and security specific articles on the authentic websites would be explored to identify secondary resources for the literature data analyses. The resulting data would be thematically analysed to come up with critical themes for a further exploration of the study that would be important for making the recommendation that can enhance the security posture of the organization (MYOB, 2016).
Primary Research: In the primary research, the interview guide would be prepared based on the themes that are identified in the secondary data analysis. The security professionals would be approach including two internal employs of the organization for the interview. There would also be 5 more professionals who would be approach form outside the company for the interviews (NIST, 2014).
The primary research data would be collected through the interview that would be conducted on the 7 professionals including 2 internal and 5 external security professionals. The sample size is small because it would make use of an extensive inquiry with individual and explore specific security problem that can be explored in depth. A huge amount of information is going to guide the research. A small sample size appears to be sufficient for the current research as it s only going to explore the problems of a specific company and also address specific issues that are already identified in the previous researches. For the interviews, the security professionals would be approached by the researcher to take face to face interview and the conversations happening during the interview would be recoded and transcribed into textual dat. An interview guide would be used for guiding the interview with open ended questions on the security challenges as well as solutions to be implemented in the supply chain of the organization (Raddon, 2010).
The data that would be obtained from the past research studies would be analysed using thematic analyses which would reveal some themes that would be coded for identifying common categories of challenges and possible solutions. The codes would be refined with deeper exploration of the secondary data such that the final thematic codes that are selected can be used to come up with a question set for the interview (TrustSphere, 2012).
The primary research would be conducted using an interview and the data thus obtained would be analysed using a content analyses that would be based on the selected features and short descriptions related to the security challenges and solutions. A large textual data would be divided into smaller segments of data for this analysis (Raddon, 2010).
This research has certain limitations like:
Milestone Step |
Milestone Date |
Introduction and objectives |
15th June 2017 |
Literature review |
10th July 2017 |
Methodology selection |
15th July 2017 |
Thematic data analysis |
20th July 2017 |
Interview guide preparation |
24th July 2017 |
Data collection |
15th Aug 2017 |
Data Analysis and interpretation |
20th Aug 2017 |
Conclusions and recommendations |
22nd Aug 2017 |
Finalization of reports including proofreading and editing |
24th Aug 2017 |
Report submission |
25th Aug 2017 |
In this research, a research on the security systems of Huawei Company was proposed. It was found that there were earlier researches already done that revealed the challenges of the organization such that primary research was required to further find the possible solutions that would solve the problems arising from the current risks that are faced by the organization. The researcher proposes use of secondary data analysis using thematic analyses that would reveal themes that would be used for preparation of an interview guide that would further be used for the primary data collection from 7 security professionals. The primary data is proposed to be analysed using the content analyses. Specific problems that would be explored in the research including data loss and security enhancement.
CGI, 2013. Developing a Framework to Improve Critical Infrastructure Cybersecurity, s.l.: CGI.
DHS, 2009. A Roadmap for Cybersecurity Research, s.l.: DHS.
E&Y, 2013. Bring your own device - Security and risk considerations for your mobile device program, s.l.: E&Y.
HP Enterprise, 2015. Cybersecurity Challenges, Risks, Trends, and Impacts: Survey Findings, s.l.: MIT.
Infrascale, 2014. BYOD Program Best Practices for Data Protection & Security , s.l.: Infrascale.
MYOB, 2016. Company file security. [Online]
Available at: https://help.myob.com/wiki/display/ar/Company+file+security
NIST, 2014. Framework for Improving Critical Infrastructure Cybersecurity, s.l.: National Institute of Standards and Technology.
Raddon, A., 2010. Epistemology & Ontology in Epistemology & Ontology in Social Science Research , s.l.: University of Leicester.
TrustSphere, 2012. Advanced Security Methods for eFraud and Messaging, s.l.: TrustSphere.
Veracode, 2017. APPLICATION SECURITY SOFTWARE. [Online]
Available at: https://www.veracode.com/products
[Accessed 19 May 2017].
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2018). How Do Research Proposal On Cyber Security Challenges. Retrieved from https://myassignmenthelp.com/free-samples/how-do-research-proposal-on-cyber-security-challenges.
"How Do Research Proposal On Cyber Security Challenges." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/how-do-research-proposal-on-cyber-security-challenges.
My Assignment Help (2018) How Do Research Proposal On Cyber Security Challenges [Online]. Available from: https://myassignmenthelp.com/free-samples/how-do-research-proposal-on-cyber-security-challenges
[Accessed 22 January 2021].
My Assignment Help. 'How Do Research Proposal On Cyber Security Challenges' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/how-do-research-proposal-on-cyber-security-challenges> accessed 22 January 2021.
My Assignment Help. How Do Research Proposal On Cyber Security Challenges [Internet]. My Assignment Help. 2018 [cited 22 January 2021]. Available from: https://myassignmenthelp.com/free-samples/how-do-research-proposal-on-cyber-security-challenges.
Those who want to pay for assignment in Canada can avail MyAssignmenthelp.com’s service. This portal has designed high quality college paper writing services to millions of students worldwide. Before paying to write assignment, you can check out samples of previous works on the site. report writing help and cheap assignment help services are exclusively provided here.
Answer: Showing rows 0 - 2 (3 total, Query took 0.0005 seconds.) SELECT * FROM `Performance` Student name Student level Experience Platform Student grade edwards senior ...
Read MoreAnswer: Introduction: Lean project management refers to the requirements that influence the changes in the customer values. The changes in the project management should be brought about as per the requirements of the customers. FIFA (Federation Internationale de Football Association) is an international sports body that organizes world cup every four years. The organisation of the World Cup 2018 in Australia would be an event of national prid...
Read MoreAnswer: Scope Statement Project Owners Client: Sorrento Quay Festivals Association Landscape Company: Sorrento Quay and Boat Harbour Landscaping Mission The mission of this project is to construct a temporary entertainment venue at Sorrento Quay for a rural themed festival that will include a centre stage and seats for 100 people. The entertainment venue should be available for use for 16 days and after the schedule, the venue will be cle...
Read MoreAnswer Introduction The online media tools are having the vital role in the marketing of products and services of the organizations. In the current scenario, social media marketing is having the positive impact on the sales and advertising functions of companies. Social media marketing is helping organizations to increase the customer base and reach in the market. There are various social media tools and techniques that used for promoting the...
Read MoreAnswer Introduction There is basic difference in the managing of the complex projects and the management of the traditional projects. The main attribute of the complex project is the uncertainty about the outcome. The main objective of this paper is to discuss about the various aspects of the management of the complex project with respect to a selected example of the complex project. In this context the vulnerabilities and the flaws of the co...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
it was really good and i will recomend it to my friends. i got above average marks for it
Australia
Dear Sir/Madam, Thank you very much for your expertise and assistance. I was very informative and very helpful. Regards,
Australia
Dear Sir/Madam, Thank you very much for the excellent work! It really helped me a lot. Regards,
Australia
the best team ever and very timely manners with affordable pricing and won’t have any complaints
Australia