country
$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Risk Of Cyber Security In The Business

tag 0 Download12 Pages / 2,977 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT

Question:

Discuss about the Challenges in Cyber Security for Business.
 
 

Answer:

Introduction

The literature review is the section which provides the secondary data details on the topic of research. The topic of research is ‘Challenges in Cyber Security for Business’ for which different sources have been used to gain information and data. By Cyber Security we mean the protection of the valuable information and intellectual property of business which is in digital form from theft and misuse. Cyber security is an issue which is increasing in the today’s global businesses. As per the US Government, Cyber security is one of the most critical ad serious issues which the businesses are facing these days. This challenge is faced by almost every country these days as the technology is growing and evolving. The coming age of Big Data, Internet of things and automation, the risk of Cyber security is increasing (Pandey, et al., 2016).

Project Objective

The main objective of the project is to identify the causes and factors which lead to the risk of Cyber security in the businesses. One more objective is to find out what cyber security challenges are present in the businesses.

Project Scope

The scope of the project is wide. It is because the topic of the research is one of the most critical issues the businesses are facing these days and there is lot to discuss on the topic. The literature review will include various real life examples to set up a clear understanding on the topic.  The various forms of challenges and the causes of the same will be discussed by going through various journals, articles and web sources

Literature Review

AS the globalisation is evolving, majority of risks to business are seen due to technology. Cyber security has become a major challenge for the businesses and is growing at an alarming rate.  There are different types of cyber threats like malicious attacks, attacks on networks and network abuse (Choo, 2011).

 


Cyber security can be termed as the techniques used for the protection of businesses and computer systems from the unauthorised access and other cyber threats.  As the cyber threats are increasing, the companies should adopt the approaches which help them in fighting with the complexity of the threats. Cyber security is a big issue because it has dramatically strengthened itself in past few years (Hutchings, 2012). According to Kaplan, Sharma & Weinberg (2011) 46 per cent of the population of world is connected to internet which increases the chances of threats and cybercrime. Cyber security is a bigger issue now and it has been proved by conducting research on 25 global companies and the results shows so. The research found four common trends which includes that the digital data has become more widespread.  It is also found that the corporations are now more open as compared to before. It also shows that the supply chains now are interconnected and that is how the attacks on technology are increasing.

While technology is helping businesses to bring innovations in business, it is also creating so many threats for the businesses. The cyber security in business faces many risks in present business environment which are explained below:

Ransomware

It is the latest risk which prevents the users from accessing the significant information on their systems until they make a payment to the cyber criminals. The criminals tried to make more money once they were able to attack a user.

The Internet of Things (IOT)

The cyber criminals could make an access to the sensitive information contained by the user in their systems and this is a major privacy threat to the users. As per McAfee Labs 2017 Threats Predictions, around 1.78 million of devices will be in the hands of consumers and it will give more chances to hacking (Barclay Simpson, 2017).

Social Engineering

Social engineering involves manipulating the individuals to reveal their significant data and the information through the techniques of phishing. As per the data in recent year, these incidents have increased by 65% in 2016 as compared to 2015.

Mobile Malware

As the mobile usage is increasing day by day for the business tasks, there is more opportunity given to the cyber criminals to identify the weaknesses in the technology. As per the Kaspersky Lab, the attacks of mobile malware have tripled between the years 2015 and 2016.

Fake Advertisements and Feedbacks

The consumers nowadays are getting lots of advertisements at online platforms in which most of them are fake. These are phishing activities which affect the businesses and the consumer security measures (Barclay Simpson, 2017).

In the opinion of Elmaghraby and Losavio (2014), many challenges are emerging due to the excessive use of technology. There are many instruments which are used in the businesses nowadays for making their operations easier but in return they face concerns such as privacy and this may affect their routine operations. Similar to this Tiwari, Bhalla & Rawat (2016) suggests that Cybercrime has become inescapable because the sharing of networks and information has become so common in businesses. Cyber security is a mechanism which protect the computer systems and equipment’s from the unauthorised access. This will have positive impact on society and businesses. The typical cyber threats by which the business should be aware of includes Botnets, Malwares, Hacking, Phishing, Spam, Virus, Worms, etc. The author adds that Cybercrime have severe disruption in the businesses. It is a crime against business (Nojeim, 2010).

 


Cyber security is when the properties or information of businesses are protected from the thefts and risks. Cyber security also provides some of the prevention tips to save itself from cybercrime. The users are advised to keep the defence systems up to date and to make sure that the systems are safe and secure. The users are advised to choose strong passwords and have security checks at regular intervals. The unfamiliar mails should not be touched and safe browsing should be encouraged. It can be said that in the modern era where technology plays a main role, cybersecurity is encouraged to have security from the cybercrime. Security has become a major concern and it should be taken as an integral part of the industry (Basamh, Qudaih and Ibrahim, 2014).

In the opinion of Deore & Waghmare (2016), Security of cyber information has become one of the greatest challenges across the world. Internet nowadays is used in almost each and every industry like ecommerce, communications, finance, banking and many more and this increases the chances of cyber-attacks for stealing the important data and information. Cyber security plays an important role in the ongoing development of IT.

The cyber security faces number of challenges in fighting with the cybercrime. One of the main challenges is heavy dependency on Internet and Communications technology (ICT). ICT is nowadays used in businesses on a large scale and is a part of everyday life. This gives more chances to the attacks on the networks and infrastructures. The second challenge can be the increase in the number of users (Abomhara, 2015). As the popularity of internet is growing, the users are increasing cross the world and the number of targets for the attackers is also increasing.  The third challenge is availability of devices and access to those devices. If an offense is to be committed it needs devices for the purpose. Software tools are available easily which contributes in promoting the cybercrime. This encourages the criminals to commit such crimes. The next challenge can be the availability of information.  There is millions of webpages on the internet and it contains updated information. So the offender targets the ones which have weak password protection systems and access the information. That information might be used for the wrong purposes which could cause serious security issues to the business.  Another challenge is lack of mechanisms of control. In every communication network, there is a need of central administration to ensure the operability. There is a need of laws, governance and standards which can have certain degree of control on the networks.  The international dimensions of the business also create a challenge for the security of information and networks. This affects the cyber security in different nations (Wright, Dawson and Omar, 2012).

Automation is a challenge for the cyber security of business.  ICT has the ability to automate the processes and it also has many consequences.  Automation can provide opportunity to the offenders to send spams in bulk and attack thousands of the systems in hours.  Spams may be a serious issue in the developing countries and many victims can be created.  Availability of resources and speed of data and exchange. The speed of data exchange has led to the fastest exchange of cybercrime. It takes few seconds for the criminals to exchange emails and viruses.  Another challenge is anonymous communication where the origin of communication is not known. Because of this, the identity of the offenders is difficult to make. Like they can use fake email id’s and offend the privacy of the secure information (Clemente, 2013).

 


As per Babate, et al. (2015), the lack of leadership is also considered as one of the major challenges of cyber security. Security is maintained when there is a trust maintained between technology and people using it. So, leadership is needed to handle the challenges and issues occurring because of technology and people. Collaboration needs to be maintained which helps in meeting challenges of cyber security.  People are needed to be educated so that the security can be maintained by the cyber security cells. It is seen that the people are not getting enrolled in the courses of cyber security which is creating more challenges. When people will be educated in this course, they will be able to handle the issues of the industry of Australia.

The cyber-attacks have been increased in the last few years and for that a framework needs to be created. This framework should include the roadmap which could bee adopted to fight the challenge of fighting the cybercrime. There are some of the long term challenges which affect the cyber security efforts taken by the industry (Fischer, 2016). These challenges include the lack of proper designs of security systems, the lack of incentives which are given to the cyber criminals. That is why; they look out for an easier option and go for cybercrime. Also the lack of consensus from all the stakeholders creates problems for the cyber security cells (Gharibi and Shaabi, 2012).

Government has taken various steps to meet the challenges of cybercrime. These include the monitoring systems and security of network. The government have taken steps like drafting the cyber security law for facing the risks of cybercrime. The plans are made to design the approaches to meet these risks. Different countries take different steps to meet the challenges like China has made cyber security laws while US, reforms are developed to improve cyber security. In the corporate world, the condition of cybercrime is getting worse year by year but the steps are planned to be taken to get over this. US have increased their budget of cyber security by 35% which shows that the problem is increasing and will continue in the coming years (James, 2016).  As per James (2016), the businesses, government and individuals should double their protection of cybercrime. The average cost of a cybercrime attack is approx. $276000. In USA, it costs approx. $100 billion per year. People lack in knowledge about cyber security which increases the risks gradually. There are 1404 cyber security vendors in the world and Australia have only 15 out of them whereas the other countries like UK, USA, India, Israel have 76, 827, 41 and 228 cyber security vendors respectively. As per the data given by McAfee 2016 Threat Predictions, in the next five years the volume and type of personal information which is tracked and stored will change. The autonomous systems are the next technology which integrates with operating technology and blend together to solve the issues of cyber security.

 


According to Foreshew (2017), the businesses of Australia are facing the cyber security crisis as there is not enough staff with expertise to face the threats. So, the demand for the cyber security specialists is at peak. This is a real challenge to meet this demand.  There is also problem of funding. Where on one other the other countries like USA is spending more than US$200 million on R&D investment for cyber security, Australia is lacking in this area. It is currently spending less than $100 million for the same. For cyber security research, the nation could spend and invest more. There is also weak collaboration between the research and industry.  Only 3% of the businesses collaborate with the universities and with other research institutes. The situation in the Australian Cyber security industry is Ambiguous. The industry of cyber security is getting funds from the corporations like Common wealth Bank of Australia, Telstra, Optus and more. The government also invests in developing the Australian Cyber Security Research Institute (ACSRI) which provides R&D facilities across Australia. There are some universities as well which in collaboration with companies and government helps in developing the cyber security industry of the country (Foreshew, 2017).

In Australia, Cyber security is important to be taken seriously as the use of information systems, networks and Internet is more and government should come up with better control systems to meet these challenges. In this, every stakeholder has to play their roles. These include the companies, government and individuals. The individuals should handle the data well at the workplace while the companies should take effective measures for the security of data. They should provide trainings to their workers to handle data well. The government should make regulations and laws which can be proved effective in managing the security of the business (Foreshew, 2017).

Conclusion

It can be concluded that many techniques and software’s have been developed for handling the cybercrime. For the privacy of data and information of the businesses, cyber security measures have been adopted and the challenges to these measures have been discussed in the literature which is collected through various sources. The literature explains different types of challenges and what all steps different countries are taking to meet these challenges. It is concluded that Energy, Banking and Communications were the top three targets of cyber criminals. But there are opportunities in the coming year as the awareness has been increased for cybercrime. The industry is employing more people for meet the challenges and resolve the issues. It can also be concluded that there are some pillars of cyber security which can resolve the issues of the same. It includes Education and awareness about the matter, planning and preparation about the same in advance, sharing and collaboration to meet the current and future risks and Ethics & Collaboration to have professional field of expert.

Cyber security is important to the economic future of the country and for the society as well. As thee economy and society will get developed, the cyber security will become more significant to be developed. Good cyber policy is required for the cooperation and creativity in the industry.

 

References

Abomhara, M & Koien, G M 2015, ‘Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks’, Department of Information and Communication Technology.

Abomhara, M 2015, ‘Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks’, Journal of Cyber Security and Mobility, 4(1), pp.65-88.

Australian Cyber Security Growth Network, 2017, ‘Cyber Security Sector Competitiveness Plan’. Retrieved from https://www.acsgn.com/wp-content/uploads/2017/04/Cyber-Security-SCP-April2017.pdf.

Babate, A I, Musa, M A, Kida, A M & Saidu, M K 2015, ‘State of Cyber Security: Emerging Threats Landscape’, International Journal of Advanced Research in Computer Science & Technology, Vol. 3, Issue 1.

Barclay Simpson, 2017, ‘The top 10 cyber security challenges for businesses’, Retrieved from https://www.barclaysimpson.com/news/the-top-10-cyber-security-challenges-for-businesses-news-801833525.

Basamh, S S, Qudaih, H A and Ibrahim, J 2014, ‘An overview on cyber security awareness in Muslim countries’, International Journal of Information and Communication Technology Research, 4(1), pp.21-24.

Choo, K K R 2011, ‘The cyber threat landscape: Challenges and future research directions’, Computers & Security, 30(8), pp.719-731.

Clemente, D., 2013, Cyber security and global interdependence: what is critical?. Chatham House, Royal Institute of International Affairs.

Deore, U D & Waghmare, V 2016, ‘A Literature Review on Cyber Security Automation for Controlling Distributed Data’, International Journal of Innovative Research in Computer and Communication Engineering, Vol. 4, Issue 2.

Elmaghraby, A S and Losavio, M M 2014, ‘Cyber security challenges in Smart Cities: Safety, security and privacy’, Journal of advanced research, 5(4), pp.491-497.

Fischer, E A 2016, ‘Cybersecurity Issues and Challenges: In Brief’, Congressional Research Service.

Foreshew, J 2017, ‘Australia faces cyber security skills crisis as challenge’, Financial Review.

Gharibi, W and Shaabi, M 2012, ‘Cyber threats in social networking websites’, arXiv preprint arXiv:1202.2420.

Hutchings, A 2012, ‘Computer security threats faced by small businesses in Australia’, Trends and Issues in Crime and Criminal Justice, (433), p.1.

James, C 2016, ‘Cybersecurity: Threats Challenges Opportunities’, ACS.

Kaplan, J, Sharma, S & Weinberg, A 2011, ‘Meeting the cybersecurity challenge’, McKinsey & Company.

Nojeim, G T 2010, ‘Cybersecurity and Freedom on the Internet’, J. Nat'l Sec. L. & Pol'y, 4, p.119.

Pandey, S, Shah, N, Sharma, A and Farik, M 2016, ‘Cybersecurity Situation In Fiji’, International Journal of Scientific & Technology Research, 5(7), pp.215-219.

Tiwari, S, Bhalla, A & Rawat, R 2016, ‘Cyber Crime and Security’, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 4.

Wright, J, Dawson, M E and Omar, M 2012, ‘Cyber security and mobile threats: The need for antivirus applications for smart phones’, Journal of Information Systems Technology and Planning, 5(14), pp.40-60.

Download Sample

Get 100% money back after download, simply upload your unique content* of similar no. of pages or more. We verify your content and once successfully verified 100% value credited to your wallet within 7 days.

Upload Unique Document

Document Under Evaluation

Get Credits into Your Wallet

*The content must not be available online or in our existing Database to qualify as unique.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Risk Of Cyber Security In The Business. Retrieved from https://myassignmenthelp.com/free-samples/risk-of-cyber-security-in-the-business.

"Risk Of Cyber Security In The Business." My Assignment Help, 2018, https://myassignmenthelp.com/free-samples/risk-of-cyber-security-in-the-business.

My Assignment Help (2018) Risk Of Cyber Security In The Business [Online]. Available from: https://myassignmenthelp.com/free-samples/risk-of-cyber-security-in-the-business
[Accessed 06 July 2020].

My Assignment Help. 'Risk Of Cyber Security In The Business' (My Assignment Help, 2018) <https://myassignmenthelp.com/free-samples/risk-of-cyber-security-in-the-business> accessed 06 July 2020.

My Assignment Help. Risk Of Cyber Security In The Business [Internet]. My Assignment Help. 2018 [cited 06 July 2020]. Available from: https://myassignmenthelp.com/free-samples/risk-of-cyber-security-in-the-business.


MyAssignmenthelp.com has assembled a team of extraordinarily talented and knowledgeable PhD qualified online dissertation experts to provide students required dissertation writing help in Canberra, Adelaide, Perth, Melbourne, Sydney and other parts of Australia. Students can buy dissertation online from us with three simple steps. Auditing dissertation help, history dissertation help, geography dissertation help, maths dissertation help are few popular services under our dissertation writing assistance.

Latest Management Samples

HI6026 Audit, Assurance And Compliance For Sustainable Sales In Food

Download : 0 | Pages : 12

Answer: Introduction “Woolworths Group” is recognized as one of the leading Australian data manufacturer with its operations in both New Zealand and Australia. The company is known for being the second largest in terms of its revenue ranking next to “Perth-based retail-focused conglomerate Wesfarmers”. The group is further identified for being the largest retail player in terms of “liquor retailer, hotel and gaming...

Read More arrow

7808ICT Information Security Management For Human Readable Security Features

Download : 0 | Pages : 8
  • Course Code: 7808ICT
  • University: Griffith University
  • Country: Australia

Answer: Introduction Smart card are termed as smart as they are integrated with a computer chip. Smart cards are devices that helps in identification of user and provide cost efficiency features [1]. Smart cards are used in various fields including health services, banking, telephone, employee ID, transport and physical access control. The security of users affect the trust of the user with the company or any other business organization.  ...

Read More arrow

PACC6008 Business Decision Making For Statistics And Graphical Representation

Download : 0 | Pages : 5
  • Course Code: PACC6008
  • University: Newcastle University
  • Country: United Kingdom

Answer: Question 1 The institute is interested in wages of US workers in 2018. Descriptive statistics and graphical representation of the variable Wages and Education is highlighted below (Foster, 2013). Numerical summary  Graphical representation  Comment Wage Level It is evident from the above computation that the mean hourly wage level is $25.62. Also, the shape of the graph would be asymmetric considering that high positive ...

Read More arrow Tags: Australia Sydney Management Master of Health Administration  University of Sydney 

MGT2HRM Human Resource Management For The Poor Safety Environment

Download : 0 | Pages : 10
  • Course Code: MGT2HRM
  • University: La Trobe University
  • Country: Australia

Answer: Introduction Antonsen (2017) stated that employees are the most valuable asset of an organization as they works for accomplishing the organizational goals. The staffs work hard for developing the products, representing the brand and fuel the success. Thomas and Galla (2013) furthermore highlighted that poor safety environment at the workplace resulted in high absenteeism, serious injuries and employee turnover rates. This report thus ...

Read More arrow Tags: Australia Melbourne Management Business Law University of Melbourne 

HRM 702 Employment Law System

Download : 0 | Pages : 10

Answer: Introduction Affirmative action is referred to the procedures undertaken with the aim of protecting the minority communities—especially the people of color, women, transgender, aboriginals and many more. The dawn of Affirmative Action in US was seen in the 1960s with the main motive to fight discrimination based on race and skin color, as well as discrimination based on sex and gender (Ma & Schapira, 2017). History of intole...

Read More arrow
Next
watch

Save Time & improve Grade

Just share Requriment and get customize Solution.

question
We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits

1,356,327

Orders

4.9/5

Overall Rating

5,080

Experts

Our Amazing Features

delivery

On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.

work

Plagiarism Free Work

Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.

time

24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.

subject

Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.

price

Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1592 Order Completed

96% Response Time

Jane Sima

Ph.D in Psychology with Specialization in Industrial-Organizational Psychology

Singapore, Singapore

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

184 Order Completed

96% Response Time

Arapera Billing

Masters in Management, MMgt

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2115 Order Completed

97% Response Time

Kimberley Chen

MPA in Accounting

Singapore, Singapore

Hire Me

FREE Tools

plagiarism

Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.

essay

Essay Typer

Get different kinds of essays typed in minutes with clicks.

edit

GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.

referencing

Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.

calculator

Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability

1

1

1

Your Approx Earning

Live Review

Our Mission Client Satisfaction

You have demonstrated a good understanding about the technical requirements of IoT. It would have been useful to have specific examples of IoT in use, for example in industrial settings such as a warehouse for supply chain operations or in hospitals ...

flag

User Id: 259199 - 05 Jul 2020

Australia

student rating student rating student rating student rating student rating

According to what with the request. Great work has been done. I will definitely ask again. Thank you very much.

flag

User Id: 409054 - 05 Jul 2020

Australia

student rating student rating student rating student rating student rating

The first assignment I received did not answer any questions and looked like someone who did not speak English had written it. I was so appalled , I have never felt more ripped off in my life. I ended up having to quickly do the assignment myself wit...

flag

User Id: 427879 - 05 Jul 2020

Australia

student rating student rating student rating student rating student rating

Under limited time, my research proposal was reasonably well writings. I really appreciate;)

flag

User Id: 436898 - 05 Jul 2020

Australia

student rating student rating student rating student rating student rating
callback request mobile
Have any Query?