Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Questions:

This should be an analysis and synthesis of the literature pertaining to your topic. You should ensure that you read up-to-date sources and assess current academic concepts and models relating to that topic and the research question and objectives developed.

Introduction

  • Is the domain explained?
  • Is there a rationale for the chosen topic?
  • Are the main sources stated?

The Main Body

  • Is there a clear structure?
  • Does the review flow into a logical progression?
  • Does the review convey the thinking of the writer?
  • Use of secondary sources, citation, references, synthesis, critique, chronology, seminal works, models?

  • Is the current position conveyed?
  • Is there a set of emergent conclusions?

Conclusion

  • Is there a clear concluding statement?
  • Is there a clear implication for further research?
  • Are research questions specified?
  • Are there emergent themes?
  • Is the literature review conclusive?
  • Has a theoretical or conceptual framework been identified?

Answers:

Introduction

Today men are able to send and receive the data from an e-mail or an audio or video just by click of a button and it is done due to fastest growing infrastructure that is internet. Various technologies has taken place in today’s environment which enables organizations to grow rapidly but due to these emerging technologies organizations are not able to safeguard their private information in an adequate manner and hence these days the ration of cyber crimes are amplifying day by day. The section of literature review is described to provide the details of secondary data on the topic of the research. The topic of the research is “To explore the challenges faced by the business organizations when implementing the cyber security to ensure safeguard of essential business information” for which various sources have been utilized to attain the information and data. In the context of cyber security, it means the prevention of the important information and data of business which is in form of digital. Cyber security is the major issues in today’s global business. As per the US government, cyber security is considered as the most integral and serious issues facing by the various businesses. It has been analyzed that every country is facing these challenges due to amendment in technology day by day. Due to coming age of big data, automation and Internet of things are being the reason being amplifying the Cyber security.

There are latest technologies such as cloud computing, E-commerce, mobile computing, net banking and many more that requires high level of system of security. These technologies hold the most important information concerning a person their security has become vital. It is essential to enhance the cyber security and preventing the crucial information infrastructures for the purpose of security of nations and economic well being. Internet safer is vital to the development of new services along with the governmental policy. It has been evaluated that there are many nations and governments are making laws on cyber securities in term to protect the confidential and sensitive information. Training should be conducted towards protecting the cyber crimes and save themselves from these issues.  The literature review evidence is reflected in this component to discuss the various issues regarding cyber security challenges. The main aim of this research is to identify the various risks factors which being the reason of cyber security in the business. One more objectives of this research are to discover the cyber security challenges which are available in the business. The scope of the research regarding this topic is broad. It is because there are lot of discussion has been made on this topic due to highlight as the critical issue many businesses are facing these days. The real life examples will be discussed in the literature review to set up the clear understanding on the topic. The sources, articles, web sources and books will be taken in use to elaborate the topic in sophisticated manner.

Literature Review

The top security measure of any organization is privacy and security of the data. The world has become advanced and the entire information is maintained in the digital or cyber form. Social networking is an advanced technology where users feel free to interact with number of people. It has many cases where cyber attackers steal the personal information of the person from the social sites. Cyber security is considered as the techniques utilized for the purpose of the prevention of businesses and computer systems from the unlawful access along with other cyber threats. It has been evaluated that the cyber threats are enhancing which may lead the business into adverse situation that is why it is vital for the companies to adopt the strategies which facilitates them in facing with the major issues of cyber security threats. Cyber security is not the small issues because it has significantly strengthened itself in past few years. As per Kaplan, Sharma & Weinberg (2011), more than 45 per cent of the total population of world is linked with the social media or internet which enhances the cyber crime and threats. Cyber security has taken place as the bigger issue and it has been proved by accomplished research on 25 global companies and their outcome reflects so.  Four common trends has been found by researcher which involve that the range of digital data is widespread along with that it has been analyzed that the nature of corporation is more open in the comparison of before. It also reflects that the supply chains are interlinked which may being the reason of attacking on technology.

Trends changing cyber security

Web servers

It has been found that the threat of attacks on web applications to remove the data. It has been analyzed that the criminals allocate their malicious code by using various web servers. A data stealing attack is considered as the big threat which gets the concentration of media. That is why it is vital to emphasize on preventing web servers and web applications. It has been found that the web servers are the best place to steal the personal information for cyber criminals.

Cloud computing and its services

Small as well as large companies are gradually accepting the cloud services. The recent movement reflects a wide challenge for cyber security, as traffic can move around the traditional points of inspection. Moreover, increment of number of applications accessible in the cloud expands, it enhance the requirement of policy controls for web applications as well as the cloud services for the purpose of protecting the loss of important data. Although cloud services are able to protect the data but still various issues can be found about their security.

Advanced persistent threat and targeted attacks

Advance Persistent threat (APT) is an entire latest level of cyber crime ware. To identify the network security, web filtering and IPS have majored role to protect the data from attacks. As cyber attackers are become advanced and employ more indistinct techniques, it is vital for the network security to integrate with other security services in order to detect attacks.

IPv6 New internet protocols

There is a new protocol, namely, IPv6 internet protocol which is establishing to replace the IPv4 which is the backbone of the network. Preventing IPv6 is not raising the question of porting the capabilities of IPv4. At the time of IPv6 replacement, more IP addresses available, there are various fundamental amendments to the protocol which can be deemed in security policy. Thus, it is vital for preventing the data to switch to IPv6 hastily (Saunders and Lewis, 2012).

Figure 1: Top Network Threats

Source: (Reddy & Reddy, e.d).

Along with that there are new methods which are being used by cyber criminals to hack the data for the purpose of collecting the confidential information. Some examples are elaborated faced by many organizations. DDos, Internet of things, Smartphone malware, Hacktivism, Ransomware, Machine learning, insider threats, Malware and phishing (Crowe, 2016). There are number of online user’s increases the amount of internet traffic for companies and to get benefitted cyber criminals grab the opportunity to send Distributed Denial of Service (DDoS) which is able to attack the firm’s server. In this attack, the wide range of internet traffic is sent by hackers to the company servers that force the certain activities of the company to stop working. In such case cyber criminals get access easily to hack the entire data of the company regarding personal and confidential. As per Nemati, (2010), the internet has enhanced the number of devices that are linked to the internet; there are options available for the people of developed countries to convert their house into smart home which is linked to the internet.

There are various companies that manufactures the smart home devices and appliance which utilizes the internet system to gather and share the data each other for improving the usability of the devices. The connection of gadget and devices with the internet are known as the Internet of Things and this kind of device amplify the risk of cyber security because it provides the opportunity to the hackers to hack one of the devices to attain the personal information of the people. The examples of internet of things are smart security cameras, connected cars and automatic doors. Another method is hacktivism which is modern method of dissenting conducted by hacktivists by using online platforms. There are many experts that define as the dangerous attack because it spoils the company financially as well as socially (Ning, Liu and Yang, 2013). The illustration of hacktivism involves the attack on Sony Corporation and Bank of America through hacktivist organization ‘Anonymous’. The leaking of Wiki leaks and Panama Papers are also the instance of hacktivistis attacks. Ransomware is hazardous software that attain the access of the company or person’s personal computer and ask for payment to give back the access; no surety is provided that the user will get be able to access his information back after paying the ransom money (Luo and Liao, 2009). Various kind of Ramsomware malware present in the market that is liable to enhance the challenges of cyber security challenges for companies like WannaCry, Crypto locker and Locky.  Large companies such as FedEx and Nissan have been influenced by the attack of Ransomware. Technology has changed rapidly that leads to unsetting innovations that amends the existing utilization way of products and services; Machine learning is one the innovation. Multinational companies such as Google and Facebook use the machine learning technology to improve their products and services (Sánchez Abril, Levin and Del Riego, 2012). For instance, multinational company, Google, integrates the machine learning on their smart phone, online services and smart home appliances which gather the data of users and supply them reference based on such learning (Sridhar, Hahn and Govindarasu, 2012). Cyber criminals can hacked the collected data by machine and can get accessed to an entire life of person. For instance, they are able to manage the self-driving cars which can be hazardous to the public. It enhances the requirement for companies to keep focus on the strong security algorithms in to their products which is not easy for the companies (IBM, 2016). That is why the cyber attackers can attack the small as well as medium corporations and entrepreneurs.

To protect the company’s sensitive data, there are various kinds of cyber security techniques. These cyber securities are defined below:

Authentication of data

It is necessary for the big as well as small companies to rectify the received documents such as it is authenticated or not before downloading that it has originated from a reliable sources or it is fake. To check the authentication of the report, the lead role is of antivirus that able to detect the issues or viruses in the file before downloading corrupted file. Thus the antivirus software is essential to prevent the devices from viruses (Islam, Islam and Mazumder, 2010).

Access control and password security

It has been seen that the easy password can be easily tracked by hackers to snatch the information from the computers of the company (Kanishk, 2017). Password security is must in the company to protect the personal information and for this company should follow the strict instruction of keeping password in hard form such as including symbol, number and alphabet.

Firewalls

A firewall is the software program that facilitates viruses, hackers and worms that try to reach the computer over the internet. It is the program that can easily detect the viruses and worms in to the computer by analyzing the each entered or existed message and block those one that do not meet the requirements of safety (Kelly, 2012). Hence, firewalls play a major role to detect the malware.

Malware Scanners

It is the kind of the software that generally scans entire files and the documents available in the system for harmful viruses or malicious code. There are various examples of malicious software that is viruses, Trojan horses and worms that are often grouped together and act as a malware (Wright, Dawson and Omar, 2012).

Anti-virus Software

It is the kind of the programs that are able to prevents, detects and take action to remove malware software program such as worms and viruses. There are various kinds of antivirus programs that involve the feature of auto-update that make able the program to download the profiles of new viruses for detecting the new viruses as soon as possible. It is vital for the companies to keep antivirus software in the system (Lenhart et. al., 2010).

Figure 2: techniques to cyber security

Source: (Reddy & Reddy, e.d).

It has been analyzed that government is aware about the cyber threats and taken numerous steps to meet the challenges of cybercrime. It involves the security of network and monitoring systems (Buczak and Guven, 2016). Along with that government is focused on the law for facing the concern of cybercrime. The plans are executed as per the design the approaches to meet these risks. Various countries has faced this issue and bear a huge lose in the term of financially and physically that is why various countries has taken different steps to meet the challenges such as laws are made by the government of China whereas United States developed and changed to improve the cyber security (Covington and Carskadden, 2013). It has been analyzed that in the world of corporate the condition has become worst day by day but implemented steps are taken to get over this. many countries has increased their budgets for cyber security such as 35% budget of US has increased for cyber security which reflects that the problem is enhancing and will continue in the coming years. According to James, (2016), government, businesses and individuals should get alert from these kinds of attacks and increase the cyber security cost to prevent from cyber crime. It has been evaluated that the $276000. In USA is the average cost of the attack by hackers which costs approx $100 million per year. It is necessary for the people to get aware about the cyber security which enhance the risks slowly. It has been found that the total number of cyber security vendors are 1404 in the world and 15 out of them, Australia have while other countries such as USA, UK Israel, India have 827, 76, 228 and 41 respectively. According to the data given by McAfee 2016 threats of cyber attacks are predicted, in the next five years the way of storage of personal information will be changed (Live Safe, 2017). The autonomous systems are the upcoming technology which incorporates with operating technology and unify together to resolve the concerns of cyber security (Zargar, Joshi and Tipper, 2013).

It has been analyzed that due to lack of enough staff with expertise in the cyber security function, the businesses of Australia has to face crisis of cyber security which enhance the demand of the cyber security specialists. It is considered as the real challenge to meet this demand but it has the issue of funding. Where one country is spending more on cyber security in comparison of other ones such as USA expensed more than US$180 million on R&D investment for preventing the confidential data while Australia is lacking in this portion. It is recently spending less than $100 million for preventing the confidential data from hackers. Weak collaboration has been found between the research and industry (Panneerselvam, 2014).

Conclusion

In the limelight of above discussion, it has been concluded that cyber security is the broad topic that has taken place in the world in essential form due to interconnected with various elements through internet. However, there are various issues arisen due to cyber attack but many software’s and techniques have been developed to protect the data from the hazardous attacks. Cyber security measures have been adopted and the challenges of these measures have been elaborated in the section of literature review which is gathered from various sources, journals articles, and books and over the internet for the privacy of data and information of the businesses. The literature has been reviewed various kinds of challenges and discussion has been made on the taken steps by various countries to meet these challenges. Trends changing cyber security has been discussed by elaborating the point of web server, cloud computing and its services, advanced persistent threat and targeted attacks and IPv6 New internet protocols. The importance of cyber security has been defined in the context of benefit of economic future. Various technologies are introduced such as cloud computing, E-commerce, mobile computing, net banking and many more that requires high level of system of security. It is essential to enhance the cyber security and preventing the crucial information infrastructures for the purpose of security of nations and economic well being.

References

Buczak, A.L. and Guven, E., 2016. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.

Covington, M.J. and Carskadden, R., 2013, June. Threat implications of the internet of things. In Cyber Conflict (CyCon), 2013 5th International Conference on (pp. 1-12). IEEE.

Crowe, J., 2016. Phishing by the Numbers: Must-Know Phishing Statistics 2016. Available at: https://blog.barkly.com/phishing-statistics-2016 [Accessed on 10/12/2017]

IBM., 2016. An integrated approach to insider threat protection. Available at: https://www-05.ibm.com/services/europe/digital-whitepaper/security/growing_threats.html [Accessed on 10/12/2017]

Islam, R., Islam, R. and Mazumder, T., 2010. Mobile application and its global impact. International Journal of Engineering & Technology (IJEST), 10(6), pp.72-78.

Kanishk., 2017. What Businesses In India Can Learn From Recent DDoS Attacks. Available at: https://blogs.haltdos.com/2017/02/22/businesses-india-can-learn-recent-ddos-attacks/ [Accessed on 10/12/2017]

Kelly, B.B., 2012. Investing in a centralized cybersecurity infrastructure: Why hacktivism can and should influence cybersecurity reform. BUL Rev., 92, p.1663.

Lenhart, A., Purcell, K., Smith, A. and Zickuhr, K., 2010. Social Media & Mobile Internet Use among Teens and Young Adults. Millennials. Pew internet & American life project.

Live Safe., 2017. Using your employees to prevent insider cyber threats. [Online] Live Safe. Available at: https://www.livesafemobile.com/prevent-insider-threats/ [Accessed on 10/12/2017]

Luo, X. and Liao, Q., 2009. Ransomware: a new cyber hijacking threat to enterprises. In Handbook of research on information security and assurance (pp. 1-6). IGI Global.

Nemati, H.R. ed., 2010. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering: Information Encryption and Cyphering. IGI Global.

Ning, H., Liu, H. and Yang, L.T., 2013. Cyberentity security in the internet of things. Computer, 46(4), pp.46-53.

Ning, H., Liu, H. and Yang, L.T., 2013. Cyberentity security in the internet of things. Computer, 46(4), pp.46-53.

Panneerselvam, R, 2014, Research methodology, PHI Learning Pvt. Ltd

Reddy, G. N. & Reddy, G.J. U. e.d., A Study Of Cyber Security Challenges And Its Emergning Trends On Latest Technologies. Retrieved on 31st December, 2017 from: https://arxiv.org/ftp/arxiv/papers/1402/1402.1842.pdf.

Sánchez Abril, P., Levin, A. and Del Riego, A., 2012. Blurred boundaries: Social media privacy and the twenty?first?century employee. American Business Law Journal, 49(1), pp.63-124.

Saunders, M N and Lewis, P 2012, Doing research in business & management: An essential guide to planning your project, Pearson.

Sridhar, S., Hahn, A. and Govindarasu, M., 2012. Cyber–physical system security for the electric power grid. Proceedings of the IEEE, 100(1), pp.210-224.

Wright, J., Dawson, M.E. and Omar, M., 2012. Cyber security and mobile threats: The need for antivirus applications for smart phones. Journal of Information Systems Technology and Planning, 5(14), pp.40-60.

Zargar, S.T., Joshi, J. and Tipper, D., 2013. A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE communications surveys & tutorials, 15(4), pp.2046-2069.

Copyright © 2009-2023 UrgentHomework.com, All right reserved.