Cyber security policies are majorly helpful for protecting different types of digital assets and preventing various types of online data breaches and fraud in a particular environment. As illustrated by Habibzadeh et al. (2019), the major effect of cyber security policies can be depending upon radius types of factors such as the level of awareness, implementation policy, technologies used and compliance. Analysing the overall factors, the application of cyber security policies can be effective to reduce different types of databases if the policies are regularly updated, well-designed and enforced rigorously. These policies are also effective to cover various aspects of cyber security access in control incident response risk management and authentication which provide support to the management to get a good amount of opportunity to store all the potential data in a secure database. Different types of policies have been developed by most organisations to reduce the impact of the various types of cyber security issues in a particular environment which create a huge amount of negative impact on the organisation by getting a better amount of customer base. Day by day due to the number of advanced technology launched in a particular market, cyber attacks are increasing by a certain amount which provides opportunities for cybercriminals to get a good amount of advantage from leaking the potential data of the organisation and doing online fraudulent activities. As opined by Khalid et al. (2019), due to these types of factors, conducting a rapid evidence assessment it's very much helpful to get a clear idea of the impact of front types of cyber security policies on the organisations to prevent different types of cyber security issues. Therefore the researcher has adopted this topic continuously in this REA for getting the major findings of the overall study.
The study is majorly analysing the impact of cyber security policies on mitigating cyber security issues in organisations. Different types of cyber attacks have been used by most cyber criminals to breach data activities along with various technologies to prevent issues in the business. On the other hand, as analysed by Asghar et al. (2019), different benefits of cyber security policies on the organisation are also going to be evaluated in this REA which can be helpful for future researchers and organisations to take proper ideas about the different policies and preventive measures for doing different operations. By conducting this study, it has been gathered that the number of cyber security issues have been increased by a huge amount which creates a negative impact on the basic organisations to continue their work efficiently. Therefore, cyber security policies are very much beneficial to maintain the overall nature of the operations of different higher security issues in the environment.
Cyber security issues are one of the major issues faced by the organisation which created negative effects in the overall area of operations. Cyber security attacks are not being considered under the home office counting rules and the computer misuse act 1990. Analysing the overall statistics about the cyber security issues in the overall UK organisations, it has been found that around 81.4% of organisations in the UK had experienced at least one cyber attack in the year between 2021-2022 (O'Driscoll, 2023). Similarly, over the last 12 months, most of the cyber attackers are using random ware attacks to do any kind of database and create major issues for the organisations. Therefore, it is very much essential for the organisation to use different types of data breaches in policies which can offer a huge amount of support to the management to get better results by preventing different cyber attacks in their organisation. Due to this reason, the researcher is conducting this study to evaluate the overall back of the types of cyber security policies of organisations to be rented online for the activities and data bridges which react to impact on the owner of the operation.
Development of research questions is very much important which provides a huge amount of support in managing the overall research. The proper management of research as per the research questions can be affected the development of the overall research. The major aim of the research is to identify the impact of cyber security policies in managing cyber security issues in the organisation. The research objectives are described below
What are the major issues and cyber security problems faced by organisations in the overall UK?
How does the effectiveness of various security technologies help the organisation to prevent issues?
What are the benefits of cyber security policies in managing cyber attacks in the organisation?
The major scope of this study is to find out the overall impact of different types of cyber security policies in managing cyber security issues in the environment. Due to the higher rate of cyber security issues happening in the UK, providing proper recommendations to mitigate these issues can help the organisation to get a good amount of consumer base and to store potential data in the secured database. This research is very much effective for future researchers to get a clear idea about the impact of these policies. Similarly, this study also includes various information about the strategies for organisations to take different types of preventive measures for reducing the impact of cyber security issues in their overall environment. The organisation can clearly get a proper idea about the different types of technology to be used for managing different activities by preventing cyber attacks.
The proper application of research methodology is one of the crucial for particular research methods to get the proper finding of the overall study. As illustrated by Busetto et al. (2020), the application of research methodology can provide a good amount of support which manages various activities for the researcher to get a clear idea about the impact of cyber security policies in managing cyber security issues. As the study is based on the literature review and secondary data, therefore the researcher has chosen the secondary data collection method for gathering the findings of the study. Proper management of secondary data collection methods can be effective for the researcher to get a clear idea about the impact of this data. The application of inclusion and exclusion criteria is very much effective for the researcher to find out the proper data and finding from various types of literature available in different types of databases. These strategies of collecting the data can provide a huge amount of support to the management for getting a better result in managing their various activities.
The application of inclusion and exclusion criteria is one of the most important factors which help the researcher to get better findings. Different types of data and functionality can be used for collecting the major pieces of literature from a large number of databases available in the market. As opined by Campbell et al. (2021), the application of different criteria depending on the several factors of the research including cyber security policy, cyber attacks, and preventive policies are the most important factors which help the researcher to collect necessary information about this research to find out the major findings. A large amount of data is available in the market. Collecting data about cyber security policies can be effective in searching for different types of databases for collecting the necessary information from a large amount of data available in the market. These criteria help to collect the necessary information about the impact of policy on preventing cyber security issues. Secondly, the researcher put the criteria of collecting various pieces of literature on cyber security issues which offered the organisation to get a good amount of results about different types of cyber security issues. The third criteria that the researcher put in collecting the different types of data is related to the different types of technological advancements in the organisation which can be helpful to mitigate cyber security issues in the overall organisation. These three major criteria help the researcher to collect their overall data for the process of managing the research by answering all the research questions developed by the researcher. Therefore, the inclusion and exclusion criteria are very much effective for the researcher to define several types of factors in managing their crucial work.
The proper application of the search strategy is one of the crucial strategies which provide a huge amount of support to the researcher for getting a good amount of findings. There are a total of three databases that have been chosen for getting the major findings of the research. As analysed by Graham and Masters‐Awatere (2020), the application of different types of search tools such as Prisma search is effective to collect different types of data for a large number of databases available in the market. The three databases chosen for conducting this study are Google Scholar, ProQuest and Research Gate which help the researcher to collect necessary information about the research topic of the impact of various types of data collection processes. The purposive sampling has been also used to collect the proper data from a large number by putting input about the different variables of conducting this research. The application of this search technique can be effective to identify different factors of the research to get the major findings. Therefore, this type of search strategy can be effective for the research to identify different types of factors and data to collect about the effect of cyber security policies on the organisation. Choosing a particular database such as Google Scholar or Proquest can provide a huge amount of support to the researcher to get a better idea about the overall operation of the organisation. As depicted by Zimmerman et al. (2020), these search strategies can provide the researcher with a better amount of opportunity to find out realistic and peer-reviewed data from the large databases available in the market. This type of database, especially the Proquest can be helpful for the research to gather the realistic data which have been found from different types of research process by managing various kinds of protocols and suggestion processes in the particular research operation. Therefore it can be depicted that the proper application of search strategy can provide a huge amount of support to the researcher to gather relevant ideas about the impact of various types of data related to the impact of cyber security policies in mitigating the cyber threats of the organisation.
For the overall screening process, several steps have been followed by the researcher for identifying the major research data from a large number of databases (Singal et al. 2019). In the beginning, the identification of the research question is one of the most important factors which motivate the researcher to get relevant data from different types of publications and narrow down the scope of the search. After selecting the secondary research questions, identification of the relevant sources for collecting the data such as journals, conference processing books and online databases help the researcher to get proper articles about the impact of cyber security policies in managing cyber security issues.
After choosing the relevant sources, the researcher conducted their search by using different types of keywords related to the research topic and question for identifying a better source. It can be only possible by using library databases, search engines or other search tools (Nama et al. 2019 ) . After evaluating the sources, the researcher only includes those sources which have better publication depression and author scandal and the proper research method used. Therefore, the researcher has chosen to include the data from well-known publications including Researchgate, ScienceDirect, MDPI and IEEE papers. After choosing the publications, analysing the data and synthesising the findings can be helpful for the researcher to draw recommendations.
For this research, a large amount of data has been collected through the application of secondary education methods by using various types of inclusion and exclusion criteria. Different databases such as ProQuest, ScienceDirect, and others have been used to get the major findings from the data. A total of 10 journal articles are being chosen from various publications mentioned above.
The application of proper searching technique and selection of study is one of the most important factors of the overall research process which provides several benefits to the organisation to gather relevant ideas to narrow down the selection process. As opined by Sarkis-Onofre et al. (2021), the application of Prisma search is one of the major search tools which provides proper support to the researcher to get a good amount of support in managing various kinds of activities. Narrowing down the study to prioritise the limited number of data to be included in the research can offer better support in managing various activities.
Figure 1: PRISMA search
(Source: developed by the researcher)
The proper application of Prisma search is one of the most important search tools which provides different types of support to the management or researcher to get a clear idea about the overall stages to get major findings. Evaluating the above image, at the first stage, around 50 journal articles are being selected which are after 2017. Then including the criteria of the constructor paper and the timeline of 2019 to 2023, around 40 journal articles. Including the criteria of fewer results and non-appropriateness, around 10 journal articles are being finally chosen to be included in this research.
In a particular organisation, the management faced different types of issues due to the various ways cybercriminals access the overall computer network and system to destroy, steal and alter all the information. As opined by Abdullahi et al. (2022), different types of cyber attacks can target a wide range of people from different companies starting from enterprises to government bodies. The major types of cyber security attacks are described below.
The application of malware attack is known as a major program which has been created by having the intention to home the network computer and server. As depicted by Mazher et al. (2022), it is a common type of cyber attack and because of this term income passes different types of subsets including spyware viruses, random wire and other types of malware attacks which maliciously language the software. Among the major types of malware attacks, ransomware is one of the well-known malware practices which affects the victim's data and offers proper description keys in exchange for different types of payment. It has been majorly launched through the application of malicious links delivered by different phishing emails and unpatched vulnerable used as well.
Spyware is known as malicious and unwanted software which inserts into the computer and other devices for collecting information about the user and their web activity without their consent (Ben Fredj et al. 2021). This type of system appears to be one of the legitimate software disguised as the native operating system that affected the overall function of the organisation through social engineering techniques.
The Denial of service is known as a targeted malicious attack which flooded a large number of networks with different types of false requests to disrupt different types of business operations. As illustrated by Alhayani et al. (2021), the users are unable to perform their natural tasks and routine operations such as websites, online accounts and accessing emails which are being operated by the compromised network or computer.
This type of technique is known as a cyber attack which uses SMS email, social media phone and social engineering techniques to entice a large number of victims to share different types of sensitive information for changing account numbers and passwords that affected the process of organisation.
On the other hand, spoofing identity waste attacks code injection inside the square and others and is also known as work the primary tax which affects the overall body.
Cyber security policies are very well known to prevent cyber security issues which can be significant for managing different types of operations. As illustrated by Mishra et al. (2022), the proper development of cyber security policies can be efficient for organisations to prevent data breaches, cyber-attacks and other security incidents which can come to different types of sensitive information and preserve business operations in a better way. The major impacts of these are described below.
Currently, most organisations are very much focused on mitigating different types of cybersecurity issues which affect the overall operation of the organisation. There are several strategies that have been used by most organisations which offer proper support to mitigate different cyber security issues. The major studies used by the organisation are described below.
Therefore, analysing all the factors it can be depicted that the development of cyber security policies in it can offer a better amount of states to minimise and prevent the cyber security attack. It also helps them regularly update and review all the strategies to keep pace with the evolving issues for ensuring they are effective.
This REA is very much effective for providing a detailed idea about the various functionalities of cyber security policies to manage the cyber security issues in the environment. The proper aim and objective along with the research questions also described in this research. The researcher took the secondary data collection method by following the different installation and explosion criteria to collect the data from various types of databases and publications. A total of 10 journal articles are being collected by the researcher to get the proper findings about the impact of cyber security policies to prevent the issues in the organisation. Evaluating the data it can be clearly identified that the development of different types of cyber security policies by maintaining the country's regulations can help the organisation to get a good amount of support for preventing the issues.
Abdullahi, M., Baashar, Y., Alhussian, H., Alwadain, A., Aziz, N., Capretz, L.F. and Abdulkadir, S.J., 2022. Detecting cybersecurity attacks in internet of things using artificial intelligence methods: A systematic literature review. Electronics , 11 (2), p.198.
Aldhyani, T.H. and Alkahtani, H., 2022. Attacks to automatous vehicles: a deep learning algorithm for cybersecurity. Sensors , 22 (1), p.360.
Alhayani, B., Abbas, S.T., Khutar, D.Z. and Mohammed, H.J., 2021. Best ways computation intelligent of face cyber attacks. Mater. Today Proc , pp.26-31.
Ansari, M.F., Sharma, P.K. and Dash, B., 2022. Prevention of phishing attacks using AI-based Cybersecurity Awareness Training. Prevention .
Asghar, M.R., Hu, Q. and Zeadally, S., 2019. Cybersecurity in industrial control systems: Issues, technologies, and challenges. Computer Networks , 165 , p.106946.
Ben Fredj, O., Mihoub, A., Krichen, M., Cheikhrouhou, O. and Derhab, A., 2020, November. CyberSecurity attack prediction: a deep learning approach . In 13th International Conference on Security of Information and Networks ( pp. 1-6).
Busetto, L., Wick, W. and Gumbinger, C., 2020. How to use and assess qualitative research methods. Neurological Research and practice , 2 , pp.1-10.
Campbell, J., Sutherland, J., Bucknall, D., O’hara, L., Heywood, A., Hobbs, M., Ballantyne, A. and Gray, L., 2021. Equity in vaccine trials for higher weight people? A rapid review of weight-related inclusion and exclusion criteria for COVID-19 clinical trials. Vaccines , 9 (12), p.1466.
Fuster, G.G. and Jasmontaite, L., 2020. Cybersecurity regulation in the European union: the digital, the critical and fundamental rights. The ethics of cybersecurity , pp.97-115.
Graham, R. and Masters‐Awatere, B., 2020. Experiences of Māori of Aotearoa New Zealand's public health system: a systematic review of two decades of published qualitative research. Australian and New Zealand Journal of Public Health , 44 (3), pp.193-200.
Habibzadeh, H., Nussbaum, B.H., Anjomshoa, F., Kantarci, B. and Soyata, T., 2019. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities and Society , 50 , p.101660.
Habibzadeh, H., Nussbaum, B.H., Anjomshoa, F., Kantarci, B. and Soyata, T., 2019. A survey on cybersecurity, data privacy, and policy issues in cyber-physical system deployments in smart cities. Sustainable Cities and Society , 50 , p.101660.
Khalid, A., Sundararajan, A., Hernandez, A. and Sarwat, A.I., 2019, June. Facts approach to address cybersecurity issues in electric vehicle battery systems. In 2019 IEEE Technology & Engineering Management Conference (TEMSCON) (pp. 1-6). IEEE.
Mazher, N., Alhadaad, M. and Shagdar, O., 2022. A Brief Summary of Cybersecurity attacks in V2X Communication.
Mishra, A., Alzoubi, Y.I., Gill, A.Q. and Anwar, M.J., 2022. Cybersecurity enterprises policies: a Comparative study. Sensors , 22 (2), p.538.
Nama, N., Sampson, M., Barrowman, N., Sandarage, R., Menon, K., Macartney, G., Murto, K., Vaccani, J.P., Katz, S., Zemek, R. and Nasr, A., 2019. Crowdsourcing the citation screening process for systematic reviews: validation study. Journal of medical Internet research , 21 (4), p.e12953.
O’Driscoll, A. 2023. UK cyber security and cyber crime statistics (2023). Comparitech. Available at: https://www.comparitech.com/blog/information-security/uk-cyber-security-statistics/[Accessed on 26 April, 2023]
Sarkis-Onofre, R., Catalá-López, F., Aromataris, E. and Lockwood, C., 2021. How to properly use the PRISMA Statement. Systematic Reviews , 10 (1), pp.1-3.
Singal, A.G., Lok, A.S., Feng, Z., Kanwal, F. and Parikh, N.D., 2022. Conceptual model for the hepatocellular carcinoma screening continuum: current status and research agenda. Clinical Gastroenterology and Hepatology , 20 (1), pp.9-18.
Wang, Z., Zhu, H. and Sun, L., 2021. Social engineering in cybersecurity: Effect mechanisms, human vulnerabilities and attack methods. IEEE Access , 9 , pp.11895-11910.
Zimmerman, S., Thorpe, A., Chamberlain, J. and Kruschwitz, U., 2020, March. Towards search strategies for better privacy and information. In Proceedings of the 2020 conference on human information interaction and retrieval (pp. 124-134).
You Might Also Like:-
Digital Health Assignment Help
What are the 4 Main Areas of Digital Transformation?
Young Children and Digital Technology Assignment Sample
1,212,718Orders
4.9/5Rating
5,063Experts
Turnitin Report
$10.00Proofreading and Editing
$9.00Per PageConsultation with Expert
$35.00Per HourLive Session 1-on-1
$40.00Per 30 min.Quality Check
$25.00Total
FreeGet
500 Words Free
on your assignment today
Get
500 Words Free
on your assignment today
Request Callback
Doing your Assignment with our resources is simple, take Expert assistance to ensure HD Grades. Here you Go....
🚨Don't Leave Empty-Handed!🚨
Snag a Sweet 70% OFF on Your Assignments! 📚💡
Grab it while it's hot!🔥
Claim Your DiscountHurry, Offer Expires Soon 🚀🚀