Type of paper:Â | Research proposal |
Categories:Â | Cyber security |
Pages: | 7 |
Wordcount: | 1828 words |
What is the business or organizational problem that I'd like to research?
There is a need to invest in future upcoming technologies that will help improve the current techniques that are being used to modify ways and methods that are used to manipulate data stored in the cloud. The changes are meant to improve the current IT resources that are being used to make sure that accuracy, efficiency, and quality are improved. Most important is to respond to the security issues that are concerned with data retrieval over the internet which has been greatly compromised by a number of online fraud activities that have posted a number of challenges trying to solve. The main problem is attributed to the fact that technological changes are occurring at a very high rate such that the security details that are used to respond to such challenges are overlooked in most cases. Online fraudsters have since developed new techniques in which they are able to develop their own programs that they use to propagate their crimes and this has possessed a number of problems to system developers whose programs and systems are invaded by the hackers and thus the integrity of the data that is shared is always lots. This kind of intrusion is a big challenge to businesses that have their secretive data being accessed by competitors and this greatly lowers the competitive advantage of a business. In other cases, the intrusion of confidential data of some organizations ends up into huge losses when online payment systems are intruded such that the transactions that are done are not authorized and organizations end up losing a huge amount of money in the process. Data processing techniques of organizations are also affected in cases where online processes are affected by the fraud activities such that most of the end results generated are not reproducible and thus wrong decisions are made at the end of it all.
Atos is sensitive to dealing with information technology that is mostly used in sensitive areas. Some of this data is used in highly sensitive areas that require high-security levels. For example, the company is known to be a partner in the Olympic Games where it offered IT services.
The company also deals intelligence data that is gaining a lot of importance in the current times when the digital transformation is occurring at a very high rate.
There is a need to have access to the data pertaining to internal processes that are used to ensure that the security of information that is stored over the network is secured to avoid unauthorized access which is a threat to the integrity of clients' confidential information. The fact that most of the businesses that outsource its services from Atos deal with big data, there is a need to make use of analytic techniques that allows for processing of huge data within the shortest time possible to make sure that real-time results are generated and used to make the suitable adjustments. There is a need to make use of the modern techniques which are known to allow for real-time analysis of the systems to make sure that any available vice is reported on time to allow for timely action. This is an important attribute that will help improve the quality of the services that are offered by this company.
OR
What business or organization do I have access to? // Who do I know that I could ask to find a problem or issue to research for?
The IT services that the company offers have since overtaken the online payment systems that are used in the European markets and this remains to be a milestone in this sector. Most of the leading businesses in countries such as Germany and Astria have since adopted digital marketing which is associated with a number of benefits. High-level technology is needed to make sure that the current vices that have been reported to affect the online money transactions are completely eliminated.
There is a need to get details of the actual online platforms that are used by most business top make the payments such that designing of security programs are optimized. There is a need to get details pertaining to security algorithms that are used by clients to help prevent fraudulent transactions in the future. The fact that financial details of organizations are very confidential, it is hard for a client to share all the details and thus total protection of the system is not possible.
OR
What topic or issue would I like to become an expert in?
The use of Artificial Intelligence(AI) in service desk and project management is an important topic in organizational problems. Traditionally, the service desk of most business organizations was reactive to customers' requests. The process was thus inefficient and time consuming for both the clients and the staff involved. AI technology is changing the mode of operation in service desk and project management in recent times. The main essentials required to achieve the intended goals include incorporation of an Enterprise Language Model (ELM) into AI bots, facilitation of user interactions, and capacity to address service request by linking the bots to appropriate knowledge databases. Popular applications of AI in service Desk include self-service portals and chatbots. In project management, AI systems are used to predict and offer preventive solutions to foreseen incidences. AI technology can also propose the type and amount of staff required for particular projects. The main challenges facing AI technology in service desk and project management is threat to human employment, large scale application, and accuracy of delivered services.
There is a need to check on the most common applications of AI/MI in service desk and project management in businesses and determining new measures that can improve efficiency in organizations. There is also need to assess the challenges posed by AI systems and propose reliable mitigation measures.It is important to note that most organizations are currently investing in artificial intelligence and thus improving the security of the digital programs that are being used at the moment is a good way to maximize on the overall security of the various processes that are used in most cases.
Draft Research Question-1
What are the common sources of security breaches in the current times? Draft Research Question-2
Which security measures can be improved at the moment to make sure that online security is maximized? Are the current measures effective?
Draft Research Question-3
What are the adjustments that Atos Company is supposed to involve to make sure that the current issues are responded to in the best way possible?
Does the company have an able investigative team?
Draft Research Question-4
What are the common cybercrime fraud activities have the strongest impact on the financial sector that needs to be addressed? Are there measures in place to respond to cybercrime? Have these measures succeeded in solving the various cybercrime issues that have been reported?
References:
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M. and Liu, M., 2015, August. Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In USENIX Security Symposium (pp. 1009-1024).
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, pp.52-80.
Saini, S., Beniwal, R.K., Kumar, R., Paul, R. and Saini, S., 2018. Modeling for improved cybersecurity in a Smart distribution system. International Journal on Future Revolution in Computer Science & Communication Engineering, Accepted.
Harrop, W. and Matteson, A., 2015. Cyber resilience: A review of critical national infrastructure and cyber-security protection measures applied in the UK and USA. In Current and Emerging Trends in Cyber Operations (pp. 149-166). Palgrave Macmillan, London.
Buczak, A.L., and Guven, E., 2016. A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.
Buczak, A.L., and Guven, E., 2016. A survey of data mining and machine learning methods for cybersecurity intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.
Fan, X., Fan, K., Wang, Y. and Zhou, R., 2015, August. Overview of cyber-security of the industrial control system. In Cyber Security of Smart Cities, Industrial Control System and Communications (SSIC), 2015 International Conference on(pp. 1-7). IEEE.
Chakhchoukh, Y. and Ishii, H., 2015. Coordinated cyber-attacks on the measurement function in hybrid state estimation. IEEE Transactions on Power Systems, 30(5), pp.2487-2497.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016. A review of cybersecurity risk assessment methods for SCADA systems. Computers & security, 56, pp.1-27.
Korpela, K., 2015. Improving cybersecurity awareness and training programs with data analytics. Information Security Journal: A Global Perspective, 24(1-3), pp.72-77.
Kabalci, Y., 2016. A survey on smart metering and smart grid communication. Renewable and Sustainable Energy Reviews, 57, pp.302-318.
Gray, D. and Ladig, J., 2015. The implementation of EMV chip card technology to improve cybersecurity accelerates in the US following target corporation's data breach. International Journal of Business Administration, 6(2), p.60.
Pal, R., Golubchik, L., Psounis, K., and Hui, P., 2014, April. Will cyber-insurance improve network security? A market analysis. In INFOCOM, 2014 Proceedings IEEE (pp. 235-243). IEEE.
Skopik, F., Settanni, G., and Fiedler, R., 2016. A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. computers & security, 60, pp.154-176.
Liu, X., Dong, M., Ota, K., Yang, L.T. and Liu, A., 2016. Trace malicious source to guarantee cybersecurity for mass monitor critical infrastructure. Journal of Computer and System Sciences.
Min, K.S., Chai, S.W. and Han, M., 2015. An international comparative study on cybersecurity strategy. International Journal of Security and Its Applications, 9(2), pp.13-20.
Jokar, P., Arianpoo, N. and Leung, V., 2016. A survey on security issues in smart grids. Security and Communication Networks, 9(3), pp.262-273.
Kuypers, M.A., Maillart, T. and Pate-Cornell, E., 2016. An empirical analysis of cybersecurity incidents at a large organization. Department of Management Science and Engineering, Stanford University, School of Information, UC Berkeley, http://fsi. stanford. edu/sites/default/files/kuypersweis_v7. pdf, accessed July, 30.
Schuster, S., van den Berg, M., Larrucea, X., Slewe, T. and Ide-Kostic, P., 2017. Mass surveillance and technological policy options: Improving security of private communications. Computer Standards & Interfaces, 50, pp.76-82.
Singhal, A. and Ou, X., 2017. Security risk analysis of enterprise networks using probabilistic attack graphs. In Network Security Metrics (pp. 53-73). Springer, Cham.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern cryptographic solutions for computer and cybersecurity. IGI Global.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cybersecurity knowledge on attack detection. Computers in Human Behavior, 48, pp.51-61.
Shafqat, N. and Masood, A., 2016. Comparative analysis of various national cybersecurity strategies. International Journal of Computer Science and Information Security, 14(1), p.129.
Liu, R., Vellaithurai, C., Biswas, S.S., Gamage, T.T. and Srivastava, A.K., 2015. Analyzing the cyber-physical impact of cyber events on the power grid. IEEE Transactions on Smart Grid, 6(5), pp.2444-2453.
Jentzsch, N., 2016. State-of-the-Art of the Economics of Cyber-Security and Privacy. Browser...
Cite this page
Project Planning Template on Cyber Security. (2022, Jun 03). Retrieved from https://speedypaper.net/essays/project-planning-template-on-cyber-security
Request Removal
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- Reflection Paper Example on the Dissertations
- Marketing Essay Example: Product Placement
- Emotional Communication Essay Example
- Paper Example: Two Tort of Negligence
- Where Should the Line Be Drawn Between Religious Observances and Public Education? Free Essay
- Paper Example: Wonderful World of WiFi
- Essay Sample - Prior Research on Conceptualizing Culture: Possibilities for Political Science
Popular categories