Hurry Up! Get 15% Please upload the order before 31st january 2019. T&C applied Order now !
review
Back to Samples

Challenges in Cyber Security for Business

 

1.    Introduction. 2

2.    Literature review.. 2

2.1.     Key Challenges in Cyber Security. 3

2.2.     Scope and Objectives of the Literature Review.. 4

2.3.     Comparative Analysis. 4

2.4.     Research Gap. 6

3.    Conclusion. 7

4.    References. 8

 

  1. Introduction

The challenges in cyber security for the business are a common issue in the modern world of digitalisation. This study is going to review some literature about challenges in cyber security. In this study, it will be shown that the importance of cyber security in the business in today's business environment. In the recent business environment, there is identify a trend of the cyber-threats (Craig, et al., 2015). If organisations have a website or any web-based infrastructure, the online accounts have the possibility of cyber-attack. Traditionally, most of the large companies attract by the cyber criminals. In recent days, each organisation can face the cyber attract for the competitions, displeased of other parties, etc. The small business organisation is easy to cyber attracts because of least protection of websites, network system and lack of resources, etc. The organisations face some challenges during the use of cyber security system for the business. In this literature research, the study will analyse about challenges in use of cyber security for the business.

  1. Literature review

Today's busine ........

ctives of the Literature Review.. 4

2.3.     Comparative Analysis. 4

2.4.     Research Gap. 6

3.    Conclusion. 7

4.    References. 8

 

  1. Introduction

The challenges in cyber security for the business are a common issue in the modern world of digitalisation. This study is going to review some literature about challenges in cyber security. In this study, it will be shown that the importance of cyber security in the business in today's business environment. In the recent business environment, there is identify a trend of the cyber-threats (Craig, et al., 2015). If organisations have a website or any web-based infrastructure, the online accounts have the possibility of cyber-attack. Traditionally, most of the large companies attract by the cyber criminals. In recent days, each organisation can face the cyber attract for the competitions, displeased of other parties, etc. The small business organisation is easy to cyber attracts because of least protection of websites, network system and lack of resources, etc. The organisations face some challenges during the use of cyber security system for the business. In this literature research, the study will analyse about challenges in use of cyber security for the business.

  1. Literature review

Today's business environment cyber security is the one of the biggest concern. Though, few organisations can understand the specific importance of data safe from the cyber criminals in the business. It is necessary to keep data and computers secure in the business. Sometimes it is shown that lack of high working knowledge of the employees falling in the complexity of the cybercrime in the working place (Alcaraz & Zeadally, 2015). Every business organisation has to acknowledge about the cyber security. In the business organisation workplace, there is the huge use of technology, so there is the wide range of organisational liabilities to exploit by the cyber criminals. The personal information of the organisation is collected for the personal profit or gain of the cyber criminals for the legitimate business purposes (Cavelty & Mauer, 2016).

According to Cherdantseva, et al., in every plan of the organisation security should be at the top because cyber security attack can come from anywhere (Cherdantseva, et al., 2016). Cyber security is the essential part of an organisation. The most management issue or any organisation is the protection of valuable information about the business and intellectual property from misuse. Recently the US government has announced that cyber security is the most serious national security and economic security which are faced by the every organisation. Craig, et al.,have examined that in the year of 2015, from the large retailer's tens of millions of credit cards were stolen. The loss of this attracts limited because immediately banks take action by the cut off cards and for the fraudulent charges is not liable to the customer (Craig, et al., 2015).

    1. Key Challenges in Cyber Security

The cyber security is the essential part of the security system in the organisation. Organisations adopt some security process for the cyber security. During the adoption of the cyber security system, the organisation faced some problem which is discovered by Cavelty & Mauer (2016)in his research. In recent years there are huge challenges in cyber security which are faced by the organisation. The challenges are describing in this study.

Mobile device management

Most of the companies adopt cyber security for the level of desktops or laptops, but over the half, companies start deals by the mobile device. The companies begin its activities of management by the mobile device (Dua & Du, 2016). At this circumstance, the companies did not adopt any cyber security system for the mobile device.  The companies have faced the cyber security problem for the mobile device. It is shown that most of the companies already start to adopt some mobile device management policies in the organisation.

Emergency response team

According to Rid and Buchanan, it is showed that very few security system is fully capable of the support for the emergency response team while most of the company need to able to put an emergency response team and somewhat prepared for the response to a potential team (Rid & Buchanan, 2015). Most of the cyber security organisation would fall short for the response and analysis of the cyber attract.

USB control

For the distribution of cyber attract USB device might be a significant vector. Though, over the 35% of the cyber security respondents did not maintenance or control any connecting device at the endpoint through the USB. During the USB encryption, most of the respondents of the organisation were lack. The respondent was failed to ensure that the by the USB data from a connecting device at the end of the points was sufficiently encrypted (Subsorn & Limwiriyakul, 2012). It would end up in the secure environment.

Data loss prevention

Data is the essential component of any organisation. If a company faced data loss due to lack of cyber security system, then the company faces a huge loss. Data loss prevention is necessarily required through the cyber security system. It was showed that 37% of the cyber security organisation did not give any assurance for the loss of information, documents of the organisation and IP.

    1. Scope and Objectives of the Literature Review

There are various scopes for the study of challenges in the cyber security in business. During the use of cyber security system, the organisation faced many challenges such as USB control, third party connectivity, breach indicators, application control, disk encryption, distributed denial of service attacks, password management, state-sponsored espionage, privacy law, mobility, sabotage, insider threats (Rid & Buchanan, 2015). The organisation faced some problem during the use of the internet. There are various scopes for the research on the challenges of the cyber security in business. The researcher may research on the problems of the use of cyber security system. The researcher may research on the finding solution of the problems of use of cyber security system.

During the research, few objectives will be fulfilled by the study. This study will fulfil the knowledge about the cyber security system and how much cyber security is importance in the business. The organisation faced some challenges during the use of cyber security system. This study will help to know about the challenges of the cyber security system in the business. This study examined that during the cyber attract business and IT required identifying the risks together. Then the organisation has to identify that which department is liable for the risk in cyber security such as IT operator, security engineers or network team (Xu, et al., 2015).

    1. Comparative Analysis

In the last decades, most of the companies have capabilities to strengthen in cyber securities. () Said that comparative analysis of cyber security policy is a turning point in the business environment (Subsorn & Limwiriyakul, 2012). The challenges in cyber security system are the outcomes of the risk which is created by the communication and information technologies failure infrastructure. Dua and Du and explained that the concern for the potential vulnerability of network system with an increasing number of disruption in the cyber domain (Dua & Du, 2016). Many organisations adopt some process to understand the threats to the cyber security system infrastructure better and measure the risk which is related to the cyber security system. Then the organisations take necessary steps to protect the assets or information of the organisation. Knowles, et al.have explored that there are the huge development if technologies in the business environment in the area of communication and information (Knowles, et al., 2015). Besides all the opportunities of technologies, there is the wide range of threats in the business. This threat is related to the cyber security, and this is the one of the most serious security concern for the business. In the year of 2003, the U.S was the first nation which was prepared a national security strategy and publishes the security strategy. Therefore, subsequently, other 35 nation publish its national cyber security strategy for the business. As per the Alcaraz and Zeadally, the challenges of the cyber security policy are the openness of the Internet as a new source of growth and a platform for the innovation (Alcaraz & Zeadally, 2015). This challenges faced by the business organisation, the Internet technical community and the civil society. Regarding security barriers, the business could occupy the innovation and the global development of the cost-effective security. Rid & Buchanan, 2015 stated that the internet in technology have influenced the business day by day because of capabilities of support and assisted of the organization and its management performance and operational performance (Rid & Buchanan, 2015). The security issue is the common and vital issue in internet technology in the business. Challenges in cyber security are the harmful impact on the integrity, confidentiality and privacy of the business.

According to Knowles, et al., awareness of the security in the organisation which is leading them and attack information security is not only as the technical matter but also from the corporate (Knowles, et al., 2015). Cyber security is relatively a vast domain. It was originated in the mid-1990 in the U.S. Subsorn and Limwiriyakul explored that cyber security risk affects the costs in the business and this will affect the revenue of the organisation. It can be harm as the capability of the organization to innovate and gain of the profit (Subsorn & Limwiriyakul, 2012). The risks and the threats to the cyber security of the IT infrastructure and information technology may be come from anywhere both outside and inside of the organisation. The overall risks and threats should be understood for manage or control the risk. The risk analysis from the cyber security can help the organisation by identifying the value and assets of the organisation (Xu, et al., 2015). It should help to identify the threats and vulnerabilities of the organisation. It would also help to establish a balance between cost and threats impact.

In the business, by using the computer-based tools with internet gives opportunities to work more efficiently from any location. It helps to reach a new and larger market to the business. A business adopting computer and the internet for the maintaining website and using emails and cyber security is the part of this process and plan. Cherdantseva, et al. have shown that by the problem-solving sessions with the cyber security system most of the companies revealed their work spread and fast growing in the business (Cherdantseva, et al., 2016). The cyber security system combination provided an advantage of the technology to the organisation and protected the process of the business and information about the business. In the business organisation, most of the challenging attracts the exploitation of human vulnerabilities rather than the technological instrument (Alcaraz & Zeadally, 2015). Cybercrime organisations gather information from the various social networking sites, and it targeted the phishing attracts and system administrators and senior executives or the organisation. Subsorn and Limwiriyakulhave explained the cyber security by the business back and technology forward. They havealso explained the business back as the organisation may protect most important information in the business like protecting the information about customer credit card rather than the process with the technological vulnerabilities in the organisation (Subsorn & Limwiriyakul, 2012).

    1. Research Gap

In the recent decade, most of the companies face some problems during the use of cyber security for the protecting information of an organization. Most of the company faced the problem with USB control and mobile device management. In the cyber security system, there is a huge lack of the USB control and mobile device management security. Most of the company faced a problem with mobile device security (Knowles, et al., 2015). In recent, most of the companies operated their business by the mobile device. The smartphone is the essential part of operating the business. The mobile device carries a lot of information about the business process, strategy, customer information, etc. But there is the lack of strong cybersecurity for the mobile device in the market (Cavelty & Mauer, 2016). Most of the researcher research for the laptop or desktop cyber security. In this circumstance, there is a huge research gap in the cyber security of the mobile device.

  1. Conclusion

This assignment explained about cyber security system in the business. Today's business environment cyber security is the essential part of the business. Most of the company uses cyber security system for the protection of information, data, strategy, etc. of the organisation. During the use of cyber security system, the organisation faced some challenges for the protection. This assignment was to study about the various challenges of the cyber security system in the business. The researcher examined various challenges such as USB control, data loss prevention, third party device connectivity, USB encryption, disk encryption, emergency response team and application control. Most of the organisation struggled with the cyber security of the mobile device security. Most of the business organisation operated their business by the mobile device like the smart phone. The smartphone carries significant data of the organisation, and it must need to protect the mobile device. In this situation, there is the lack of research for protection against the cybercrime of the mobile device (Cherdantseva, et al., 2016). This study analysed the challenges of the cyber security system in the business. This research also includes a research gap of the challenges of the cyber security system in the business. 

 

 

  1. References

Alcaraz, C. & Zeadally, S., 2015. Critical infrastructure protection: Requirements and challenges for the 21st century. International Journal of Critical Infrastructure Protection, 8(2), pp. 53-66.

Cavelty, M. D. & Mauer, V., 2016. Power and Security in the Information Age: Investigating the Role of the State in Cyberspace. London: Routledge.

Cherdantseva, Y. et al., 2016. A review of cyber security risk assessment methods for SCADA systems. Computers & Security, 56(9), pp. 1-27.

Craig, A. N., Shackelford, S. J. & Hiller, J. S., 2015. Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis. American Business Law Journal, 52(4), p. 721–787.

Dua, S. & Du, X., 2016. Data Mining and Machine Learning in Cybersecurity. illustrated ed. Boca Raton: CRC Press.

Knowles, W. et al., 2015. A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection, 9(2), pp. 52-80.

Rid, T. & Buchanan, B., 2015. Attributing Cyber Attacks. Journal of Strategic Studies, 38(1-2), pp. 4-37.

Subsorn, P. & Limwiriyakul, S., 2012. A Comparative Analysis of Internet Banking Security in Thailand: A Customer Perspective. Procedia Engineering, 32(2), pp. 260-272.

Xu, G. et al., 2015. A cloud computing based system for cyber security management. International Journal of Parallel, Emergent and Distributed Systems, 30(1), pp. 29-45.