Here is Your Sample Download Sample 📩
Cyber security systems mainly give protection to computer systems against unauthorised access to the data centre and prevent damage and inaccessibility. Though, mitigation of cyber security risk is challenging effective IT infrastructure needs to be encompassed for regular risk assessment. Implementation of GDPR and DPA 2018 needs to be implemented to develop suitable security measures within the UK, especially for the protection of personal; data. Additionally, robust cyber security culture and reinforcement of regular training along with risk-based approaches help to protect against risks based on the likelihood.
Along with the increased use of the internet, the intensity of cyber-attacks has increased by 358% as compared to the last year and it costs 3.86m USD data breach. As a result, in recent times research on data encryption, internet security software, cloud security, cyber defence, industrial security control system, and digital forensics has become a hot topic in the cyber security area (Bhardwaj et al. 2019).
Relation to computer science
Additionally, it is found that database administration, software development, network security, software engineering, web development, application security, blockchain technologies, information security, Internet of Things (IoT) and cloud security are closely related to cyber security (Wan et al. 2021).[…could you explain a bit more, how are they related to highlighted fields]
Research questions and methods
Q1. How does the cybersecurity framework help in preventing data breaches in contemporary business organisations?
Q2. What is the role of information security in protecting information assets?
Q3. How do blockchain technologies and IoT strengthen the cyber security framework?
Studies have mentioned that secondary qualitative research helps to investigate one qualitative research topic with clean and structured data (Finlay et al. 2021). Therefore, collecting clean and structured data about the role of the cyber security framework in the prevention of data breaches might help researchers to complete the study in a time-effective and cost-effective manner. In a similar context, Doyle et al. (2020) said that qualitative research is imperative to develop a deeper understanding of particular phenomena or research contexts. Hence, evaluating literary evidence of information security, IoT and blockchain technologies research would be able to understand how these areas improve the cybersecurity framework. Moreover, this research method would allow researchers to develop new insight based on existing elan, structured, and reliable data sources. [could you please check the highlighted word ]
General relevance [ insufficient number of words]
Cybersecurity is important because it protects data theft and ensures information security. The increased popularity of advanced technologies in the development process across the globe is also increasing the need for and relevance of cybersecurity. Besides, cyber security plays an important role in safeguarding intellectual property, personal information, sensitive data, confidential government information as well as industry information. However, the probability and increased rate of cyber attract major negative consequences which might threaten national security. Cyber attack on communication networks also creates disruption which is reflecting degrading ideological goals.
Bhardwaj, A., Avasthi, V. and Goundar, S., 2019. Cyber security attacks on robotic platforms. Network Security, 2019(10), pp.13-19.
Demirkan, S., Demirkan, I. and McKee, A., 2020. Blockchain technology in the future of business cyber security and accounting. Journal of Management Analytics, 7(2), pp.189-208.
Doyle, L., McCabe, C., Keogh, B., Brady, A. and McCann, M., 2020. An overview of the qualitative descriptive design within nursing research. Journal of Research in Nursing, 25(5), pp.443-455.
Finlay, J.M., Keller, J.S., O'Shea, B.Q., Eastman, M.R., Vinson, Y.R. and Kobayashi, L.C., 2021. Coping during the COVID-19 pandemic: A qualitative study of older adults across the United States. Frontiers in Public Health, 9, p.643807.
, (2023). “Cyber security definition” [Accessed on: 11.04.2023]
Mishra, A., Alzoubi, Y.I., Anwar, M.J. and Gill, A.Q., 2022. Attributes impacting cybersecurity policy development: An evidence from seven nations. Computers & Security, 120, p.102820. (2023). “Cybercrime and security” [Accessed on: 11.04.2023]
Wan, M., Li, J., Liu, Y., Zhao, J. and Wang, J., 2021. Characteristic insights on industrial cyber security and popular defence mechanisms. China Communications, 18(1), pp.130-150.