Cyber security introduction | Information Systems homework help

[ad_1]

To gather the information for my topic the following keywords such as cybersecurity, phishing, ransomware, privacy, hacking, software attacks, firewall, malicious attack, cybersecurity risks, and data integrity was used in the Google Scholar database. In addition, I also used the APU Library’s databases for peer reviews articles related to my topic.
I chose cybersecurity as my research topic to broaden my knowledge of protecting computer operating networks, systems, and data from cyber-attacks. Howarth (2021) suggests cybersecurity has become vitally important to enhance cyber reliance amidst increasingly advanced cyber threats, especially during the Covid-19 pandemic. Willis Towers Watson (2020) reports that phishing emails increased by 350% from January 2020. Consequently, we need technical skills on how to monitor systems and mitigate threats when they occur. Focusing on various cybersecurity issues, including security-related incidences, types of cyberattacks, costs associated with attacks, and the growing importance of cybersecurity in the digital economy, the articles will teach me the best security measures and how to implement them.
Cybersecurity threats are part of our daily lives in today’s connected world. We are mostly connected to the Internet through tablets, smartphones, smart TV, laptops, desktops, home routers, and high-end cars. While being connected to the Internet allows us to search for information, shop online,  pay bills, enjoy music, or watch videos, connection to these devices increases our risks to cyber attacks. An example of cyber attacks I encounter on my day-to-day operation is phishing scams. I frequently find phishing scams such as fake invoice scams, PayPal scams, congratulation messages from HR scams, and account email upgrade scams in my email. This calls for the need to develop high technical expertise, stay updated on the security events and how cybercriminals operate alongside a high analytical mind and creative thinking.
Some of the questions I will consider about my topic include:
1). How can individuals, business companies, and countries protect their computer networks from cyber threats?
2). What are the best solutions to help mitigate cybersecurity risks?
3). How can organizations stay informed on the cyber threat landscape?
4). How have cybersecurity threats impacted organizations? 
Cybersecurity threats have increasingly become major issues over the last few years. Cyber attacks such as ransomware, phishing attacks, cloud attacks, software vulnerabilities, and Internet of Things attacks have dramatically increased during the Covid-19 pandemic. Notably, the pandemic has forced many organizations to shift their daily operations to online platforms, presenting an opportunity for cybercriminals to exploit most types of cyber attacks. Venkatesha et al. (2021) report that ransomware attacks have become the most common type of attacks than other cyber attacks due to their potential for monetary gains. Bar (2021) further supports that ransomware incidents in the manufacturing sector increased by 156% from the first quarter of 2019 to 2020, demanding a laptop maker of $17 million and an additional $ 34 million from Taiwanese electronic companies.
Some of the possible independent variables in this study are threats, risks, and cybersecurity policies. Dependent variables include the security of computers, operating systems, communication systems, people security, and other elements for ensuring data security. To solve the problem of the study and achieve its objectives, the study will test the following hypotheses. The first hypothesis is that effective management of security systems ensures the protection of information. The study also hypothesizes that identifying potential threats and risks of information systems has positive impacts on information security. The third hypothesis is that clarifying security policies is positively associated with improved information security.
The lack of relevant results from Google search is one of the key challenges I encountered during my web search.  Although experts say Google has everything, it is not entirely accurate in showing relevant results and more extensive sources for literature review studies.  Due to redundant information, it was challenging to sort information for my reference list page. Besides, it wasn’t easy to properly manage the most prominent researchers of the past and current insightful researchers. This made it difficult to which resource to use and what information to retrieve from each resource.
References
Bar, J.G. (2021). Protecting Manufacturing Systems from Cyber Attacks. Faulkner Information

Services.

file:///C:/Users/Orlando/Documents/Master%20Degree%20APU/Information%20Technology/Course/Research%20Methods/Week%202/Peer%20Review%202_ProtectingManufacturingSystemsfromCyberAttacks0521.pdf

Howarth, F. (2021). EU Cybersecurity Strategy for the Digital Decade.  Faulkner Information

Services.

file:///C:/Users/Orlando/Documents/Master%20Degree%20APU/Information%20Technology/Course/Research%20Methods/Week%202/Peer%20Review%201_EUCybersecurityStrategyfortheDigitalDecade.pdf

Venkatesha, S., Reddy, K. R., & Chandavarkar, B. R. (2021). Social Engineering Attacks During
the COVID-19 Pandemic. SN computer science, 2(2), 1-9. DOI

https://link.springer.com/article/10.1007%2Fs42979-020-00443-1

Williams, C. M., Chaturvedi, R., & Chakravarthy, K. (2020). Cybersecurity risks in a pandemic.

Journal of Medical Internet Research, 22(9)

https://www.jmir.org/2020/9/e23692

Willis Towers Watson. (2020). Cybersecurity risks during a pandemic.

https://cmcd-website.s3.amazonaws.com/pdfs/files/331/Cyber-security-risks-during-a pandemic_(3).pdf?1595498681

[ad_2]

Homework helper

Leave a Comment

Your email address will not be published.