Dissertation - Challenges of Cyber Security

The following report is based on the study of medium and large-scale business in the UK that is facing continuous cyber-attack. The aim of the report is to find out the current challenges that these organizations are going through. Due to digitalization, the dependency on tools and technology has increased but this has given rise to vulnerabilities. There are several incidents reported in the last few years where the, as well as the organization, had to face security breaches that led to the loss of business. The UK parliament itself has been a victim of this and the report discusses various types of threats. Through the study of major threat types, the action plans can be designed and users can know if they are facing symptoms of any (Markoff and Kramer,2011). The growing dependency on the digital platform has made the information accessible for users ta fingertips and same is the case of hackers. The attackers can use the data for manipulating and this fears even terrorist activity. In the study, it was found that the major objectives of cyber-attack are either financial driven or politically driven. The legislative policies related to cyber-crime are still vague and outsourcing has increased data disruption (Maurer, 2011). The issue cannot be handled by a one-sided approach and requires the joint effort. Despite digitalization been globalized, there is no global agreement for attackers. Several incidents of cyber-crime that have occurred in the UK have been discussed in the study with an intention to make the researcher aware. The ransomware keeps multiplying in multiple organizations. The real challenge lies that the strong organizations are not ready to accept the loopholes whereas it is extremely necessary to do the same for coming with a strong policy. The risk associated with business has been further divided into organizational vulnerabilities the challenges that can be addressed by improving the organizational efforts and human vulnerabilities that can be prevented through human actions. The 8 threats discussed are the most frequent and common attacks (Kharraz et al, 2015).