Professional Documents
Culture Documents
Student Name
Course
ID
Instructor
Table of Content
• Introduction • Customer Development
• Components of Cyber Security • The Micro Environment
• Importance of Cyber Security • The Macro Environment
• Types of Cyber Security • The Market Environment
• Opportunity Identification • Evaluation of Competition
• Design thinking • Opportunities and Threats
• Idea Evaluation
• Strategic Planning
• Product
• Sources of capital
• Working of the product
• References
• Market Engagement
Introduction
• Cyber security is the process of protecting systems, programs and
•networks from security attacks
Cyber Security
• The security attacks can be in form of
a. Business interruption
b. Changing programs
c. Stealing money
d. Information destroying
e. Accessing information
• Cybersecurity is hard to implement
• There are few cybersecurity experts, and attackers are becoming more
creative
Components of Cyber Security
• There are various protection layers on the programs, computers,
networks and systems.
• Cybersecurity is made up of;
• People
• Technology
• Processes
• Effective cybersecurity system must integrate all the three components
Components of Cyber Security (continued)
1. People 2. Processes 3. Technology
1. Phishing 2. Ransomware
• Emails or texts same • Malicious software that
as those of reliable blocks access to
sources computer until payment
• For stealing sensitive is made
information like credit • Using antivirus and
card details malicious apps
• Use technology to protection
filter the malicious
emails.
Types of Cyber Security Threats (Continued)
Market Risk
Risk Technological
Evaluation Risk
• My idea will be
used by top
• Will use a proper
technological
management strategy
Team Risk companies
to overcome team risks
Product
• It is a software
• It will be installed in computers, laptop, tablets, smart TVs and mobile
phones
• The software will have free trial version and then users will need to
pay after some time
• It will be available on all Application Stores (Google Store, AppStore,
Microsoft Store and Apple Store)
Working of the Product
• The software fetches data about the application
using algorithms
• The data is processed and interpreted by the user Malicious Software!!
computer
• The details about the software being installed is
then displayed on the user’s screen in form of
texts. Secure Software
• A malicious software will be displayed using red
fonts, while a normal software text will be in black
or white.
Market Engagement
• Asking them how the method they use is effective in managing cyber
security threats
Customer Development
• Mission Statement
The business mission is improving Cyber Security
practices trough advanced protection services.
• Vision Statement
To become a global Cyber Security service provider
and improve organizational performance
• Corporate Values
i. Honesty
ii. Integrity
iii. Openness
The Market Environment
2. Good Economic conditions of UAE Ukraine will reduce markets for the
Arabic language.
Strategic Planning
• The strategic plan will include three phases
Phase 1
SMART Objectives
• Includes setting objectives that are specific, realistic, attainable, measurable and time-
bound
• The business should make a profit of AED 500,000 by 2024
Phase 2
Development of the Business Plan
• The business plan will outline various activities to be done within a particular time
Phase 3
Implementation
• Formulate a management team to ensure the business plan is implemented
Sources of Capital
Friends and
• Cyber Security Family
Cyber
Investment Venture
Banks Security Capital
Software
Sponsors
Sources of Capital (continued)
Cyber Security