CYBER SECURITY
3
To find out the control programs used by different organizations and businesses as cyber security
measures
Methods of investigation and implementation
For the investigate cyber security issue, data acquisition method will be appropriate to
address the research objectives as well as the research question. In this method, data will be
acquired through a filled questionnaire from different organizations and businesses around the
globe. The questionnaire will contain questions regarding the cyber security measures put in
place by the different organization. The sample size of n=300 will be used for this investigation.
The questionnaires
will be filled online, and findings collected for the security of the
organizations and institutions integrity (EBSCO, 2016).
The inclusion
criteria will be all companies, business organizations and government
institutions that are using private networking systems for their functions and integrity. The
exclusion criteria will be any business or agency that uses public
network systems for its
functions.
The findings of this project will be implemented by many organizations to ensure that
their data, systems, and networks are safe from cyber-attack. The findings will be given as
feedbacks to all organizations and institutions for them to practice according to the proposed
recommendations.
Background information
The cyber criminals use specific application from a distance that allows their access to
other systems. The applications used by cyber criminals are referred to as malware (malicious
CYBER SECURITY
4
software). The malicious
software includes viruses, worms, spyware, and Trojans (Cyber
Security Products and Services, 2016). Cyber risk assessment
is the step used by many
organizations to find out how exposed the systems to cyber-attack are. The typical cyber security
risk assessment step is identifying the various organizations' assets that can be affected which
include systems, database, and other hardware containing essential data. After identifying the
potential risks, the next step is the selection of control systems to prevent the attack.
Concerning cyber security, there are fundamentals of becoming cyber secure. These
fundamentals include management of people,
processes, and technology (Cyber Security
Products and Services, 2016). Taking into account in people management, staffing is required,
professional skills and qualifications, and component resources. Process management includes IT
audit, management of systems, governance frameworks, and best practice. The last fundamental
is technology, and it involves competence and support process. Integration of the three primary
approaches to cyber security is what makes an organization cyber secure. Technology is the
primary element in achieving the most effective cyber security. Cyber security programs include
the
use of anti-virus programs, anti-spyware and data encryption. According to the cyber
essentials, the business organizations should not only recognize the cost of software to protect
their database from malware but also consider the cost of losing the most useful information
(Dorman, 2015).
Dostları ilə paylaş: