You are on page 1of 8

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/326191531

cyber-security-thesis

Preprint · July 2018


DOI: 10.13140/RG.2.2.30599.50087

CITATIONS READS
0 53,372

Some of the authors of this publication are also working on these related projects:

Global Cyber Security Threat View project

What is a honeypot and why are they used? View project

All content following this page was uploaded by Sashan Adem on 04 July 2018.

The user has requested enhancement of the downloaded file.


Running head: CYBER SECURITY 1

Cyber Security Thesis Proposal

Name:

Institutional Affiliation:
CYBER SECURITY 2

Tittle

Cyber Security Research Proposal

Introduction

With the new technology development in many areas, threats have come up concerning

the security of information stored in many organizations. Cyber security is the protection of

systems in the organizations, their data and network in the cyberspace (Cyber Security Products

and Services, 2016). Cybersecurity is a critical issue for many businesses. In a business or any

organization, there are different threats associated with their systems, data, and networks. The

threats include cyber crime, cyber war, and cyber terror (Cyber Security Products and Services,

2016). Cyber security being a major problem, in many nations around the globe, research needs

to be done concerning the possible measures to mitigate the problem (EBSCO, 2016).

Research question

The research question of this proposal is: - what are the possible interventions that can be

implemented in many organizations to prevent their data, networks, and systems from cyber-

attack

Objectives and goals

To find out the possible measures that can be put in place to maintain the integrity of cyber

secure.

To investigate the measure put in place by most organizations around the globe to ensure their

firms are safe from cyber-attack.


CYBER SECURITY 3

To find out the control programs used by different organizations and businesses as cyber security

measures

Methods of investigation and implementation

For the investigate cyber security issue, data acquisition method will be appropriate to

address the research objectives as well as the research question. In this method, data will be

acquired through a filled questionnaire from different organizations and businesses around the

globe. The questionnaire will contain questions regarding the cyber security measures put in

place by the different organization. The sample size of n=300 will be used for this investigation.

The questionnaires will be filled online, and findings collected for the security of the

organizations and institutions integrity (EBSCO, 2016).

The inclusion criteria will be all companies, business organizations and government

institutions that are using private networking systems for their functions and integrity. The

exclusion criteria will be any business or agency that uses public network systems for its

functions.

The findings of this project will be implemented by many organizations to ensure that

their data, systems, and networks are safe from cyber-attack. The findings will be given as

feedbacks to all organizations and institutions for them to practice according to the proposed

recommendations.

Background information

The cyber criminals use specific application from a distance that allows their access to

other systems. The applications used by cyber criminals are referred to as malware (malicious
CYBER SECURITY 4

software). The malicious software includes viruses, worms, spyware, and Trojans (Cyber

Security Products and Services, 2016). Cyber risk assessment is the step used by many

organizations to find out how exposed the systems to cyber-attack are. The typical cyber security

risk assessment step is identifying the various organizations' assets that can be affected which

include systems, database, and other hardware containing essential data. After identifying the

potential risks, the next step is the selection of control systems to prevent the attack.

Concerning cyber security, there are fundamentals of becoming cyber secure. These

fundamentals include management of people, processes, and technology (Cyber Security

Products and Services, 2016). Taking into account in people management, staffing is required,

professional skills and qualifications, and component resources. Process management includes IT

audit, management of systems, governance frameworks, and best practice. The last fundamental

is technology, and it involves competence and support process. Integration of the three primary

approaches to cyber security is what makes an organization cyber secure. Technology is the

primary element in achieving the most effective cyber security. Cyber security programs include

the use of anti-virus programs, anti-spyware and data encryption. According to the cyber

essentials, the business organizations should not only recognize the cost of software to protect

their database from malware but also consider the cost of losing the most useful information

(Dorman, 2015).

Timetable and milestone

The research period will be six months with the following programs in the timetable.

The milestone of this research is to find out how different organizations are ensuring the integrity

of their systems, data, and networks.


CYBER SECURITY 5

Month Task
January Presentation of research of research proposal for approval.
February Amending the research proposal and developing data collection tools.
Developing the sample size.
March Data collection in various organizations and institutions
April Data collection.
May Data analysis and filling of respondents gaps.
June Documentation of findings and recommendations.
Table I
CYBER SECURITY 6

References

Cyber Security Products and Services. (2016). Itgovernance.co.uk. Retrieved 25 November

2016, from http://www.itgovernance.co.uk/cyber-security-solutions.aspx

Dorman, E. (July 01, 2015). Cyber security. Nuclear Plant Journal, 33, 4.)

EBSCO, (2016). Ebscovideos.ebscohost.com. Retrieved 26 November 2016, from

http://ebscovideos.ebscohost.com/v/103100997/fbi-chief-talks-terrorism-and-cyber-

crime.htm
CYBER SECURITY 7

Appendix

Research Tools

Questionnaire

To be filled and submitted within the give period.


All participants will be assured of their privacy and no information will be released to the public.
Kindly respond to the questions below.
Questions
What are potential cyber threats in your organization or institutions?
What measures are put in place to ensure that full cyber security integrity is being used?
What are your assessment skills in cyber-attack risks?
How do you implement changes in the organization or institutions after finding out the probable
risks?
What are the key programs used to ensure that cyber security measures are in place?

View publication stats

You might also like