Book All Semester Assignments at 50% OFF! ORDER NOW
  • Subject Code : STEP0012
  • Subject Name : Management

Introduction

Problem

Cyber security policies are majorly helpful for protecting different types of digital assets and preventing various types of online data breaches and fraud in a particular environment. As illustrated by Habibzadeh et al. (2019), the major effect of cyber security policies can be depending upon radius types of factors such as the level of awareness, implementation policy, technologies used and compliance. Analysing the overall factors, the application of cyber security policies can be effective to reduce different types of databases if the policies are regularly updated, well-designed and enforced rigorously. These policies are also effective to cover various aspects of cyber security access in control incident response risk management and authentication which provide support to the management to get a good amount of opportunity to store all the potential data in a secure database. Different types of policies have been developed by most organisations to reduce the impact of the various types of cyber security issues in a particular environment which create a huge amount of negative impact on the organisation by getting a better amount of customer base. Day by day due to the number of advanced technology launched in a particular market, cyber attacks are increasing by a certain amount which provides opportunities for cybercriminals to get a good amount of advantage from leaking the potential data of the organisation and doing online fraudulent activities. As opined by Khalid et al. (2019), due to these types of factors, conducting a rapid evidence assessment it's very much helpful to get a clear idea of the impact of front types of cyber security policies on the organisations to prevent different types of cyber security issues. Therefore the researcher has adopted this topic continuously in this REA for getting the major findings of the overall study.

Summary of State of Art

The study is majorly analysing the impact of cyber security policies on mitigating cyber security issues in organisations. Different types of cyber attacks have been used by most cyber criminals to breach data activities along with various technologies to prevent issues in the business. On the other hand, as analysed by Asghar et al. (2019), different benefits of cyber security policies on the organisation are also going to be evaluated in this REA which can be helpful for future researchers and organisations to take proper ideas about the different policies and preventive measures for doing different operations. By conducting this study, it has been gathered that the number of cyber security issues have been increased by a huge amount which creates a negative impact on the basic organisations to continue their work efficiently. Therefore, cyber security policies are very much beneficial to maintain the overall nature of the operations of different higher security issues in the environment.

Rationale

Cyber security issues are one of the major issues faced by the organisation which created negative effects in the overall area of operations. Cyber security attacks are not being considered under the home office counting rules and the computer misuse act 1990. Analysing the overall statistics about the cyber security issues in the overall UK organisations, it has been found that around 81.4% of organisations in the UK had experienced at least one cyber attack in the year between 2021-2022 (O'Driscoll, 2023). Similarly, over the last 12 months, most of the cyber attackers are using random ware attacks to do any kind of database and create major issues for the organisations. Therefore, it is very much essential for the organisation to use different types of data breaches in policies which can offer a huge amount of support to the management to get better results by preventing different cyber attacks in their organisation. Due to this reason, the researcher is conducting this study to evaluate the overall back of the types of cyber security policies of organisations to be rented online for the activities and data bridges which react to impact on the owner of the operation.

2. Study objectives

Development of research questions is very much important which provides a huge amount of support in managing the overall research. The proper management of research as per the research questions can be affected the development of the overall research. The major aim of the research is to identify the impact of cyber security policies in managing cyber security issues in the organisation. The research objectives are described below

  • To analyse the effectiveness of cyber security policy in managing the different operation
  • To identify various cyber attacks faced by the organisation in the environment
  • To evaluate the effectiveness of different strategies used by the organisation to manage the operations

Research questions

What are the major issues and cyber security problems faced by organisations in the overall UK?

How does the effectiveness of various security technologies help the organisation to prevent issues?

What are the benefits of cyber security policies in managing cyber attacks in the organisation?

Scope

The major scope of this study is to find out the overall impact of different types of cyber security policies in managing cyber security issues in the environment. Due to the higher rate of cyber security issues happening in the UK, providing proper recommendations to mitigate these issues can help the organisation to get a good amount of consumer base and to store potential data in the secured database. This research is very much effective for future researchers to get a clear idea about the impact of these policies. Similarly, this study also includes various information about the strategies for organisations to take different types of preventive measures for reducing the impact of cyber security issues in their overall environment. The organisation can clearly get a proper idea about the different types of technology to be used for managing different activities by preventing cyber attacks.

3. Methodology

The proper application of research methodology is one of the crucial for particular research methods to get the proper finding of the overall study. As illustrated by Busetto et al. (2020), the application of research methodology can provide a good amount of support which manages various activities for the researcher to get a clear idea about the impact of cyber security policies in managing cyber security issues. As the study is based on the literature review and secondary data, therefore the researcher has chosen the secondary data collection method for gathering the findings of the study. Proper management of secondary data collection methods can be effective for the researcher to get a clear idea about the impact of this data. The application of inclusion and exclusion criteria is very much effective for the researcher to find out the proper data and finding from various types of literature available in different types of databases. These strategies of collecting the data can provide a huge amount of support to the management for getting a better result in managing their various activities.

Inclusion and Exclusion Criteria

The application of inclusion and exclusion criteria is one of the most important factors which help the researcher to get better findings. Different types of data and functionality can be used for collecting the major pieces of literature from a large number of databases available in the market. As opined by Campbell et al. (2021), the application of different criteria depending on the several factors of the research including cyber security policy, cyber attacks, and preventive policies are the most important factors which help the researcher to collect necessary information about this research to find out the major findings. A large amount of data is available in the market. Collecting data about cyber security policies can be effective in searching for different types of databases for collecting the necessary information from a large amount of data available in the market. These criteria help to collect the necessary information about the impact of policy on preventing cyber security issues. Secondly, the researcher put the criteria of collecting various pieces of literature on cyber security issues which offered the organisation to get a good amount of results about different types of cyber security issues. The third criteria that the researcher put in collecting the different types of data is related to the different types of technological advancements in the organisation which can be helpful to mitigate cyber security issues in the overall organisation. These three major criteria help the researcher to collect their overall data for the process of managing the research by answering all the research questions developed by the researcher. Therefore, the inclusion and exclusion criteria are very much effective for the researcher to define several types of factors in managing their crucial work.

Search Strategy

The proper application of the search strategy is one of the crucial strategies which provide a huge amount of support to the researcher for getting a good amount of findings. There are a total of three databases that have been chosen for getting the major findings of the research. As analysed by Graham and Masters‐Awatere (2020), the application of different types of search tools such as Prisma search is effective to collect different types of data for a large number of databases available in the market. The three databases chosen for conducting this study are Google Scholar, ProQuest and Research Gate which help the researcher to collect necessary information about the research topic of the impact of various types of data collection processes. The purposive sampling has been also used to collect the proper data from a large number by putting input about the different variables of conducting this research. The application of this search technique can be effective to identify different factors of the research to get the major findings. Therefore, this type of search strategy can be effective for the research to identify different types of factors and data to collect about the effect of cyber security policies on the organisation. Choosing a particular database such as Google Scholar or Proquest can provide a huge amount of support to the researcher to get a better idea about the overall operation of the organisation. As depicted by Zimmerman et al. (2020), these search strategies can provide the researcher with a better amount of opportunity to find out realistic and peer-reviewed data from the large databases available in the market. This type of database, especially the Proquest can be helpful for the research to gather the realistic data which have been found from different types of research process by managing various kinds of protocols and suggestion processes in the particular research operation. Therefore it can be depicted that the proper application of search strategy can provide a huge amount of support to the researcher to gather relevant ideas about the impact of various types of data related to the impact of cyber security policies in mitigating the cyber threats of the organisation.

Screening

For the overall screening process, several steps have been followed by the researcher for identifying the major research data from a large number of databases (Singal et al. 2019). In the beginning, the identification of the research question is one of the most important factors which motivate the researcher to get relevant data from different types of publications and narrow down the scope of the search. After selecting the secondary research questions, identification of the relevant sources for collecting the data such as journals, conference processing books and online databases help the researcher to get proper articles about the impact of cyber security policies in managing cyber security issues.

After choosing the relevant sources, the researcher conducted their search by using different types of keywords related to the research topic and question for identifying a better source. It can be only possible by using library databases, search engines or other search tools (Nama et al. 2019 ) . After evaluating the sources, the researcher only includes those sources which have better publication depression and author scandal and the proper research method used. Therefore, the researcher has chosen to include the data from well-known publications including Researchgate, ScienceDirect, MDPI and IEEE papers. After choosing the publications, analysing the data and synthesising the findings can be helpful for the researcher to draw recommendations.

Results of Search and Relevant Study Extractions

For this research, a large amount of data has been collected through the application of secondary education methods by using various types of inclusion and exclusion criteria. Different databases such as ProQuest, ScienceDirect, and others have been used to get the major findings from the data. A total of 10 journal articles are being chosen from various publications mentioned above.

4. Results

The application of proper searching technique and selection of study is one of the most important factors of the overall research process which provides several benefits to the organisation to gather relevant ideas to narrow down the selection process. As opined by Sarkis-Onofre et al. (2021), the application of Prisma search is one of the major search tools which provides proper support to the researcher to get a good amount of support in managing various kinds of activities. Narrowing down the study to prioritise the limited number of data to be included in the research can offer better support in managing various activities.

STEP0012 Emerging Dilemmas

Figure 1: PRISMA search

(Source: developed by the researcher)

The proper application of Prisma search is one of the most important search tools which provides different types of support to the management or researcher to get a clear idea about the overall stages to get major findings. Evaluating the above image, at the first stage, around 50 journal articles are being selected which are after 2017. Then including the criteria of the constructor paper and the timeline of 2019 to 2023, around 40 journal articles. Including the criteria of fewer results and non-appropriateness, around 10 journal articles are being finally chosen to be included in this research.

5. Findings

Critical evaluation of the various cyber security attacks faced by the organisations

In a particular organisation, the management faced different types of issues due to the various ways cybercriminals access the overall computer network and system to destroy, steal and alter all the information. As opined by Abdullahi et al. (2022), different types of cyber attacks can target a wide range of people from different companies starting from enterprises to government bodies. The major types of cyber security attacks are described below.

Malware Attacks

The application of malware attack is known as a major program which has been created by having the intention to home the network computer and server. As depicted by Mazher et al. (2022), it is a common type of cyber attack and because of this term income passes different types of subsets including spyware viruses, random wire and other types of malware attacks which maliciously language the software. Among the major types of malware attacks, ransomware is one of the well-known malware practices which affects the victim's data and offers proper description keys in exchange for different types of payment. It has been majorly launched through the application of malicious links delivered by different phishing emails and unpatched vulnerable used as well.

Spyware Attacks

Spyware is known as malicious and unwanted software which inserts into the computer and other devices for collecting information about the user and their web activity without their consent (Ben Fredj et al. 2021). This type of system appears to be one of the legitimate software disguised as the native operating system that affected the overall function of the organisation through social engineering techniques.

DDoS

The Denial of service is known as a targeted malicious attack which flooded a large number of networks with different types of false requests to disrupt different types of business operations. As illustrated by Alhayani et al. (2021), the users are unable to perform their natural tasks and routine operations such as websites, online accounts and accessing emails which are being operated by the compromised network or computer.

Phishing

This type of technique is known as a cyber attack which uses SMS email, social media phone and social engineering techniques to entice a large number of victims to share different types of sensitive information for changing account numbers and passwords that affected the process of organisation.

On the other hand, spoofing identity waste attacks code injection inside the square and others and is also known as work the primary tax which affects the overall body.

Critical Analysis of Cyber Security Policies to Prevent Cyber Issues

Cyber security policies are very well known to prevent cyber security issues which can be significant for managing different types of operations. As illustrated by Mishra et al. (2022), the proper development of cyber security policies can be efficient for organisations to prevent data breaches, cyber-attacks and other security incidents which can come to different types of sensitive information and preserve business operations in a better way. The major impacts of these are described below.

  • The development of cyber security policies help the organisation of established can help the organisation to develop a comprehensive security framework which outlines the necessary security controls and procedures to protect different types of assets (Habibzadeh et al. 2019). Implementation of these policies can be effective for improving the security posture and reducing the risk of data breaches.
  • These types of policies are also helpful for increasing the awareness program among the users and employees about the importance of security and their role in maintaining the overall operation. Different policies can be effective for establishing the overall consequences for the non-compliance which can incentive the users and employees to other for security in the best practice
  • Cyber attacks can also cause a large number of significant reputational and financial damage to organisations. As opined by Fuster and Jasmontaite (2020), the policies can help to prevent these incidents from mitigating and occurring the impact as per their occurrence.
  • Cyber security policies can be also effective for organisations to maintain different types of legal requirements to avoid penalties and legal consequences related to cyber-attacks.

Critical Evaluation of Various Strategies to Mitigate Cyber Security Issues

Currently, most organisations are very much focused on mitigating different types of cybersecurity issues which affect the overall operation of the organisation. There are several strategies that have been used by most organisations which offer proper support to mitigate different cyber security issues. The major studies used by the organisation are described below.

  • The employee training can be helpful for increasing the awareness program about cyber security issues and their best practices. However, as opined by Aldhyani and Alkahtani (2022), these programs are not so effective enough to address all kinds of days faced by the organisation from cyber security.
  • Regular touching and updating can be also effective to address different types of vulnerability in systems and software. It may not be effective against different types of zero attacks or other kinds of advanced threats that affect the overall operation of the organisation.
  • Network segmentation and the uses of strong passwords are the most important strategy to prevent access from different types of accounts and systems. As depicted by Ansari et al. (2022), it helps to limit and content the overall impact of the cyber security incident.
  • Incident response plans or firewall technology are very much known to prevent different types of cyber attacks. It can be also effective to minimise the chances of risk and the requirements of the organisation that is usually required. The final can help to protect the system server from different types of unauthorised access which provide proper support to manage their activities.

Therefore, analysing all the factors it can be depicted that the development of cyber security policies in it can offer a better amount of states to minimise and prevent the cyber security attack. It also helps them regularly update and review all the strategies to keep pace with the evolving issues for ensuring they are effective.

6. Conclusion

This REA is very much effective for providing a detailed idea about the various functionalities of cyber security policies to manage the cyber security issues in the environment. The proper aim and objective along with the research questions also described in this research. The researcher took the secondary data collection method by following the different installation and explosion criteria to collect the data from various types of databases and publications. A total of 10 journal articles are being collected by the researcher to get the proper findings about the impact of cyber security policies to prevent the issues in the organisation. Evaluating the data it can be clearly identified that the development of different types of cyber security policies by maintaining the country's regulations can help the organisation to get a good amount of support for preventing the issues.

References

Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L.F. and Abdulkadir, S.J., 2022. Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics , 11 (2), p.198.

Aldhyani, T.H. and Alkahtani, H., 2022. Attacks to automatous vehicles: a deep learning algorithm for cybersecurity. Sensors , 22 (1), p.360.

Alhayani, B., Abbas, S.T., Khutar, D.Z. and Mohammed, H.J., 2021. Best ways computation intelligent of face cyber attacks. Mater. Today Proc , pp.26-31.

Ansari, M.F., Sharma, P.K. and Dash, B., 2022. Prevention of phishing attacks using AI-based Cybersecurity Awareness Training. Prevention .

Asghar, M.R., Hu, Q. and Zeadally, S., 2019. Cybersecurity in industrial control systems: Issues, technologies, and challenges. Computer Networks , 165 , p.106946.

Ben Fredj, O., Mihoub, A., Krichen, M., Cheikhrouhou, O. and Derhab, A., 2020, November. CyberSecurity attack prediction: a deep learning approach . In 13th International Conference on Security of Information and Networks ( pp. 1-6).

Busetto, L., Wick, W. and Gumbinger, C., 2020. How to use and assess qualitative research methods. Neurological Research and practice , 2 , pp.1-10.

Campbell, J., Sutherland, J., Bucknall, D., O’hara, L., Heywood, A., Hobbs, M., Ballantyne, A. and Gray, L., 2021. Equity in vaccine trials for higher weight people? A rapid review of weight-related inclusion and exclusion criteria for COVID-19 clinical trials. Vaccines , 9 (12), p.1466.

Fuster, G.G. and Jasmontaite, L., 2020. Cybersecurity regulation in the European union: the digital, the critical and fundamental rights. The ethics of cybersecurity , pp.97-115.

Graham, R. and Masters‐Awatere, B., 2020. Experiences of Māori of Aotearoa New Zealand's public health system: a systematic review of two decades of published qualitative research. Australian and New Zealand Journal of Public Health , 44 (3), pp.193-200.

Habibzadeh, H., Nussbaum, B.H., Anjomshoa, F., Kantarci, B. and Soyata, T., 2019. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities and Society , 50 , p.101660.

Habibzadeh, H., Nussbaum, B.H., Anjomshoa, F., Kantarci, B. and Soyata, T., 2019. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities and Society , 50 , p.101660.

Khalid, A., Sundararajan, A., Hernandez, A. and Sarwat, A.I., 2019, June. Facts approach to address cybersecurity issues in electric vehicle battery systems. In 2019 IEEE Technology & Engineering Management Conference (TEMSCON) (pp. 1-6). IEEE.

Mazher, N., Alhadaad, M. and Shagdar, O., 2022. A Brief Summary of Cybersecurity attacks in V2X Communication.

Mishra, A., Alzoubi, Y.I., Gill, A.Q. and Anwar, M.J., 2022. Cybersecurity enterprises policies: a Comparative study. Sensors , 22 (2), p.538.

Nama, N., Sampson, M., Barrowman, N., Sandarage, R., Menon, K., Macartney, G., Murto, K., Vaccani, J.P., Katz, S., Zemek, R. and Nasr, A., 2019. Crowdsourcing the citation screening process for systematic reviews: validation study. Journal of medical Internet research , 21 (4), p.e12953.

O’Driscoll, A. 2023. UK cyber security and cyber crime statistics (2023). Comparitech. Available at: https://www.comparitech.com/blog/information-security/uk-cyber-security-statistics/[Accessed on 26 April, 2023]

Sarkis-Onofre, R., Catalá-López, F., Aromataris, E. and Lockwood, C., 2021. How to properly use the PRISMA Statement. Systematic Reviews , 10 (1), pp.1-3.

Singal, A.G., Lok, A.S., Feng, Z., Kanwal, F. and Parikh, N.D., 2022. Conceptual model for the hepatocellular carcinoma screening continuum: current status and research agenda. Clinical Gastroenterology and Hepatology , 20 (1), pp.9-18.

Wang, Z., Zhu, H. and Sun, L., 2021. Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods. IEEE Access , 9 , pp.11895-11910.

Zimmerman, S., Thorpe, A., Chamberlain, J. and Kruschwitz, U., 2020, March. Towards search strategies for better privacy and information. In Proceedings of the 2020 conference on human information interaction and retrieval (pp. 124-134).

You Might Also Like:-

Digital Health Assignment Help

What are the 4 Main Areas of Digital Transformation?

Young Children and Digital Technology Assignment Sample

Hey MAS, I need Assignment Sample of

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+
  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts

Highlights

  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

    $10.00
  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

    $25.00
  • Total

    Free
  • Let's Start

Get
500 Words Free
on your assignment today

Browse across 1 Million Assignment Samples for Free

Explore All Assignment Samples

Request Callback

My Assignment Services- Whatsapp Get Best OffersOn WhatsApp

Get 500 Words FREE