It is a fact that cyber-attacks are a big threat to infrastructure and systems of companies, individuals and government. The use of technology is increasing with the passage of time, and this increased use is also coming up with several issues and vulnerabilities in the information technology systems. Keeping the cyber security attacks in mind, where credit cards data has been stolen, ATMs are not working, and mutual fund companies are unable to operate; all of them need to consider some counter measures.
If any technology is used on a small scale, its issues and problems can also be small, but when things have become huge part of daily life and businesses as information technology has become, then its relevant issues are obvious to happen. That’s why it is critical for individuals and companies to stay alert and come up with various countermeasures so that they can avoid cyber-attacks in the first place, and if they do happen, then they must have a plan to deal with those threats.
Cyber security is one of the biggest concerns of recent times, and if considerable countermeasures will not be taken by stakeholders, then they may face severe consequences. The individuals, companies, and governments should come up with policies and systems to protect their data and sensitive information by developing and implementing above mentioned countermeasures because this is the only way to effectively deal with cyber security issues.
The companies are required to ensure that they are following the policy guidelines provided by the government and experts to keep countermeasures in their cyber security systems. If they will follow the policy guidelines and come up with a comprehensive strategy, then they has been in a better position to resolve vulnerabilities in their systems, and if something wrong happens, they would be better in making a response to those cyber-attacks.
Cyber security has turned out as the most threatening risk for business nowadays. Along with the growth of Information Technology, cyber security has also emerged and even has ranked as the top 10 threats toward the business in these modern days. The digital world has triggered the rise of cyber-attacks, and for this reason, tech-focused companies have started to recognize the need for implementing or improving cyber security systems to secure their business. Implementing a Cyber Security into the company now defines as managing with a developing role; facing the new demands of visibility into business operations, also the new expectations for information and privacy protection. This research covers a complete Contemporary cyber security practice evidence of IT industry.
Cyber threats and data breaches are getting common in society as information technology is improving and advancing. In the presence of such security threats, it is becoming difficult to make IT industry secure and data breaches controlled. Credit cards and banking system are also a point of attention for these security threats and cybercrimes. In short, cyber threats are a problem for cyber security. Keeping the same in view, the researcher planned to conduct a study to analyze the selected contemporary cyber security practices namely unauthorized access[DMK9] [KA10] , suspicious activities [DMK11] [KA12] and security measures, being implemented in the IT sector of UAE, and their impact on overall cyber security phenomenon
The key objectives of this research work are enlisted below:
1) To examine the impact of unauthorized access [DMK15] [KA16] on the cyber security [DMK17] [KA18]
2) To identify suspicious activities in IT industry [DMK19] [KA20]
3) T.
[DMK1]It is not yet a contribution until the research is completed
[KA2]Basis of current research study as mentioned it was not found yet so it’s part of research contribution
[DMK3]Use the research objective to write the significance of the research
[KA4]Will provide the significance of the research
[DMK5]I do not think so
[KA6]This research will be specific for Cyber security gaps as mentioned in Title and that would benefit for IT firms
[DMK7]This part should consist of
1. Current issues/happenings relating to cyber security
2. Research gap identified in the literature (only from journal artcles).
[KA8]We can add some of use case as Ukraine cyber attack as refer to specify the gaps that would be refer to current issue related to Cyber security. Point 2 will also cover as mentioned above
[DMK9]Is this a practice? If it is by who?
[KA10]Human error does such mistake to provide the unauthorized access that cause big damaged in environment that also cyber security gap
[DMK11]Is this also a practice?
[KA12]Suspicious activities consider and identify the security gaps either its inside or outside the environment that will help us to identify and implement the best practice as industry standards.
[DMK13]These objectives should be modified
[KA14]Please clarify what modification require
[DMK15]How will you measure unauthorized access?
[KA16]Basis of Use case as refer above ukine attacks
[DMK17]Is the impact more than security bridge and cyber-attack? These are known facts
[KA18]Yes, these are known facts and that cause the security breaches which are causes cyber attacks
[DMK19]Are you sure the suspicious activities in the IT industry are not known?
[KA20]These are not known activities if its known that security engineer pre-define the best security to avoid and blocked any suspicious attack or activities in environment
CS 340 Milestone One Guidelines and Rubric Overview: For this assignment, you will implement the fundamental operations of create, read, update,
Retail Transaction Programming Project Project Requirements: Develop a program to emulate a purchase transaction at a retail store. This
7COM1028 Secure Systems Programming Referral Coursework: Secure
Create a GUI program that:Accepts the following from a user:Item NameItem QuantityItem PriceAllows the user to create a file to store the sales receip
CS 340 Final Project Guidelines and Rubric Overview The final project will encompass developing a web service using a software stack and impleme