$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Smart Cyber Security Survey And Challenges

tag 0 Download9 Pages / 2,001 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


What Is The Effect Of Cyber Security Challenges On Business?

What Are The Sources Of Cyber Security Threats?

What Requirements And Elements Should Be Observed By The Business And Government To Prevent From The Cyber Crime?




Cyber security is essential for business because the range of crime has been increased. It becomes as known issue in now a days in the business. Technology has become advanced and the issue of cyber security is faced by almost every country. It is the research proposal which will focus on research design and methodology. Literature review in this research proposal will describe the scope of cyber security along with the challenged of cyber security in the business. The risk of cyber security attack depends on three factors such as threats, vulnerabilities and impacts. Good cyber security is essential for the management because it able to prevent undesired surveillance of and collecting of intelligence from an information system.

Project objective

The aim of this research is to recognize the challenges of cyber security in the business. There are many companies that faced issue regarding cyber security. The main objective of this research to find out the issues related to cyber security


Project scope

Cyber security is wider and it is required for the business to safe and protects the relevant information regarding employees and clients. Thus, the scope of this project is huge; the topic of this research proposal is one of the challenging issues in today’s world. Literature review will reflect the various aspects of cyber security which is necessary for protecting the data. Primary and secondary issues will be used to accomplish the research.

Literature review

Social networking platforms have changed the way of people and it become easy for the people to interact each other in an efficient manner. It is not made for initiating the connections, but has handled to sustain the progressing interconnected by engaging people in various interest of their choice. Facebook has mort ha 1 billion users and more than 1 billion tweet made every week. It has been evaluated that The Arab Spring, Occupy Wall Street and Jasmine Revolution have epitomized that the growing community of thousands of people can mobilized for a reason by social media.  On the contrary, London riots were supposedly fuelled due to social media (Wells, Camelio, Williams and White, 2014).

Cyber security is a complex issue and cyber attackers can derange infrastructures such as control over the financial and air traffic and create influence with matching the terrorist attack in the physical space. Cyber attackers are able to steal the information of corporate such as personal information of the employee and the clients of the company, intellectual property and financial activity records (Taylor, Fritsch and Liederbach, 2014). Cyber attacks have become more economical. Cyber security challenges has become more complex issue that cuts across various domains and demands for multi layer initiatives. It has been evaluated that damage by cyber attackers to the corporate world cannot be recognized instantly and even in some case, may even move unobserved. In case cyber attack is progressively defended, it would be able to cover the tracks and ascription of a cyber attack would become very difficult to recognize in some scenarios.  It has been analyzed by researching on topic that there are no international and government laws to get help in tracing cyber attacks. It makes more difficulty for the business to fight against the cyber warfare (Reddy  and Reddy, 2014). It is the responsibility of the business to make policies and procedures and establish the IT team so that possible prevention can be done in the business regarding cyber crime.

It has been found that cyber crime is most challenging issue in preset world and it is proved by research which has been conducted on 25 global companies. It was the research that found that the digital data has become mpre wider. Technology has become advanced in the world but the innovation in technology brings so many threats for the business. There are various cyber security risks such as Ransomware, the internet of things (IOT), Malware, social engineering and fake advertisements and feedbacks. Ransomware is considered as the latest risk which is able to access the financial information of the user and make the payment to the cyber criminals. The IOT is able to access the sensitive information of the user in their system. Social engineering includes maneuvering the person to disclose their relevant data along with information by using the technique of phishing (Wang and Lu, 2013). By publishing the fake advertisement the internet, enhance the cyber crime in the business.

Cyber attack has faced by many companies in all over the world, however, the possible step against the protection of these cyber attacks, government has taken various step to meet the issue of cyber crime. It involves the evaluating the system and security of network. Different countries have been taken initiated step to prevent the cyber security challenges in the organization such as China and US have made a cyber security laws (Von and Van, 2013). It has been researched that Australia is facing the issue of cyber security as it has not efficient knowledgeable staff of cyber security. That is why the demand of cyber security in the Australia is at peak.

It is essential for the protection from cyber attack to establish National Structure for Cyber Security. It would have been involved various roles and responsibilities for stakeholders and focus on creating public private partnership model (Klahr, Shah, Sheriffs, Rossington, Pestell, Button and Wang, 2017). It should be able to enhance the trust between the companies and government. To prepare procedure of cyber security management has been established and the head of cyber security should be appointed with various responsibilities. Along with that Cyber Command is required for preventing forces to protect the Indian Cyberspace. The Cyber Command should be authorized with defensive and offensive cyber weapons (Elmaghraby and Losavio, 2014).



  • Cyber security is able to prevent from various cyber attacks and enhance the safety while working.
  • Lack of cyber security may lead the business in adverse situation and the personal and official data can be corrupted by cyber criminals.

Research design and methodology

A research methodology contains numerous methods and techniques to research and accumulate certain requirements and information from resources and journals. There are several methods being considered to research on the topic.

Research methods

There is various methods has been taken to execute the research but the main focus has been kept on quantitative and qualitative research. Quantitative research is able to give quantitative data and able to gather the information and data regarding cyber security challenges. Qualitative data has been taken to collect the quality data from secondary sources for the selected topic.

Research approaches

There are two approaches have been considered that is quantitative and qualitative approaches. Qualitative approaches are being used in then research to evaluate the reasons, views and opinion related to selected topic. Primary and secondary sources helped to analyze the data effectively by analyzing the collected data from articles, journals, websites and research task (Abawajy, 2014).

Data collection

Enthusiasm has been reflected while researching on the selected topic so that research program could be initiated in efficient manner. The aim behind conducting the research is to make aware business about the challenges of cyber crime. Primary and secondary information has been utilized to collect the information.  The information from primary sources have been collected from direct respondents while secondary information has been collected from the used data such as journal, articles, websites and research sources (Reddy and Reddy, 2014).

Sample and techniques

Random sampling technique has been chosen due to huge amount of gathered data and information regarding selected topic. It is effective technique which provides opportunity to information to select.


Research strategy

It is important to accomplish the research within timeframe so that the possible results of research can be come in efficient manner. An action plan has been made to analyze the various activities of research with timing.

It is important to focus on target market and to gather the relevant information; primary and secondary sources are being opted to set the target market. Primary resources such as questionnaire and interview criteria has been used to gather the data while articles, journals and other used data has been utilized in the context of secondary resources.

Selection and ethical consideration

The procedure of selection has been accomplished after analyzing the requirement of the research. Ethics consideration defines that what is correct and incorrect while researching. Data has been collected with fair manner

Limitation of the research

There are several issues has been found while executing the research which influence the research in the form of limitations. These limitations are mentioned below:

  • The required time is not enough for this research and for better evaluating random sampling technique has been used.
  • The selected topic needs depth research and due to lack of access data related to topic could not be observed.
  • The reason of limitation is lack of data but the qualitative approach has been used to cover the information

Time schedule

Serial no.


Initiating date


Completed date



Selection of topic

10 September, 2017


11 September, 2017

Selection regarding topic has been made.


creation of plan

12 September, 2017


14 September, 2017

Plans will be prepared


Implementation of the plan

15 September, 2017


19 September, 2017

Data will be selected for the research topic


Data collection

20 September, 2017


24 September, 2017

Selected data will be opted for the execution of the research


Analyze the data

25 September, 2017


30 September, 2017

Technique will be used to analyze the data


Conclusion and recommendations

1 October, 2017


4 October, 2017

Data and information will be concluded by evaluating the data.



It has been concluded that various organization in all over the world are facing issues of cyber security challenges and the range of cyber attacks has been increased in the form of various attacking approaches such as malware, Ransomware, social engineering, hacking the data sand many more. This research has been made for making aware about the challenges of cyber security and raises the voice against the prevention. The focus of the research is on a collection of quality data for growing the constancy and authenticity of the research program.



Abawajy, J., 2014, User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33(3), pp.237-248.

Elmaghraby, A.S. and Losavio, M.M., 2014, Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), pp.491-497.

Hahn, A., Ashok, A., Sridhar, S. and Govindarasu, M., 2013, Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Transactions on Smart Grid, 4(2), pp.847-855.

Klahr, R., Shah, J., Sheriffs, P., Rossington, T., Pestell, G., Button, M. and Wang, V., 2017, Cyber security breaches survey 2017: main report.

Reddy, G.N. and Reddy, G.J., 2014, A Study of Cyber Security Challenges and its emerging trends on latest technologies. arXiv preprint arXiv:1402.1842.

Streeter, D.C., 2013, The effect of human error on modern security breaches. Strategic Informer: Student Publication of the Strategic Intelligence Society, 1(3), p.2.

Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014, Digital crime and digital terrorism. Prentice Hall Press.

Van den Berg, J., Van Zoggel, J., Snels, M., Van Leeuwen, M., Boeke, S., van de Koppen, L., Van der Lubbe, J., Van den Berg, B. and De Bos, T., 2014, On (the Emergence of) Cyber Security Science and its Challenges for Cyber Security Education. In Proceedings of the NATO IST-122 Cyber Security Science and Engineering Symposium (pp. 13-14).

Von Solms, R. and Van Niekerk, J., 2013, From information security to cyber security. computers & security, 38, pp.97-102.

Wang, W. and Lu, Z., 2013, Cyber security in the Smart Grid: Survey and challenges. Computer Networks, 57(5), pp.1344-1371.

Wells, L.J., Camelio, J.A., Williams, C.B. and White, J., 2014, Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, 2(2), pp.74-77.

Zahavi, G. 2015, Cyber threat insider, retrived on 22nd September, 2017, from:

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Smart Cyber Security Survey And Challenges. Retrieved from

"Smart Cyber Security Survey And Challenges." My Assignment Help, 2018,

My Assignment Help (2018) Smart Cyber Security Survey And Challenges [Online]. Available from:
[Accessed 03 June 2020].

My Assignment Help. 'Smart Cyber Security Survey And Challenges' (My Assignment Help, 2018) <> accessed 03 June 2020.

My Assignment Help. Smart Cyber Security Survey And Challenges [Internet]. My Assignment Help. 2018 [cited 03 June 2020]. Available from:

With time, has become one of the best college essay writing services. Our all rounded services give students the confidence to overcome assignment related issues. Our services are fast enough to meet most urgent deadlines. We are capable of delivering fast essay writing services with the help of our specially designed provisions and writers' teams. Our urgent essay help services guarantee most rapid delivery of assignment solutions. Some of our most popular essay services are application essay help, exploratory essay help, literary review essay help and argumentative essay help.

Latest Management Samples

MKT220 Business Research Methodology For Educational Recordings

Download : 0 | Pages : 5
  • Course Code: MKT220
  • University: Charles Sturt University
  • Country: Australia

Answer: 1. Interviewee: “The use of smart speakers is highly favourable in my house and each and every member in the house uses it for various reasons [8 second pause]. There is no particular purpose for using the voice-activated speaker in my voice, as we use it as per our requirement [6 second pause]. For instance, I use the voice-activated speaker for listening to music, as listening to music after hectic days calms me down. Oh, Yes! ...

Read More arrow

LD0474 Strategic Management For Competitive Advantage

Download : 0 | Pages : 9

Answer: Introduction  The main purpose of this assignment is to analyze the policies of Corporate Social Responsibility of a company. Corporate Social Responsibility (CSR) can be defined as the various policies which are followed by the business in order to ensure that the activities of the business do not affect the environment or the social well-being of the society (Schwartz, 2017). In other words, CSR policies requires the compa...

Read More arrow

7HURM010W Readiness For Change And Building Change Ready Organisations

Download : 0 | Pages : 13
  • Course Code: 7HURM010W
  • University: Victoria University
  • Country: Australia

Answer: Introduction Change is inevitable in today’s business environment. Changes in an organization take place whenever a company tries to reach its desired state somewhere in the future and to achieve it, goes through considerable transitions (Hayes 2014). These changes can be organized and managed by the simple processes of planning and bringing about the changes in the organization such that the employee resistance could be minimiz...

Read More arrow

MWL101 Professional Insight Application

Download : 0 | Pages : 10

Answer: Introduction As the number of young professionals increases each year, the pressure increases towards securing stable employment and maintaining existing jobs. The over-saturation of young professionals in markets delivers major benefits to the corporate world but only increases the pressure and burden on the working professional (Twillie, 2014). This makes it important for young professionals to change their vision towards their...

Read More arrow

COIT20251 Knowledge Audits For Business Analysis For Eni Company

Download : 0 | Pages : 11
  • Course Code: COIT20251
  • University: Central Queensland University
  • Country: Australia

Answer: Introduction Eni Company is considered to be the sixth largest energy company in the universe. Presently it is actively operating in over 90 countries with approximately 7800 employees. The major objective of this report is to come up with an innovative proposal which can facilitate the development of a project like the Eni Company. In the recent past, Eni Energy Company has witnessed the evolution of corporate reporting as a result of...

Read More arrow Tags: Australia Bankstown Management University of New South Wales 

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1692 Order Completed

98% Response Time

Alfred Dodd

PhD in Computer and Information Science with specialization in Database

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

2632 Order Completed

100% Response Time

Albert Ambrosio

MSc in Nursing

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

265 Order Completed

97% Response Time

Ken Campbell

MSc in Electrical Engineering

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

1896 Order Completed

95% Response Time

Herman Berens

MSc in Psychology

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

Receive good grades for the said subject even receive my work in the quickest possible time, although there were spelling mistakes, it was overall a good work.


User Id: 421441 - 03 Jun 2020


student rating student rating student rating student rating student rating

Work well done. I am very happy with the information received and the level of service is top class.


User Id: 385702 - 03 Jun 2020


student rating student rating student rating student rating student rating

Great work is done by experts. All the requirements are done whatever, I asked for> I again appreciate the whole team. I would rate 5 stars to them. thanks


User Id: 279240 - 03 Jun 2020


student rating student rating student rating student rating student rating

It was good, but could be better if the pictures weren't used for case studies. Also the plaigarism was low.


User Id: 58382 - 03 Jun 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?