Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Report on Contemporary cyber security practice an evidence of IT industry

Category: Computer Sciences Paper Type: Report Writing Reference: APA Words: 1500

Abstract of Contemporary cyber security practice an evidence of IT industry

Cybersecurity has turned out as the most threatening risk for business nowadays. Along with the growth of Information Technology, cybersecurity has also emerged and even has ranked as the top 10 threats toward the business in these modern days. The digital world has triggered the rise of cyber-attacks, and for this reason, tech-focused companies have started to recognize the need for implementing or improving cybersecurity systems to secure their business. Implementing a Cyber Security into the company now defines as managing with a developing role; facing the new demands of visibility into business operations, also the new expectations for information and privacy protection. This research covers a complete Contemporary cybersecurity practice evidence of IT industry.

Contemporary cyber security practice an evidence of IT industry

Chapter 1: Introduction of Contemporary cyber security practice an evidence of IT industry

It is a fact that cyber-attacks are a big threat to infrastructure and systems of companies, individuals and government. The use of technology is increasing with the passage of time, and this increased use is also coming up with several issues and vulnerabilities in the information technology systems. Keeping the cyber security attacks in mind, where credit cards data has been stolen, ATMs are not working, and mutual fund companies are unable to operate; all of them need to consider some counter measures (Amoroso, 2012).

1.1  Problem of Study of Contemporary cyber security practice an evidence of IT industry

Cyber threats and data breaches are getting common in society as information technology is improving and advancing. In the presence of such security threats, it is becoming difficult to make IT industry secure and data breaches controlled. Credit cards and banking system are also a point of attention for these security threats and cybercrimes. In short, cyber threats are a problem for cyber security. The research will study this problem to find out a solution.

1.2  Research objectives of Contemporary cyber security practice an evidence of IT industry

The key objectives of this research work are enlisted below:

1)      To examine the impact of unauthorized access on the cyber security

2)      To identify suspicious activities in IT industry

3)      To explain the significance of the security measures for cyber security.

1.3  Rationale of the study of Contemporary cyber security practice an evidence of IT industry

The rationale of this research study is the prime reason for conducting this research work. IT security issues are becoming a problem for the strength of the industry. IT security issues are also causing problems for customers availing services of banks and credit cards. Moreover, another reason is to identify problems which need to be controlled and managed for secure IT system (Hasib, 2014).  

1.4  Research questions of Contemporary cyber security practice an evidence of IT industry

Q1. What is the impact of unauthorized access on the cyber security?

Q2. What are the suspicious activities in IT industry?

Q3. What is the significance of the security measures for cyber security?

1.5  Significance of the study of Contemporary cyber security practice an evidence of IT industry

The current study tends to have both the theoretical and the practical implications. It will serve as the basis for the future research work. Also, it will help the managers to use the findings and the discussions of the current research work for the strategy formulation.

1.6  Hypotheses development of Contemporary cyber security practice an evidence of IT industry

The hypotheses development is as given:

H1: Unauthorized access tends to increase the cyber security threats.

H2: Suspicious activities in IT industry have a positive significant association with the cyber security threats.

H3: Effective security measures help to minimize the cyber security threats.

Chapter 2: Literature Review of Contemporary cyber security practice an evidence of IT industry

It is evident due to so many cyber-attacks that cyber-criminals are getting sophisticated with their approach, and if they continue in this fashion, then there will be more severe challenges for individuals and companies to deal with. There is a need to use the technology of automated security intelligence which keeps an automatic eye on systems, and if any vulnerability or issue is found, it is quickly detected (Gantz & Philpott, 2012). The role of AI can be crucial in placing considerable countermeasures so companies should use the essence of AI to improve cybersecurity. In addition to that, all security systems should be updated and they are placed in every aspect of the IT infrastructure so that attackers may experience resistance at every point (Shinichiro, Koji, Yoshiya, Takashi, & Yoshiaki, 2017).

2.1 Theoretical Framework of Contemporary cyber security practice an evidence of IT industry

Attached as Appendix 1 along with the questionnaire as Appendix 2.

Chapter 3: Research Methodology of Contemporary cyber security practice an evidence of IT industry

For the current research work the questionnaire regarding the cyber security will be used. It will be distributed among 350 employees of 6 IT firms. SPSS will be used to perform the tests on the data and evaluate the results. The correlation and the regression analysis will be used.

Chapter 4: Discussion and analysis of Contemporary cyber security practice an evidence of IT industry

The SPSS results will be helpful to determine if any technology is used on a small scale, its issues and problems can also be small, but when things have become huge part of daily life and businesses as information technology has become, then its relevant issues are obvious to happen. That’s why it is critical for individuals and companies to stay alert and come up with various countermeasures so that they can avoid cyber-attacks in the first place, and if they do happen, then they must have a plan to deal with those threats (Djekic, 2019; Bauman, Toomey, & Walker, 2013).

Chapter 5: Conclusion of Contemporary cyber security practice an evidence of IT industry

            In the end, it can be said that cybersecurity is one of the biggest concerns of recent times, and if considerable countermeasures will not be taken by stakeholders, then they may face severe consequences. The individuals, companies, and governments should come up with policies and systems to protect their data and sensitive information by developing and implementing above mentioned countermeasures because this is the only way to effectively deal with cybersecurity issues.

References of Contemporary cyber security practice an evidence of IT industry

Amoroso, E. (2012). Cyber Attacks: Protecting National Infrastructure, STUDENT EDITION (illustrated Edition ed.). Elsevier.

Bauman, S., Toomey, R. B., & Walker, J. L. (2013). Associations among bullying, cyberbullying, and suicide in high school students. Journal of Adolescence, 36, 341-350.

Djekic, M. D. (2019). Some Countermeasures to cyber attacks. Retrieved from https://www.cyberdefensemagazine.com/some-countermeasures-to-cyber-attacks/

Gantz, S. D., & Philpott, D. R. (2012). FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security. Newnes.

Hasib, M. (2014). Cybersecurity Leadership: Powering the Modern Organization. Tomorrow's Strategy Today, LLC.

Shinichiro, N., Koji, K., Yoshiya, K., Takashi, Y., & Yoshiaki, S. (2017). Countermeasures against Unknown Cyberattacks Using AI. NEC Technical Journal, 12.

Appendix of Contemporary cyber security practice an evidence of IT industry

The purpose behind conducting this survey is to meet up the objectives of this research. It will take almost 10 minutes to fill out this questionnaire. It is assured that the information will be kept confidential and anonymous to others. For the completion of research work, your assistance is required. All of your efforts are highly appreciated.

Name (optional)

Age:  a) 18-24             b) 25-34 years             c) 35-44 years             d) 45 or above

Gender: a) Male         b) Female

Educational Level: a) Bachelor           b) Masters     c) M-Phil       d) Others

Employment status: a) Private officials b) Government officials   c) others    

For the said questionnaire five-point likert scale is used. It ranges from 1 to 5. Here, 

Strongly Disagree

1

Disagree

2

Neutral

3

Agree

4

Strongly Agree

5

Kindly provide your response for each of the given statements:

 

Sr.#

 

Statements

SD

1

D

2

N

3

A

4

SA

5

 

 

Unauthorized Access:

 

UA1

Unauthorized access tends to increase the cyber security threats.

 

 

 

 

 

 

UA2

The digital assets are manipulated through the unauthorized access.

 

 

 

 

 

 

 

Suspicious Activities:

 

SA1

Unusual traffic on a site is perceived to be the suspicious activity.

 

 

 

 

 

 

SA2

A process or task if takes more time than normal is considered a threat for the cyber security.

 

 

 

 

 

 

 

Security measures:

 

 

 

 

 

 

SM1

The use of effective security policies help to detect and prevent the threats.

 

 

 

 

 

 

SM2

Security measures help to avoid the manipulation, deletion or modification of the data.

 

 

 

 

 

 

 

Cyber Security:

 

 

 

CS1

Cyber security helps in the identification of the thefts and the ransomware attacks .

 

 

 

 

 

 

CS2

The data breaches can better be avoided through the cyber security.

 

 

 

 

 

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Rated Expert

ONLINE

Top Rated Expert

1869 Orders Completed

ECFX Market

ONLINE

Ecfx Market

63 Orders Completed

Assignments Hut

ONLINE

Assignments Hut

1428 Orders Completed