You are on page 1of 25

Cyber Security

Student Name
Course
ID
Instructor
Table of Content
• Introduction • Customer Development
• Components of Cyber Security • The Micro Environment
• Importance of Cyber Security • The Macro Environment
• Types of Cyber Security • The Market Environment
• Opportunity Identification • Evaluation of Competition
• Design thinking • Opportunities and Threats
• Idea Evaluation
• Strategic Planning
• Product
• Sources of capital
• Working of the product
• References
• Market Engagement
Introduction
• Cyber security is the process of protecting systems, programs and
•networks from security attacks
Cyber Security
• The security attacks can be in form of
a. Business interruption
b. Changing programs
c. Stealing money
d. Information destroying
e. Accessing information
• Cybersecurity is hard to implement
• There are few cybersecurity experts, and attackers are becoming more
creative
Components of Cyber Security
• There are various protection layers on the programs, computers,
networks and systems.
• Cybersecurity is made up of;

• People

• Technology

• Processes
• Effective cybersecurity system must integrate all the three components
Components of Cyber Security (continued)
1. People 2. Processes 3. Technology

• Have a framework to management


• Understand Cyber Security • Tools for security attack protection
security attacks
principles • Protecting • Protect endpoint devices e.g.
• Use strong password • Detecting attacks computers, and routers
• Back up data • Identifying attacks • Use Malware protection, Firewalls
• Careful about email links • Responding and recovering and Antiviruses
Importance of Cyber Security

• Understanding negative effects of


cyber attacks
• Protecting important
infrastructure like hospitals and
banks
• Researching on new cyber
security attacks.
• Strategizing cyber attacks
Types of Cyber Security Threats

1. Phishing 2. Ransomware
• Emails or texts same • Malicious software that
as those of reliable blocks access to
sources computer until payment
• For stealing sensitive is made
information like credit • Using antivirus and
card details malicious apps
• Use technology to protection
filter the malicious
emails.
Types of Cyber Security Threats (Continued)

3. Malware 4. Social Engineering


• Software that can gain • Tactic used to trick
computer access or someone into revealing
cause damage sensitive information
• Use technology to • Mostly combined with
filter the malicious the other threats.
emails.
Opportunity Identification
• There is instances of people installing
malicious software
• Some people can be careless and end up
installing a software without understanding
how it works
• There is no software which describes the
working of a program being installed
• I want to design a software that will analyze a
program and detect what the software does
• The software will describe the function of the
software before the program is installed.
• This will reduce cyber security threats.
Design Thinking
• Empathy- There are several cyber security
threats than experts
• Define- People and Organizations must protect
themselves from security threats, which lacks a
reliable solution.
• I want to create a program that detects the
functions of an application and tells a user,
before it is installed.
• I will prototype the working of the software on
a sample computer
• I will test the software by trying to install a
malicious program and the software will
describe the function of the program.
Idea Evaluation
• There is no loss as
• No market Capital risk
I will not use a lot
conditions will of resources to
affect my idea make the software

Market Risk
Risk Technological
Evaluation Risk

• My idea will be
used by top
• Will use a proper
technological
management strategy
Team Risk companies
to overcome team risks
Product
• It is a software
• It will be installed in computers, laptop, tablets, smart TVs and mobile
phones
• The software will have free trial version and then users will need to
pay after some time
• It will be available on all Application Stores (Google Store, AppStore,
Microsoft Store and Apple Store)
Working of the Product
• The software fetches data about the application
using algorithms
• The data is processed and interpreted by the user Malicious Software!!
computer
• The details about the software being installed is
then displayed on the user’s screen in form of
texts. Secure Software
• A malicious software will be displayed using red
fonts, while a normal software text will be in black
or white.
Market Engagement

• Research about the market

• Interviewing software companies around UAE

• Asking them the way they install new applications

• Asking them how the method they use is effective in managing cyber
security threats
Customer Development

• My target customers are organizations using Computers and software


• I will inform various companies about the effectiveness of the
application
• I will tell them about the free trial
• The free trial will be used to test the working of the product
• If they are satisfied about the working of the product, then they can
pay subscription fees.
• I will do digital marketing to reach other markets, outside UAE.
The Macro Environment

• The political environment oof the UAE is favorable for business


• The Economic conditions are favorable due to favorable taxation laws
• The use of technological devices is high in the UAE
• There is need for environmental conservation measures to protect the
environment
• The legal procedures for starting a company are favorable
The Micro Environment

• Mission Statement
The business mission is improving Cyber Security
practices trough advanced protection services.
• Vision Statement
To become a global Cyber Security service provider
and improve organizational performance
• Corporate Values
i. Honesty
ii. Integrity
iii. Openness
The Market Environment

• Target customers are organizations that


need cyber security
• Examples include banks, schools, real
estate companies and technological
companies
• The supply chain include technological
experts to help in the process of
developing the software
Evaluation of Competition
Porter’s Five Forces Analysis
• Suppliers’ Bargaining Power- Suppliers are tech experts
and there are several training institutions
• Buyer’s Bargaining Power- There will be no substitute
product, so buyers will buy from the company
• Competition Intensity- the software will involve high
differentiation degree, making it unique
• Threat of New Entrants- New entrants will enter the
markets due to favorable investment environment in
the UAE.
• Threat of Substitute Goods- the product is highly
differentiated and has unique features.
Opportunities and Threats
Opportunities Threats
1. Advancement in Technology, the 1. Competition from well established

increased use of Artificial Intelligence and technological companies, i.e. Google

Machine Learning by companies 2. Political instability like the war in

2. Good Economic conditions of UAE Ukraine will reduce markets for the

3. Favorable Taxation policies concerning product.

new businesses in the UAE 3. Language barriers due to wider use of

Arabic language.
Strategic Planning
• The strategic plan will include three phases
Phase 1
SMART Objectives
• Includes setting objectives that are specific, realistic, attainable, measurable and time-
bound
• The business should make a profit of AED 500,000 by 2024
Phase 2
Development of the Business Plan
• The business plan will outline various activities to be done within a particular time
Phase 3
Implementation
• Formulate a management team to ensure the business plan is implemented
Sources of Capital
Friends and
• Cyber Security Family

Cyber
Investment Venture
Banks Security Capital
Software

Sponsors
Sources of Capital (continued)
Cyber Security

• Ask friends and family for donations


• Seek financial help from investment banks like
Invest Bank
• Present the idea to investors who will invest in
the business
• Look for sponsors in the UAE and other
countries
References
• Albettar, M. (2019). Evaluation and assessment of cyber security based on Niagara
framework: a review. Journal of Cyber Security Technology, 3(3), 125–136.
https://doi.org/10.1080/23742917.2019.1627699
• Caprotti, F. (2012). Environment, Business and the Firm. Geography Compass, 6(3),
163–174. https://doi.org/10.1111/j.1749-8198.2012.00478.x
• Efthymiopoulos, M. P. (2019). A cyber-security framework for development, defense
and innovation at NATO. Journal of Innovation and Entrepreneurship, 8(1).
https://doi.org/10.1186/s13731-019-0105-z
• Havlíček, J., Pelikán, M., & ŠUbrt, T. (2012).   New businesses for small and
medium entrepreneurs (SMEs) in the Renewable Energy Sources (RES). Agricultural
Economics (Zemědělská Ekonomika), 58(No. 9), 425–432.
https://doi.org/10.17221/116/2011-agricecon
• Lehto, M. (2013). The Cyberspace Threats and Cyber Security Objectives in the Cyber
Security Strategies. International Journal of Cyber Warfare and Terrorism, 3(3), 1–18.
https://doi.org/10.4018/ijcwt.2013070101
References
• Rademaker, M. (2016). Assessing Cyber Security 2015. Information & Security: An
International Journal, 34, 93–104. https://doi.org/10.11610/isij.3407
• Rizov, V. (2018). Information Sharing for Cyber Threats. Information & Security: An
International Journal, 39(1), 43–50. https://doi.org/10.11610/isij.3904
• Roosa, S. A. (2016). From the Editor: Strategic Planning. Strategic Planning for Energy
and the Environment, 36(2), 5–7. https://doi.org/10.1080/10485236.2016.11771071
• Sherf, E. (2022). The importance of cyber security in journalism. Network Security,
2022(4). https://doi.org/10.12968/s1353-4858(22)70032-3
• Souto, J. E. (2015). Business model innovation and business concept innovation as the
context of incremental innovation and radical innovation. Tourism Management, 51, 142–
155. https://doi.org/10.1016/j.tourman.2015.05.017

You might also like