Write a Literature Review Challenges in Cyber Security for Business.
The growth of technology had made the development of the activities favouring the alignment of the improved operations for business development (Elmaghraby and Losavio 2014). The implication of the successive activities would also allow the implication of the successive development for the operational employment.
The following assignment is a literature review on the topic of Challenges of Cyber Security in Business. The implication of the internet technologies had resulted in forming the modification of the operations for supporting the utilization of the activities favouring the alignment of the successive development. The implication of the possible solutions would be helpful for forming the utilization of the improved operation development.
The project is developed for forming an analysis of the successive implementation of the activities favouring the conclusion of the implication of the operations and aligning the utilization of the operations favouring the project operations. The objectives of the project are,
The project is based on forming an analysis of the cyber security issues and their impact on the business organizations. The literature review is the primary deliverable for the analysis that would help in highlighting the possible solutions for the issues identified. The project scope items include,
Cyber Security Risk Analysis: The analysis of the probable problems and issues that the business organizations face due to lack of cyber security is the primary factor for the project.
Evaluation of the Impact of the issues: The evaluation of the impact of the cyber security issues on the operations of the business would also be done in the project.
Development of probable solutions: The probable solutions for the various risk mitigation is implied that would be helpful for forming the reduction of the cyber security issues in the business organization.
The inclusion of the facilities of internet had helped in forming the utilization of the operations that would be helpful for listing the development of the improved functions. According to Tisdale (2015), many organizations have included the use of the effective cyber facilities for improving the development of their operations. The inclusion of the activities would also be helpful for aligning the utilization of the improved operational development. The implementation of the web operations had also been helpful for the organizations for improving their global extension. However, the implication of the web operations had resulted in causing the probability of the occurrence of the major cyber threats. The growth of cyber threats has also resulted in developing the major problems for the business development.
Overview of Cyber Security Issues
According to Chertoff and Simon (2015), the cyber security plays a major in developing the web based platform for all business organizations. The business organizations have included the alignment of the effective development of improved activities by the help of web based applications. The web based activities result in forming the alignment of the operations resulting in cyber security issues. The cyber security issues are resulted from various threats and cyber criminal activities that have seen a considerable amount of growth since the last few decades. The cyber threats can be resulted due to misuse of the technology and the alignment of the hacking operations. There have been many cases where the growth of the cyber threats had resulted in causing both financial and operational loss for the business operations (Conti et al. 2018). The cyber security issues are the web based threats that can harm the legal operations or financial stability of business operations and it would also be responsible for the extracting benefits from the organization at the cost of business’s loss.
Various Cyber Security Issues for business
According to Rawat and Bajracharya (2015), the growth of technology had also resulted in enabling higher ability of cyber threat agents and it would result in forming the major problems for the business development. The various cyber security issues and threats agents are malwares, lack of cyber security policy, issues of BYOD, absence of recovery plan, lack of security training, and problems in covering the cyber security basics. These are the major cyber security issues that have resulted in forming the major issues for the business organizations.
Malwares: The malwares are the primary theft of the web service utilization and it would result in limiting the application of the operations so that improved operation development cannot be implied (Reddy 2015). The malwares attack the system by entering the network and cause disruption in operations. The malwares have the capability of spreading to various places at a very rapid pace. There are many malwares that have been aligned with the worm capabilities for harming the implementation of the operations and execution of the queries. The malwares would be spread on a mass level and would result in looping requests in server which would make the server unresponsive. Moreover, the analysis would also result in causing the major harm for the people associated with the development of the activities (He et al. 2016). The malwares are also responsible for the DoS or denial of service attack on the server.
Lack of Cyber Security Policy: The implication of the web services for the business organization had resulted in forming the requirement of effective security implementations. The major security problems for the business organization are resulted due to the lack of policy security structure in the organization (Sajid, Abbas and Saleem 2016). The lack of security options would result in forming the threat of operations for the business organization. The policy security functions for the organization would involve the limitation of the users, cross site analysis, and antivirus usage. However, due to the absence of security functions, the company has been facing various issues and problems. The lack of cyber security policy would also result in forming the major issues for the development of the operations and also it would result in forming the data theft and misuse of the organization’s information for personal use.
Issues of BYOD: The concept of BYOD works on employees bringing their own device at work for working more efficiently (Brown, Gommers and Serrano 2015). The various issues of the organization had resulted in forming the major setback for the implication of the effective operation development. The BYOD works for the organization that work on larger scale and require their employees to stay connected to workplace. The employees would install the access of the company’s database in their own device while working as they would need the access for completion of their work. It had been seen that many times the carelessness of the employees would result in forming the major issue of data theft or infiltration (Sadeghi, Wachsmann and Waidner 2015). The BYOD policy implementation makes the data security of the organization vulnerable for being misused or extracted by external users.
Absence of Recovery Plan: The recovery plan is another major problem that would cause the issues for the business organization. The growth of cyber security issues had made it evitable for the business operations for implementing the recovery plan (Thuraisinghamm et al. 2016). The recovery plan developed would be helpful when the data stored in the web-based accessed storage would be lost. There have been many cases where the online accessible data is lost or modified from the internet cloud access storage. It would result in forming a major problem for the business organizations as they would have to rebuild the database. However, with the use of effective recovery plan they would be able to retrieve the data from the system. The absence of the recovery plan would result in forming the issue in retrieval of the data lost due to web server security issue by the organization.
Lack of Security Training: The lack of security training is another major factor that would result in forming the issues in implying the problems in completion of the project (Herrera, Ron and Rabadao 2017). The absence of security training would also result in forming the major implication issues for aligning the development of the operations. The lack security training had also resulted in forming the increase of the complexities in the completion of the activities. The security training is required for ensuring that the staffs are able to cope up with the development of the operations. There are many changes in the system of web operation development. The traditional system would be modified for the adjusting the web application development. Hence, the absence of the training would result in making the employees unable to operate the system correctly.
Problems in Covering the Cyber Security Basic: The implication of the web services for the business organization had resulted in forming the requirement of effective security implementations. The major security problems for the business organization are resulted due to the lack of basic security structure in the organization (Cavelty and Mauer 2016). The lack of security options would result in forming the threat of operations for the business organization. The basic security functions for the organization would involve the firewall, authentication, and authorization. However, due to the absence of security functions, the company has been facing various issues and problems. The lack of cyber security basics would also result in forming the major issues for the development of the operations and also it would result in forming the data theft and misuse of the organization’s information for personal use.
Impact on Business Organizations
The business organizations that have implemented web based services would require the implication of the security functions. The lack security functions would result in forming the major hindrances for the execution of the operations. The cyber attacks can impact not only on the functions of the organization, but it can form an impact on the financial stability and the legal procedures too. The impact of the cyber security issues can be broadly classified into three parts economic costs, reputational damage, and legal consequences of the cyber security attacks.
Economic Costs of the Cyber Security Attacks: Lee, Bagheri and Jin (2016) stated that the cyber security attacks are primarily based for harming the company with financial losses. The various thefts of company’s data would be done for gaining monetary value from the organization. The economic costs of the cyber security issues would be based for the loss of the organization based on the money value. The implication of cyber attacks on the organization might result in loss of financial information, money theft, loss of corporate information, and trading disruption (Gupta, Agrawal and Yamaguchi 2016). The loss of financial information like payment details or card information might allow the attacker for extracting money from the bank accounts with the help of details occupied from the attack. The cyber criminals have been using the various hacking methods for somehow extracting information from the system and gaining advantage in terms of money from the organization. The company would have to bear the loss incurred and it would also result in forming the major issues of capital information management. The corporate information theft can also result in causing the loss of economy for the business organization. The information like the list of investors and clients would also result in forming the major accounting information loss for the company (Stimmel 2016). The implication of the cyber security issues might result in forming the major setback for the organization.
Reputational Damage of the Cyber Security Attacks: The reputational damage of the cyber security attacks would result in forming the issues for the business operations. The attacks of the operations had resulted in forming the major implication issues for the business organizations (Song, Fink and Jeschke 2017). The business development issues would result in causing the reputational damage to the business organizations. The cyber security attacks would result in forming the loss to the customers that would in turn cause problem for the company. The reputational damage to the organization has resulted in aligning the formation of the major harms for the organization. For example- if the personal information (email or contact numbers) of the customers are extracted from the database of the company’s website and misused for sending promotional offers and vouchers by some other company, it would cause a sense of discomfort for the user while providing their right information to the company next time. The company would have to face reputational problems if the customers start leaving the company one by one. Moreover, the major factors of development would also be misused for forming the issues in alignment of the activities favouring the implementation issues.
Legal Consequences of the Cyber Security Attacks: The attacks by the cyber thieves and hackers would also result in causing the problems for the company in terms of legal obligations (Carr 2016). The theft of information can be used for generating the copyright issues for the company. The major security slackness factors that had resulted for forming the alignment of the improvement issues for the operations would also result in forming the hindrance for the development of the activities.
Possible Cyber Security Options
As opined by Arabo (2015), there are various methods that would allow the development of the security measures for the users. The implication of the cyber security policy implementation, monitor system for BYOD devices, data recovery plan, security training, and basic security (authentication and authorization) would allow the formation of the effective information processing for the users and implication of the successful web services for the business operations.
Cyber Security Policy Implementation: The implication of the web services for the business organization had resulted in forming the requirement of effective security implementations. The policy security functions for the organization would involve the limitation of the users, cross site analysis, and antivirus usage (Buczak and Guven 2016). The implication of the cyber security policies would allow the users for the development of the wall protecting the data and information from external infiltration. The policy implementation would also be helpful for protecting the implication of the operations and alignment of the successful operational development.
Monitor System for BYOD devices: The BYOD works for the organization that work on larger scale and require their employees to stay connected to workplace (Patrick and Fields 2017). The employees would install the access of the company’s database in their own device while working as they would need the access for completion of their work. It had been seen that many times the carelessness of the employees would result in forming the major issue of data theft or infiltration. The BYOD policy implementation makes the data security of the organization vulnerable for being misused or extracted by external users.
Data Recovery Plan: According to Mendel (2017), the growth of cyber security issues had made it evitable for the business operations for implementing the recovery plan. The recovery plan developed would be helpful when the data stored in the web-based accessed storage would be lost. There have been many cases where the online accessible data is lost or modified from the internet cloud access storage. It would result in forming a major problem for the business organizations as they would have to rebuild the database. However, with the use of effective recovery plan they would be able to retrieve the data from the system.
Security Training: The security training is required for ensuring that the staffs are able to cope up with the development of the operations. There are many changes in the system of web operation development. The traditional system would be modified for the adjusting the web application development. Hence, the absence of the training would result in making the employees unable to operate the system correctly.
Basic Security (Authentication and Authorization): The major security problems for the business organization are resulted due to the lack of basic security structure in the organization (Fonseca and Rosen 2017). The basic security functions for the organization would involve the firewall, authentication, and authorization. The lack of cyber security basics would also result in forming the major issues for the development of the operations and also it would result in forming the data theft and misuse of the organization’s information for personal use.
Conclusion
The literature review had considered the analysis of the cyber security issues, their types, their impacts on the business operations, and some possible measures that can be used against the cyber attacks. The analysis had helped in the business development for listing the allowance of the successive integration of the operations for aligning the utilization of the improved operation development. The implication of the activities allowed in forming the utilization of the activities favouring the alignment of the operations. The business organizations have included the alignment of the effective development of improved activities by the help of web based applications. The web based activities resulted in forming the alignment of the operations resulting in cyber security issues. The analysis had resulted in listing the issues of malwares, lack of cyber security policy, issues of BYOD, absence of recovery plan, lack of security training, and problems in covering the cyber security basic. The impact of the cyber security issues can be broadly classified into three parts economic costs, reputational damage, and legal consequences of the cyber security attacks. However, the issues can be rectified by implementing cyber security policy implementation, monitor system for BYOD devices, data recovery plan, security training, and basic security (authentication and authorization).
References
Arabo, A., 2015. Cyber security challenges within the connected home ecosystem futures. Procedia Computer Science, 61, pp.227-232.
Brown, S., Gommers, J. and Serrano, O., 2015, October. From cyber security information sharing to threat management. In Proceedings of the 2nd ACM workshop on information sharing and collaborative security (pp. 43-49). ACM.
Buczak, A.L. and Guven, E., 2016. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.
Carr, M., 2016. Public–private partnerships in national cyber?security strategies. International Affairs, 92(1), pp.43-62.
Cavelty, M.D. and Mauer, V., 2016. Power and security in the information age: Investigating the role of the state in cyberspace. Routledge.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016. A review of cyber security risk assessment methods for SCADA systems. Computers & security, 56, pp.1-27.
Chertoff, M. and Simon, T., 2015. The impact of the dark web on internet governance and cyber security.
Conti, M., Dehghantanha, A., Franke, K. and Watson, S., 2018. Internet of Things security and forensics: Challenges and opportunities.
Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), pp.491-497.
Fonseca, B. and Rosen, J.D., 2017. Cybersecurity in the US: Major Trends and Challenges. In The New US Security Agenda (pp. 87-106). Palgrave Macmillan, Cham.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global.
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y. and Gabrys, B., 2016, July. The security challenges in the IoT enabled cyber-physical systems and opportunities for evolutionary computing & other computational intelligence. In Evolutionary Computation (CEC), 2016 IEEE Congress on (pp. 1015-1021). IEEE.
Herrera, A.V., Ron, M. and Rabadão, C., 2017, June. National cyber-security policies oriented to BYOD (bring your own device): Systematic review. In Information Systems and Technologies (CISTI), 2017 12th Iberian Conference on (pp. 1-4). IEEE.
Lee, J., Bagheri, B. and Jin, C., 2016. Introduction to cyber manufacturing. Manufacturing Letters, 8, pp.11-15.
Mendel, J., 2017. Smart Grid Cyber Security Challenges: Overview and Classification. e-mentor, (1 (68)), pp.55-66.
Patrick, H. and Fields, Z., 2017. A need for cyber security creativity. Collective Creativity for Responsible and Sustainable Business Practice, pp.42-61.
Rawat, D.B. and Bajracharya, C., 2015, April. Cyber security for smart grid systems: Status, challenges and perspectives. In SoutheastCon 2015 (pp. 1-6). IEEE.
Reddy, Y.B., 2015, April. Security and design challenges in cyber-physical systems. In Information Technology-New Generations (ITNG), 2015 12th International Conference on (pp. 200-205). IEEE.
Sadeghi, A.R., Wachsmann, C. and Waidner, M., 2015, June. Security and privacy challenges in industrial internet of things. In Proceedings of the 52nd annual design automation conference (p. 54). ACM.
Sajid, A., Abbas, H. and Saleem, K., 2016. Cloud-assisted iot-based scada systems security: A review of the state of the art and future challenges. IEEE Access, 4, pp.1375-1384.
Song, H., Fink, G.A. and Jeschke, S. eds., 2017. Security and Privacy in Cyber-physical Systems: Foundations, Principles, and Applications. John Wiley & Sons.
Stimmel, C.L., 2016. Big data analytics strategies for the smart grid. Auerbach Publications.
Thuraisingham, B., Kantarcioglu, M., Hamlen, K., Khan, L., Finin, T., Joshi, A., Oates, T. and Bertino, E., 2016, July. A data driven approach for the science of cyber security: Challenges and directions. In Information Reuse and Integration (IRI), 2016 IEEE 17th International Conference on (pp. 1-10). IEEE.
Tisdale, S.M., 2015. Cybersecurity: Challenges from a Systems, Complexity, Knowledge Management and Business Intelligence Perspective. Issues in Information Systems, 16(3).
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.