Abstract of Contemporary cyber security practice
an evidence of IT industry
Cybersecurity
has turned out as the most threatening risk for business nowadays. Along with
the growth of Information Technology, cybersecurity has also emerged and even
has ranked as the top 10 threats toward the business in these modern days. The
digital world has triggered the rise of cyber-attacks, and for this reason,
tech-focused companies have started to recognize the need for implementing or
improving cybersecurity systems to secure their business. Implementing a Cyber
Security into the company now defines as managing with a developing role;
facing the new demands of visibility into business operations, also the new
expectations for information and privacy protection. This research covers a
complete Contemporary cybersecurity practice evidence of IT industry.
Contemporary cyber security practice
an evidence of IT industry
Chapter 1: Introduction of Contemporary cyber security
practice an evidence of IT industry
It
is a fact that cyber-attacks are a big threat to infrastructure and systems of
companies, individuals and government. The use of technology is increasing with
the passage of time, and this increased use is also coming up with several
issues and vulnerabilities in the information technology systems. Keeping the cyber
security attacks in mind, where credit cards data has been stolen, ATMs are not
working, and mutual fund companies are unable to operate; all of them need to
consider some counter measures (Amoroso, 2012).
1.1 Problem of Study of Contemporary
cyber security practice an evidence of IT industry
Cyber
threats and data breaches are getting common in society as information
technology is improving and advancing. In the presence of such security
threats, it is becoming difficult to make IT industry secure and data breaches
controlled. Credit cards and banking system are also a point of attention for
these security threats and cybercrimes. In short, cyber threats are a problem
for cyber security. The research will study this problem to find out a
solution.
1.2 Research objectives of Contemporary
cyber security practice an evidence of IT industry
The
key objectives of this research work are enlisted below:
1) To
examine the impact of unauthorized access on the cyber security
2) To
identify suspicious activities in IT industry
3) To
explain the significance of the security measures for cyber security.
1.3 Rationale of the study of
Contemporary cyber security practice an evidence of IT industry
The
rationale of this research study is the prime reason for conducting this
research work. IT security issues are becoming a problem for the strength of
the industry. IT security issues are also causing problems for customers
availing services of banks and credit cards. Moreover, another reason is to
identify problems which need to be controlled and managed for secure IT system
(Hasib, 2014).
1.4 Research questions of Contemporary
cyber security practice an evidence of IT industry
Q1.
What is the impact of unauthorized access on the cyber security?
Q2.
What are the suspicious activities in IT industry?
Q3.
What is the significance of the security measures for cyber security?
1.5 Significance of the study of
Contemporary cyber security practice an evidence of IT industry
The
current study tends to have both the theoretical and the practical
implications. It will serve as the basis for the future research work. Also, it
will help the managers to use the findings and the discussions of the current
research work for the strategy formulation.
1.6 Hypotheses development of Contemporary
cyber security practice an evidence of IT industry
The
hypotheses development is as given:
H1:
Unauthorized access tends to increase the cyber security threats.
H2:
Suspicious activities in IT industry have a positive significant association
with the cyber security threats.
H3:
Effective security measures help to minimize the cyber security threats.
Chapter 2: Literature Review
of Contemporary cyber
security practice an evidence of IT industry
It
is evident due to so many cyber-attacks that cyber-criminals are getting
sophisticated with their approach, and if they continue in this fashion, then
there will be more severe challenges for individuals and companies to deal
with. There is a need to use the technology of automated security intelligence
which keeps an automatic eye on systems, and if any vulnerability or issue is
found, it is quickly detected (Gantz & Philpott, 2012). The role of AI can
be crucial in placing considerable countermeasures so companies should use the
essence of AI to improve cybersecurity. In addition to that, all security
systems should be updated and they are placed in every aspect of the IT
infrastructure so that attackers may experience resistance at every point (Shinichiro, Koji, Yoshiya, Takashi, & Yoshiaki,
2017).
2.1 Theoretical Framework of
Contemporary cyber security practice an evidence of IT industry
Attached
as Appendix 1 along with the questionnaire as Appendix 2.
Chapter 3: Research Methodology
of Contemporary cyber
security practice an evidence of IT industry
For
the current research work the questionnaire regarding the cyber security will
be used. It will be distributed among 350 employees of 6 IT firms. SPSS will be
used to perform the tests on the data and evaluate the results. The correlation
and the regression analysis will be used.
Chapter 4: Discussion and analysis
of Contemporary cyber
security practice an evidence of IT industry
The
SPSS results will be helpful to determine if any technology is used on a small
scale, its issues and problems can also be small, but when things have become
huge part of daily life and businesses as information technology has become,
then its relevant issues are obvious to happen. That’s why it is critical for
individuals and companies to stay alert and come up with various
countermeasures so that they can avoid cyber-attacks in the first place, and if
they do happen, then they must have a plan to deal with those threats (Djekic, 2019; Bauman, Toomey, & Walker, 2013).
Chapter 5: Conclusion of Contemporary cyber security
practice an evidence of IT industry
In the end, it can be said that
cybersecurity is one of the biggest concerns of recent times, and if
considerable countermeasures will not be taken by stakeholders, then they may
face severe consequences. The individuals, companies, and governments should
come up with policies and systems to protect their data and sensitive
information by developing and implementing above mentioned countermeasures
because this is the only way to effectively deal with cybersecurity issues.
References of Contemporary
cyber security practice an evidence of IT industry
Amoroso, E. (2012). Cyber Attacks: Protecting
National Infrastructure, STUDENT EDITION (illustrated Edition ed.).
Elsevier.
Bauman, S.,
Toomey, R. B., & Walker, J. L. (2013). Associations among bullying, cyberbullying,
and suicide in high school students. Journal of Adolescence, 36,
341-350.
Djekic, M. D.
(2019). Some Countermeasures to cyber attacks. Retrieved from https://www.cyberdefensemagazine.com/some-countermeasures-to-cyber-attacks/
Gantz, S. D.,
& Philpott, D. R. (2012). FISMA and the Risk Management Framework: The
New Practice of Federal Cyber Security. Newnes.
Hasib, M. (2014). Cybersecurity
Leadership: Powering the Modern Organization. Tomorrow's Strategy Today,
LLC.
Shinichiro, N.,
Koji, K., Yoshiya, K., Takashi, Y., & Yoshiaki, S. (2017).
Countermeasures against Unknown Cyberattacks Using AI. NEC Technical
Journal, 12.
Appendix of Contemporary cyber security practice
an evidence of IT industry
The
purpose behind conducting this survey is to meet up the objectives of this
research. It will take almost 10 minutes to fill out this questionnaire. It is
assured that the information will be kept confidential and anonymous to others.
For the completion of research work, your assistance is required. All of your
efforts are highly appreciated.
Name (optional)
Age:
a) 18-24 b)
25-34 years c) 35-44 years d) 45 or above
Gender: a)
Male b) Female
Educational Level:
a) Bachelor b) Masters c) M-Phil d) Others
Employment status:
a) Private officials b) Government officials
c) others
For
the said questionnaire five-point likert scale is used. It ranges from 1 to 5.
Here,
Strongly
Disagree
1
|
Disagree
2
|
Neutral
3
|
Agree
4
|
Strongly
Agree
5
|
Kindly
provide your response for each of the given statements:
Sr.#
|
Statements
|
SD
1
|
D
2
|
N
3
|
A
4
|
SA
5
|
|
|
Unauthorized
Access:
|
|
UA1
|
Unauthorized access tends to increase
the cyber security threats.
|
|
|
|
|
|
|
UA2
|
The digital assets are manipulated
through the unauthorized access.
|
|
|
|
|
|
|
|
Suspicious
Activities:
|
|
SA1
|
Unusual traffic on a site is perceived
to be the suspicious activity.
|
|
|
|
|
|
|
SA2
|
A process or task if takes more time
than normal is considered a threat for the cyber security.
|
|
|
|
|
|
|
|
Security
measures:
|
|
|
|
|
|
|
SM1
|
The use of
effective security policies help to detect and prevent the threats.
|
|
|
|
|
|
|
SM2
|
Security
measures help to avoid the manipulation, deletion or modification of the
data.
|
|
|
|
|
|
|
|
Cyber Security:
|
|
|
CS1
|
Cyber security helps in the
identification of the thefts and the ransomware attacks .
|
|
|
|
|
|
|
CS2
|
The data breaches can better be avoided
through the cyber security.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|