Effects of Cybersecurity

Does cybersecurity affect the operations and information of an organization? There are many questions which arise when the word cybersecurity is mentioned. Assumptions are always made about the topic. Only a small percentage of individuals understand the real meaning of the word. This is the reason why theft is done through the internet are rarely understood, and blame is placed on a few individuals. The reason why this research is necessary is to come up with ways to prevent cyber insecurity to protect the organization’s information and consecutive ensure minimal or no losses incurred. People lose money in cyber theft without even understanding the procedure used to steal the money. Therefore, the interest in this research is to identify the adverse effects of cyber insecurity to an organization and provide a solution to the problem. Organizations face insecurity both internally and externally. Some people try to hack systems of an organization to bypass some confidential privileges. Use of those privileges can destroy the image of an organization or make it lose a lot of money.

According to 2018 Top Cybersecurity Risks and Areas of Focus by Chris Olson and Jennifer Mak, there are three types of threat which are experienced in an organization. These types include common, advanced, and emerging threats. Every kind of threat is very sensitive to an organization can cause a lot of damages. Some threats cut across all variety of businesses like information leakage. Competitors are always on the watch to identify the weakness of an organization to see how it can bring it down (Nicol, 2018). Necessary measures need to be taken into consideration to prevent such attacks. This research discusses all the essential measure which can aid in the prevention of those attacks. Therefore, to determine the effects of cybersecurity, the research uses several methods of study. For instance, the following methodology will be used to collect the necessary data required for the study: questionnaires, surveying, direct observations and interviews. The interviews will take two different procedures including a phone interview and face to face. Research on documentary will also help in a historical understanding position of cybersecurity. Questionnaires will be distributed to employees of firms to gather information on cybersecurity risks. The research also uses correlational research design which involves case-control study and observations study to know what has happened to an organization which has been affected by cyber insecurity and the method they used to prevent future attacks and more importantly the effects of such attacks to their organizations (Berkman, Jona,& Soderstrom, 2018). Additionally, the study uses an experimental design to know how effective it can to prevent cybersecurity. The population will be an employee of an organization and people directly affected by the services that it offers. The study will also compare the results with other organizations providing the same services. This will help to understand the probability of risk in the organization clearly. The research will provide 20 copies of questionnaires to 35 employees and use copies which will have most related data for analysis. After completion of data collection, an analysis is done. Then, use a histogram and pie chart as data analysis tools. The research question will be: what kinds of cyber-attacks are more likely to attack our organization information? How can we prevent these attacks? How can these attacks negatively affect our operations and loses that will occur? All those questions will be answered in this study.

 

References

Berkman, H., Jona, J., Lee, G., & Soderstrom, N. (2018). Cybersecurity awareness and market valuations. Journal of Accounting and Public Policy37(6), 508-526.

Bodin, L. D., Gordon, L. A., Loeb, M. P., & Wang, A. (2018). Cybersecurity insurance and risk-sharing. Journal of Accounting and Public Policy37(6), 527-544.

Nicol, C. (2018). How do the Baltic States bolster their national resilience through cybersecurity?