Misty And Yesenia Have A Group Of Base Ten Blocks

Posted By Admin @ Mar 02, 2022

Tittle: Report on Contemporary cyber security practice an evidence of IT industry

Report

IT

APA

By: ABC

Dated:

Abstract of Contemporary cyber security practice an evidence of IT industry

Cybersecurity has turned out as the most threatening risk for business nowadays. Along with the growth of Information Technology, cybersecurity has also emerged and even has ranked as the top 10 threats toward the business in these modern days. The digital world has triggered the rise of cyber-attacks, and for this reason, tech-focused companies have started to recognize the need for implementing or improving cybersecurity systems to secure their business. Implementing a Cyber Security into the company now defines as managing with a developing role; facing the new demands of visibility into business operations, also the new expectations for information and privacy protection. This research covers a complete Contemporary cybersecurity practice evidence of IT industry.

Contemporary cyber security practice an evidence of IT industry

Chapter 1: Introduction of Contemporary cyber security practice an evidence of IT industry

It is a fact that cyber-attacks are a big threat to infrastructure and systems of companies, individuals and government. The use of technology is increasing with the passage of time, and this increased use is also coming up with several issues and vulnerabilities in the information technology systems. Keeping the cyber security attacks in mind, where credit cards data has been stolen, ATMs are not working, and mutual fund companies are unable to operate; all of them need to consider some counter measures (Amoroso, 2012).

1.1 Problem of Study of Contemporary cyber security practice an evidence of IT industry

Cyber threats and data breaches are getting common in society as information technology is improving and advancing. In the presence of such security threats, it is becoming difficult to make IT industry secure and data breaches controlled. Credit cards and banking system are also a point of attention for these security threats and cybercrimes. In short, cyber threats are a problem for cyber security. The research will study this problem to find out a solution.

1.2 Research objectives of Contemporary cyber security practice an evidence of IT industry

The key objectives of this research work are enlisted below:

1) To examine the impact of unauthorized access on the cyber security

2) To identify suspicious activities in IT industry

3) To explain the significance of the security measures for cyber security.

1.3 Rationale of the study of Contemporary cyber security practice an evidence of IT industry

The rationale of this research study is the prime reason for conducting this research work. IT security issues are becoming a problem for the strength of the industry. IT security issues are also causing problems for customers availing services of banks and credit cards. Moreover, another reason is to identify problems which need to be controlled and managed for secure IT system (Hasib, 2014).

1.4 Research questions of Contemporary cyber security practice an evidence of IT industry

Q1. What is the impact of unauthorized access on the cyber security?

Q2. What are the suspicious activities in IT industry?

Q3. What is the significance of the security measures for cyber security?

1.5 Significance of the study of Contemporary cyber security practice an evidence of IT industry

The current study tends to have both the theoretical and the practical implications. It will serve as the basis for the future research work. Also, it will help the managers to use the findings and the discussions of the current research work for the strategy formulation.

1.6 Hypotheses development of Contemporary cyber security practice an evidence of IT industry

The hypotheses development is as given:

H1: Unauthorized access tends to increase the cyber security threats.

H2: Suspicious activities in IT industry have a positive significant association with the cyber security threats.

H3: Effective security measures help to minimize the cyber security threats.

Chapter 2: Literature Review of Contemporary cyber security practice an evidence of IT industry

It is evident due to so many cyber-attacks that cyber-criminals are getting sophisticated with their approach, and if they continue in this fashion, then there will be more severe challenges for individuals and companies to deal with. There is a need to use the technology of automated security intelligence which keeps an automatic eye on systems, and if any vulnerability or issue is found, it is quickly detected (Gantz & Philpott, 2012). The role of AI can be crucial in placing considerable countermeasures so companies should use the essence of AI to improve cybersecurity. In addition to that, all security systems should be updated and they are placed in every aspect of the IT infrastructure so that attackers may experience resistance at every point (Shinichiro, Koji, Yoshiya, Takashi, & Yoshiaki, 2017).

2.1 Theoretical Framework of Contemporary cyber security practice an evidence of IT industry

Attached as Appendix 1 along with the questionnaire as Appendix 2.

Chapter 3: Research Methodology of Contemporary cyber security practice an evidence of IT industry

For the current research work the questionnaire regarding the cyber security will be used. It will be distributed among 350 employees of 6 IT firms. SPSS will be used to perform the tests on the data and evaluate the results. The correlation and the regression analysis will be used.