CHALLENGES IN CYBER SECURITY FOR BUSINESS

Document Type:Thesis

Subject Area:Accounting

Document 1

Not only are the issues of cyber security a concern to small firms, but it is also equally a concern to large multinational industries. The growth of technology might be just one of the key factors that enhance cybercrimes. Even though the public understands how important it is to keep computer data secure, most organizations have neglected the ability to have the powerful working knowledge required to prevent data from falling into the hands of cybercriminals (Rabai et al. Various organizations around the world have lost sensitive information to criminals who make businesses face a lot of harm in due course. From the carelessness of employees through leaving important emails signed in while using public computers to careless disclosing key company passwords to their friends, data security has remained to be a concern to many.

Sign up to view the full document!

Business ventures operating an e-commerce feature should always work in line to enhance proper safety mechanisms which work properly for the entire system to have a reliable built-in security control platform. This function will ensure that the right factors have been considered and considerably laid down to effectively overcome key milestones that might be prevailing in the entire system unit (Bayuk et al. It is necessary to understand the right procedures that will be sued to ensure the organization has operationalized most of their key prospects for the sustainability of the entire system. System control should also be very secure from any form of security threat. The system control will always determine the manner in which security has been outlined in the enterprise.

Sign up to view the full document!

Thousands of fake ads are in circulation all over the internet platforms. The victims of this malicious ads and feedbacks are the consumers and the business organizations. Despite the fake ads, there are also purchased likes on the feedbacks (Zubilevych, 2017). This purchased likes and other forms of feedbacks have proved a threat to customers since they are usually left confused about the validity and existence of other advertising methods in the online market. In the cyber industry, malicious ads sometimes are used to hack into systems and bio data of organizations since they learn more about the organization and retrieve details from the fake ads and feedbacks (Zubilevych, 2017). It can be observed that the number of people who make use of mobile phones both for communication and business purposes, which has resulted in mobile malware (Choo, 2011).

Sign up to view the full document!

Banking malware is another example of mobile malware. Those individuals who tend to carry their transactions through their mobile phones are the ones who are likely to be affected by this. Here, the cybercriminals tend to install malicious packages such as Trojan which will spy on the financial bills and later retrieve the required information necessary. Mobile ransom ware is another threat posed by mobile malware. Other employees tend to expose the organization's information accidentally to the attackers thus exposing the organization to the cybercrimes threat. In this instance, no malware is always involved, and therefore no detection takes place since the security mechanisms in place like anti-viruses and the firewalls do not detect them (Cárdenas et al. This attack into systems by hacktivists usually paints a business organization with a bad picture since they typically tend to make sentiments which are often viewed by almost everyone because they are posted to the public.

Sign up to view the full document!

RESEARCH QUESTIONS The proposal will aim at answering the following research questions: 5. 1 Primary Question Is cyber security a challenge for business? 5. H1: There is significant relationship between Hacktivism and the challenges in cyber security for business. Ho: There is no significant relationship between Machine learning and the challenges in cyber security for business. H1: There is significant relationship between Machine learning and the challenges in cyber security for business. Ho: There is no significant relationship between Back off malware and the challenges in cyber security for business. H1: There is significant relationship between Back off malware and the challenges in cyber security for business. In this study, the researchers find it necessary to test the content validity of the research instruments to ascertain whether all the areas that are critical for this study are included in the research instruments.

Sign up to view the full document!

This will be done through the guidance of the lead supervisor to one of the top 10 business firms faced with cyber-attacks. Pilot testing will involve pretesting of the research instruments to determine their validity and reliability. 2 Sampling Frame According to Kothari (2004), a sampling frame simply means completed lists of the population that is going to be studied and thus it is a determinant of an enquiry and its structure. In this study, the researchers will pilot respondents from each IT officer for each of the top 10 business companies most faced with cyber insecurity, as researched by the Villanova University. 5: Variable Specifications The Dependent Variable • Challenges in cyber security for business The Independent Variables • An outbreak of fake feedback-adds • Hacktivism • Machine learning • Back off malware • Drone jacking • Inner threat 6.

Sign up to view the full document!

2 QUANTITATIVE RESEARCH 6. 1 Research Instruments These are the tools used for the collection of data from the respondents on the topics under study (Kothari, 2004). Both interviewing and Questionnaires will be used for this study. There will be structured, closed and open ended questions in order to communicate easily with the Respondents as well as to safe time during questionnaire administration. A researcher is thus in a position to a historic informational data that will enable him or her to develop a gained control in the questioning line. In this study, a representative number of 3 respondents will be given the interview to allow room for more data that may not be possible to be collected from other sources such as questionnaires. 5 Questionnaire A questionnaire is a list of standard questions prepared to fit a certain inquiry.

Sign up to view the full document!

For this study, questionnaires will be used as my major instrument of research. These questionnaires will be given to 10 respondents as outlined in my sample frame for this study. Without proper considerations, most businesses are not able to comprehend the right facts that could help secure their data. The study has highlighted some of the key challenges that organizations have faced in addressing security concerns over the years. The different factors have enabled them to overcome key factors that will influence the manner in which key aspects are being undertaken to secure the information of organizations from reaching the hands of possible cybercriminals. Without proper policies, most of the leading business corporations have lost important information to the public which has significantly impacted the financial status of such firms.

Sign up to view the full document!

WORKS CITED Amini, L. Washington, DC: U. S. Patent and Trademark Office. Bayuk, J. L. " U. S. Patent Application No. Blythe, S. E. , Chiang, R. H. , & Storey, V. C. Business intelligence and analytics: from big data to the big impact. F. , Engel, K. , & Harvey, J. W. Influence of awareness and training on cyber security. Pötzsch, S. (2008, September). Privacy awareness: A means to solve the privacy paradox? In IFIP Summer School on the Future of Identity in the Information Society (pp. Springer, Berlin, Heidelberg. Rabai, L. , Dinev, T. , & Xu, H. Information privacy research: an interdisciplinary review.  MIS Quarterly, 35(4), 989-1016. Von Solms, R. C. K. , & Chow, K. P. (2010, December). APPENDIX Budget Event Estimated Cost ( USD) Sub-Total (USD) Rent 3 x 5 15 Printing 10 10 Travel 12 x 5 60 Food 5 x5 25 Airtime 5 5 TOTAL 11 5.

Sign up to view the full document!

From $10 to earn access

Only on Studyloop

Original template

Downloadable