The report will discuss in detail about cyber security which becomes a platform for protecting all the important as well as valuable property and information of business in the present world of technology and which is being used as theft as well as misuse. The situation is becoming very critical and a big management issue (Van den Berg et al., 2014). The government of the many developed countries like US recognizes this issue as very serious for the security in national and economic perspective. This includes the perspectives of protecting the networks computers, programs and the data from the attack that has been configured mainly with the in computing contexts and the security standards which include the cybersecurity and the physical security forms as well.
Objective and scope of the project
The issue of cyber security is becoming constantly important challenge for business all across the world and with the high cost on data and many breaches related to it is creating a lot of challenges for many organizations which are not prepared (Nunes Tartari et al., 2016). The main objective of the report is to understand the seriousness as well as also the scope of the report is wide since the issue is worldwide and affects so many sections of society.
There are many big companies these days that have constantly strengthened the issue of cyber based security and varied abilities specifically over last few years. There are presences of formal based processes that have been executed to recognize and also bring priority to security based risks in IT and also grow as well as mitigate strategies and so much money also goes into it and based on exciting different kind of strategies (Norris et al., 2015). At the same time, the recent study also shows that the concept of in-depth interviews as well as solving the issues with right kind of information associated with security leaders with twenty five international companies and the overall outcome is revealed which is growing worries.
Every kind of company is however, fighting its own battle as well as challenges associated with cyber security. With rise in use of technology in every aspect of company, the criminals have a wider range of organizational based issues to exploit. There are so many kinds of personal data which can be easily collected from huge range of sources and which also lead to recognize the concept of theft and other types of cyber crime (Kaplan et al., 2015). Any kind of piece of data collected from a legal business motive can be easily exploited for so many wrong gains. There are clients as well as customers that may not understand the overall details related to it however they trust the organizations for which they conduct business.
How do you address the results which are related to the vulnerability for the higher to the lower risk transformation?
Research design and methodology
- Qualitative research: the concept of qualitative research is based on exploratory kind of research. It is again to understand all the basic reasons as well as views along with motivation behind it. It also gives an insight related to the issues in order to grow right kind of ideas for potential research (Choo et al., 2016).
- Quantitative research: quantitative research is also utilized in order to solve the issues by way of developing so many kinds of numerical based data or the data that can be changed into used statistics. It is also utilized to quantify the behavior, views, and other elements and general outcome from a large sample.
In this case, so many quantitative sources will be included in the study to understand the issues. Consumers will also be contacted for collecting the qualitative data to understand people perspective. This further will be executed to make sure that the opinions of people in cyber crime were covered completely in all aspect (Kshetri, 2015). Moreover, there are many small companies as well which are getting impacted for the same issue who will be interviewed to understand the reaction and opinions related to serious problem.
The study will have a simple as well as random sampling method that will be utilized to conduct interview which is based on respondents as well as they also answer the research based questions as well as test the hypothesis. Also a pilot study will be carried just before conducting the main research to decide the impact of data collection and related tools just before the main survey (Donaldson et al., 2015).
The elements or variable in the present research can be based on many dependent as well as independent points. The dependent on one hand will be based on age, gender of the respondents. Independent variable will include the basic attitude of the business whether people can utilize the basic standard of such issues or level of impact of cyber crime on business and many more (Klavans, 2015).
After finalizing the sample for the study, different forms of informed permission will be provided to the participant through electronic medium or by physical delivery. The main motive of the study will also be explained to the participants. It is important to keep the information provided by them confidential and only based on the opinion of other clients to make a common conclusion (Šendelj et al., 2014).
The outcome achieved from the survey will be recorded at one place on an excel sheet. Then it will be edited properly and the data will then be properly exported into a version related to data analysis system. Data presented will also use the descriptive status like means as well as mode based percentage method. The overall summaries will be presented in visual manner (Šendelj et al., 2014).
Following are some of the outcomes:
- Value constantly migrates on internet and digital data is more pervasive by nature. The results prove that the big companies or organizations create so many kind of incentive for cyber crime and associated criminals.
- Corporation is also expected to be more frank than before. People working in company are asking for an access to networks in company through similar devices that they use for personal use (Thuraisingham et al., 2016).
- The concept of supply chain are become connected with people and organizations. In order to bring more strength to customers and also been able to optimize the present supply chain, organizations are motivating many vendors and consumers are also joining the present network.
- The factors which were malevolent before are now becoming more sophisticated by nature. There are so many professional criminal in this field which are based on groups and are becoming more advanced with passing time. in fact in certain cases, the concept of outpacing of the present skills as well as resources of corporate based security teams are connected with it (Thuraisingham et al., 2016).
There will be the usage of mixed techniques in this research which is related with number of threats to the validity as well as reliability of outcome achieved. In case of primary research, a test on the concept will be perfumed to understand whether the same outcome can be reproduced or not (Johnson, 2015).
Some of the limitations of the methodology used in this research will be long time restrictions and overall efforts are required for the same. In addition, the research all needs more resources to collect a lot of information to reply the research questions. There are many sources of data that can also be used to become more confident with the finding of the research and most importantly some data obtained might not be very collaborative by nature (Johnson, 2015). This is why; there can be a case of discrepancy in outcomes.
Choo, K.K.R., Abawajy, J. and Islam, R., 2016. Special issue on cybersecurity in the critical infrastructure: Advances and future directions.
Donaldson, S.E., Siegel, S.G., Williams, C.K. and Aslam, A., 2015. Measuring a Cybersecurity Program. In Enterprise Cybersecurity (pp. 213-229). Apress.
Johnson, T.A. ed., 2015. Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare. CRC Press.
Kaplan, J.M., Bailey, T., O'Halloran, D., Marcus, A. and Rezek, C., 2015. Beyond Cybersecurity: Protecting Your Digital Business. John Wiley & Sons.
Klavans, J.L., 2015. Cybersecurity-What's Language got to do with it?.
Kshetri, N., 2015. Recent US Cybersecurity Policy Initiatives: Challenges and Implications. Computer, 48(7), pp.64-69.
Norris, D., Joshi, A. and Finin, T., 2015, June. Cybersecurity challenges to american state and local governments. In 15th European Conference on eGovernment (pp. 196-202). Academic Conferences and Publishing Int. Ltd..
Nunes Tartari, E., Ricca, F. and Taylor, A., 2016. Challenges in Cybersecurity: a comparative analysis of disparate US and Russian positions in the international arena (Doctoral dissertation).
Šendelj, R., Lombardi, F., Ognjanovi?, I. and Guarino, S., 2014. Cyber Security in Montenegro: Practice, Framework and Challenges.
Thuraisingham, B., Kantarcioglu, M., Hamlen, K., Khan, L., Finin, T., Joshi, A., Oates, T. and Bertino, E., 2016, July. A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. In Information Reuse and Integration (IRI), 2016 IEEE 17th International Conference on (pp. 1-10). IEEE.
Van den Berg, J., van Zoggel, J., Snels, M., van Leeuwen, M., Boeke, S., van de Koppen, L., van der Lubbe, J., van den Berg, B. and de Bos, T., 2014. On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. In Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium (pp. 13-14).