please refer to the attachment
mytopic.docx
Running Head: CYBER RISK AND CYBERSECURITY CHALLENGES 1
CYBER RISK AND CYBERSECURITY CHALLENGES 2
Cyber risk and cybersecurity issues have posed numerous challenges to corporates, learning institutions, the banking industry, the healthcare industry, and government agencies. Since 2020, there has been an exponential increase in cybercrime, which has seen the rise of cybercrime from 15% in 2017 to over 50%, as per 2020 statistics on the economic impacts of cybercrimes. Various studies have shown that between 2014 and 2017, the economic effects of cybercrime cost the world between 445 US dollars and USD 608 billion (Sandhu, 2021). This figure represents $100 billion more than the lowest worldwide cost of cybercrime before 2014. The economic impacts of cybercrime activities are currently $1 trillion, and the trend is worsening.
Based on the above statistics on the rate of increases and the economic impacts of cybercrime, it is, therefore, the objective of my project on the topic selected for the dissertation on cyber risks and cybersecurity challenges to focus on better ways of helping business entities, the healthcare industry, as well as learning institutions, come up with evidence-based strategies of dealing with cyber threats to eliminate major economic consequences that are linked to cyber threats and cybersecurity issues (Sandhu, 2021). Concerning the selected topic- the primary focus of the dissertation will be launching extensive research on the major cyber risks and cybersecurity issues impacting corporates, banks, and healthcare faculties, the types of cyber-attacks that are common, and the increased vulnerabilities of systems to cyber-attacks, provide extensive analysis on the key impacts of cyber-attacks on business and vulnerable organization and as well discuss various strategies that can be employed to reduce cyber risk and cybersecurity issues.
The study will focus on majorly focus on discussing cyber security threats impacting business entities in this digital era. Among the primary areas of focus concerning cyber security risks and threats include risks such as internal risk factors, HTML security issues, Advanced Persistent Threats (abbreviated as APTs), hazards associated with BYOD -bring your device, cyber risk on Cloud computing services, Botnets attacks as well as social engineering. Essentially, studies have shown that a lack of adequate knowledge and understanding of the major types of cybersecurity threats, risk factors, and types of cyber-attacks has progressively led to increasing challenges of cybercrime (Cremer et al., 2022).
This, therefore, means that for business entities and critical industries such as the healthcare industry and banking industry to eliminate currency cyber threats effectively, there is a need to create awareness of the existence of a wide range of cyber risks and hazards along with network theory impacts to equip their employees and IT determinant with necessary tools and knowledge on how to overcome potential cyber threats (Cremer et al., 2022). Additionally, the project will focus on discussing how detrimental cyber threats and attacks can be to corporates concerning legal issues, compliance challenges, and economic impacts to enable corporate to come up with policies and strategies to embrace best cybersecurity practices that protect their systems and IT infrastructure through implementation of efficacious strategy for cybersecurity. The primary objective and goals of the project are to provide recommendations such as the establishment of an incident response plan, progressive cyber security threats assessment and monitoring, creation of network access control, minimization of access to confidential data and systems, as well as the creation of patch management as the approaches for mitigating cybersecurity challenges (Cremer et al., 2022).
References
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: A systematic review of data availability.
The Geneva Papers on Risk and Insurance – Issues and Practice
,
47
(3), 698??736.
https://doi.org/10.1057/s41288-022-00266-6
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). undefined.
The Geneva Papers on Risk and Insurance – Issues and Practice
,
47
(3), 698-736.
https://doi.org/10.1057/s41288-022-00266-6
Sandhu, K. (2021). Advancing cybersecurity for digital transformation.
Handbook of Research on Advancing Cybersecurity for Digital Transformation
, 1-17.
https://doi.org/10.4018/978-1-7998-6975-7.ch001
week3.2question.docx
Overview:
While you are in the infancy of thinking about your dissertation topic, it helps to begin with the end in mind. During your literature review, you will uncover a gap in the scholarship on your proposed topic. While this gap may be content or methodological-specific, it is critical to think about the type of methodology your study will employ as you begin your search. Therefore, you will review the University of the Cumberland??s doctoral research handbook for approved research designs. You will not be ??locked in? to your choice until your IRB is approved in DSRT 839, but you should have a general idea of how you will collect data on your proposed topic.
Directions:
1. Review the appendices of the doctoral research handbook to determine a possible research design for your study.
2. Start a new thread in this discussion board whereby you include the following:
a. One brief paragraph overview of your proposed dissertation topic.
b. One brief paragraph overview of the theories related to your topic. This should include at least one in-text citation.
c. One brief paragraph about how your topic relates to the goals of your academic program.
d. One brief paragraph about the methodology and study design you believe you will use with the topic after reviewing the approved designs in the appendix of the doctoral research handbook. This paragraph should also include how you plan to collect data on this topic.
e. Reference list for any in-text citations included.
mytopic.docx
Running Head: CYBER RISK AND CYBERSECURITY CHALLENGES 1
CYBER RISK AND CYBERSECURITY CHALLENGES 2
Cyber risk and cybersecurity issues have posed numerous challenges to corporates, learning institutions, the banking industry, the healthcare industry, and government agencies. Since 2020, there has been an exponential increase in cybercrime, which has seen the rise of cybercrime from 15% in 2017 to over 50%, as per 2020 statistics on the economic impacts of cybercrimes. Various studies have shown that between 2014 and 2017, the economic effects of cybercrime cost the world between 445 US dollars and USD 608 billion (Sandhu, 2021). This figure represents $100 billion more than the lowest worldwide cost of cybercrime before 2014. The economic impacts of cybercrime activities are currently $1 trillion, and the trend is worsening.
Based on the above statistics on the rate of increases and the economic impacts of cybercrime, it is, therefore, the objective of my project on the topic selected for the dissertation on cyber risks and cybersecurity challenges to focus on better ways of helping business entities, the healthcare industry, as well as learning institutions, come up with evidence-based strategies of dealing with cyber threats to eliminate major economic consequences that are linked to cyber threats and cybersecurity issues (Sandhu, 2021). Concerning the selected topic- the primary focus of the dissertation will be launching extensive research on the major cyber risks and cybersecurity issues impacting corporates, banks, and healthcare faculties, the types of cyber-attacks that are common, and the increased vulnerabilities of systems to cyber-attacks, provide extensive analysis on the key impacts of cyber-attacks on business and vulnerable organization and as well discuss various strategies that can be employed to reduce cyber risk and cybersecurity issues.
The study will focus on majorly focus on discussing cyber security threats impacting business entities in this digital era. Among the primary areas of focus concerning cyber security risks and threats include risks such as internal risk factors, HTML security issues, Advanced Persistent Threats (abbreviated as APTs), hazards associated with BYOD -bring your device, cyber risk on Cloud computing services, Botnets attacks as well as social engineering. Essentially, studies have shown that a lack of adequate knowledge and understanding of the major types of cybersecurity threats, risk factors, and types of cyber-attacks has progressively led to increasing challenges of cybercrime (Cremer et al., 2022).
This, therefore, means that for business entities and critical industries such as the healthcare industry and banking industry to eliminate currency cyber threats effectively, there is a need to create awareness of the existence of a wide range of cyber risks and hazards along with network theory impacts to equip their employees and IT determinant with necessary tools and knowledge on how to overcome potential cyber threats (Cremer et al., 2022). Additionally, the project will focus on discussing how detrimental cyber threats and attacks can be to corporates concerning legal issues, compliance challenges, and economic impacts to enable corporate to come up with policies and strategies to embrace best cybersecurity practices that protect their systems and IT infrastructure through implementation of efficacious strategy for cybersecurity. The primary objective and goals of the project are to provide recommendations such as the establishment of an incident response plan, progressive cyber security threats assessment and monitoring, creation of network access control, minimization of access to confidential data and systems, as well as the creation of patch management as the approaches for mitigating cybersecurity challenges (Cremer et al., 2022).
References
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). Cyber risk and cybersecurity: A systematic review of data availability.
The Geneva Papers on Risk and Insurance – Issues and Practice
,
47
(3), 698??736.
https://doi.org/10.1057/s41288-022-00266-6
Cremer, F., Sheehan, B., Fortmann, M., Kia, A. N., Mullins, M., Murphy, F., & Materne, S. (2022). undefined.
The Geneva Papers on Risk and Insurance – Issues and Practice
,
47
(3), 698-736.
https://doi.org/10.1057/s41288-022-00266-6
Sandhu, K. (2021). Advancing cybersecurity for digital transformation.
Handbook of Research on Advancing Cybersecurity for Digital Transformation
, 1-17.
https://doi.org/10.4018/978-1-7998-6975-7.ch001
We offer the bestcustom writing paper services. We have done this question before, we can also do it for you.
Why Choose Us
- 100% non-plagiarized Papers
- 24/7 /365 Service Available
- Affordable Prices
- Any Paper, Urgency, and Subject
- Will complete your papers in 6 hours
- On-time Delivery
- Money-back and Privacy guarantees
- Unlimited Amendments upon request
- Satisfaction guarantee
How it Works
- Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
- Fill in your paper’s requirements in the "PAPER DETAILS" section.
- Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
- Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
- From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.