Professional Documents
Culture Documents
Cyber Security Thesis
Cyber Security Thesis
net/publication/326191531
cyber-security-thesis
CITATIONS READS
0 53,372
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Sashan Adem on 04 July 2018.
Name:
Institutional Affiliation:
CYBER SECURITY 2
Tittle
Introduction
With the new technology development in many areas, threats have come up concerning
the security of information stored in many organizations. Cyber security is the protection of
systems in the organizations, their data and network in the cyberspace (Cyber Security Products
and Services, 2016). Cybersecurity is a critical issue for many businesses. In a business or any
organization, there are different threats associated with their systems, data, and networks. The
threats include cyber crime, cyber war, and cyber terror (Cyber Security Products and Services,
2016). Cyber security being a major problem, in many nations around the globe, research needs
to be done concerning the possible measures to mitigate the problem (EBSCO, 2016).
Research question
The research question of this proposal is: - what are the possible interventions that can be
implemented in many organizations to prevent their data, networks, and systems from cyber-
attack
To find out the possible measures that can be put in place to maintain the integrity of cyber
secure.
To investigate the measure put in place by most organizations around the globe to ensure their
To find out the control programs used by different organizations and businesses as cyber security
measures
For the investigate cyber security issue, data acquisition method will be appropriate to
address the research objectives as well as the research question. In this method, data will be
acquired through a filled questionnaire from different organizations and businesses around the
globe. The questionnaire will contain questions regarding the cyber security measures put in
place by the different organization. The sample size of n=300 will be used for this investigation.
The questionnaires will be filled online, and findings collected for the security of the
The inclusion criteria will be all companies, business organizations and government
institutions that are using private networking systems for their functions and integrity. The
exclusion criteria will be any business or agency that uses public network systems for its
functions.
The findings of this project will be implemented by many organizations to ensure that
their data, systems, and networks are safe from cyber-attack. The findings will be given as
feedbacks to all organizations and institutions for them to practice according to the proposed
recommendations.
Background information
The cyber criminals use specific application from a distance that allows their access to
other systems. The applications used by cyber criminals are referred to as malware (malicious
CYBER SECURITY 4
software). The malicious software includes viruses, worms, spyware, and Trojans (Cyber
Security Products and Services, 2016). Cyber risk assessment is the step used by many
organizations to find out how exposed the systems to cyber-attack are. The typical cyber security
risk assessment step is identifying the various organizations' assets that can be affected which
include systems, database, and other hardware containing essential data. After identifying the
potential risks, the next step is the selection of control systems to prevent the attack.
Concerning cyber security, there are fundamentals of becoming cyber secure. These
Products and Services, 2016). Taking into account in people management, staffing is required,
professional skills and qualifications, and component resources. Process management includes IT
audit, management of systems, governance frameworks, and best practice. The last fundamental
is technology, and it involves competence and support process. Integration of the three primary
approaches to cyber security is what makes an organization cyber secure. Technology is the
primary element in achieving the most effective cyber security. Cyber security programs include
the use of anti-virus programs, anti-spyware and data encryption. According to the cyber
essentials, the business organizations should not only recognize the cost of software to protect
their database from malware but also consider the cost of losing the most useful information
(Dorman, 2015).
The research period will be six months with the following programs in the timetable.
The milestone of this research is to find out how different organizations are ensuring the integrity
Month Task
January Presentation of research of research proposal for approval.
February Amending the research proposal and developing data collection tools.
Developing the sample size.
March Data collection in various organizations and institutions
April Data collection.
May Data analysis and filling of respondents gaps.
June Documentation of findings and recommendations.
Table I
CYBER SECURITY 6
References
Dorman, E. (July 01, 2015). Cyber security. Nuclear Plant Journal, 33, 4.)
http://ebscovideos.ebscohost.com/v/103100997/fbi-chief-talks-terrorism-and-cyber-
crime.htm
CYBER SECURITY 7
Appendix
Research Tools
Questionnaire