Introduction To Research Assignment
Introduction To Research Assignment
Group: 2
Background:
Cyber security is the condition or process of safeguarding and recovering networks, devices, and programs
from all types of cyberattacks (MaryvilleUniversity, 2022). Cyberattacks are a growing threat to businesses,
employees, and consumers (MaryvilleUniversity, 2022). They may be meant to gain access to or delete
sensitive data, as well as to extort money (MaryvilleUniversity, 2022). Cybersecurity is crucial because it
safeguards all types of data against theft and loss. Sensitive data, personally identifiable information (PII),
protected health information (PHI), personal information, intellectual property, data, and government and
business information systems are all included (MaryvilleUniversity, 2022). Without a cybersecurity
program, your firm would be unable to protect itself against data breach efforts, making it an easy target
for thieves (MaryvilleUniversity, 2022).
Security is concerned with the protection of data (MaryvilleUniversity, 2022). Security refers to the
prevention of unwanted data access. We implemented security safeguards to limit who has access to the
information. Privacy is more difficult to establish, in part because user-specific information might
potentially be secure data (MaryvilleUniversity, 2022).
Data in the business world is more fragile than ever before (Symquest, 2022). Cyber security is essential for
the smooth operation of your organization, but it is also crucial for the protection of your customers'
information (Symquest, 2022). Following IT best practices entails more than just using cutting-edge
technology; it also entails staying ahead of dangers and calamities that may bring your business to a
standstill (Symquest, 2022). It is beneficial to employ a layered security paradigm while developing cyber
security processes (Symquest, 2022). The internet is the starting point for this strategy, and your workers
are the finish line. Use this guide to assess how effectively your organization's existing IT security processes
are doing (Symquest, 2022).
Research Problem
Security is a difficult exercise between the aggressor and the protection. Sadly, that balance is rarely static.
Changes in innovation affect the two sides (MaryvilleUniversity, 2022). Society utilizes new innovation to
decrease what I allude to as the extent of surrender, for sure aggressors can pull off, while assailants utilize
new advances to raise it (MaryvilleUniversity, 2022). The difference in how the two gatherings incorporate
new innovation is charming.
With reason, cybersecurity is a major priority for today's company owners and IT leaders. According to
research issued by the business Risk Based Security, 36 billion records were exposed due to data breaches
in the first half of 2020 alone (MaryvilleUniversity, 2022). Hackers are aware of typical weaknesses that
afflict businesses and organizations, which keeps cybersecurity experts on their toes. As the capacity to
access cyberspace rises as a result of technological advancements, so will the number of cybersecurity
challenges that businesses may confront (MaryvilleUniversity, 2022).
Cybersecurity breaches can occur at any moment and in any company (MaryvilleUniversity, 2022). In 2020,
well-known companies including as Marriott, MGM Resorts, Twitter, and Magellan Health were all victims
of cyber assaults. However, hackers do not only target heavyweights (MaryvilleUniversity, 2022). According
to Verizon Business' 2020 Data Breach Investigations Report, small firms were engaged in more than one
out of every four data breaches (MaryvilleUniversity, 2022). These assaults can be costly. According to a
2019 Hiscox analysis, the average cost of a cyber assault is roughly $200,000. This economic impact has
caused widespread worry, particularly among small company owners (MaryvilleUniversity, 2022).
Preventing these assaults is crucial in terms of money. In today's company world, there are various distinct
cybersecurity risks to be aware of – ones that only a seasoned cybersecurity specialist may be able to assist
avert (MaryvilleUniversity, 2022).
Relevance/Motivation
Companies can benefit from threat intelligence research in security. It has the potential to inspire
enterprises to develop protective policies and systems that are anticipatory rather than reactive. Working
on early threat detection and establishing effective problem-solving techniques are two aims of threat
intelligence. Many areas of threat intelligence revolve around how researchers may obtain various forms
of information regarding potential threats–ideally before they occur. Typically, research efforts focus on
broad PII (personally identifiable information) categories derived from deep and dark web data. The data
comprises a wide range of information, from server traffic to exposed passwords. However, there is
frequently a tremendous overflow of data, and it is up to threat researchers to determine what is
important and how. Broad PII research strategies, in effect, lose out on what tailored inquiries in breach
exposure data and compromised credentials may give.
Research Questions
How can we know whether our security has been penetrated and our data has been compromised?
How do we detect the breach?
How do we get rid of the breach?
How do we make sure that we never get breached again?
Bhattacharyya, S., 2017. De Gruyter Frontiers in Computational Intelligence. vol 3 ed. Boston: Walter de
Gruyter.
Cheruvu, S., Kumar, A., Smith, N. & Wheeler, D. M., 2020. Demystifying Internet of Things Security. USA: s.n.
Duncan, B. & Bratterud, A. H. a. A., 2017. Cloud Cyber Security: Finding an Effective Approachwith
Unikernels. In: Cloud Cyber Security. UK: University of Aberdeen, p. 44.
Lera, F. J. R., Guerrero, Á. M. & Llamas, V. M. O. a. C. F., 2017. Cybersecurity of Robotics and Autonomous
Systems:Privacy and Safety. In: Cybersecurity of Robotics and Autonomous Systems. s.l.:s.n., pp. 75-77.
Schuessler, J. H., 2009. GENERAL DETERRENCE THEORY: ASSESSING INFORMATION SYSTEMS. NORTH TEXAS:
UNIVERSITY OF NORTH TEXAS.
Symquest, 2022. The Complete Guide To Cyber Security for Businesses. [Online]
Available at: https://www.symquest.com/cyber-security-for-business/
[Accessed 19 April 2022].
Zarger, N. K. S. a. H., 2017. Machine Learning in Application Security. In: Machine Learning in Application
Security. Duba: BITS Pilani‐Dubai Campus, p. 61.