Your Perfect Assignment is Just a Click Away
We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

BUAD 303 University of California Riverside Cyber Security Risks Professional Report

BUAD 303 University of California Riverside Cyber Security Risks Professional Report

The APA 7 professional report will consolidate the ideas you have on your APA-style professional proposal which I have attached down below. The APA 7 professional report should be at least 2,000 words. The professional report will include the following: Title Page Abstract – a summary of the paper Introduction – show the paper will be interesting, original, and important Literature Review – show a foundation exists and show your familiarity Research Design – overall approach, steps to be taken, sources of information, practicalities, and obstacles Implications – Contribution to existing knowledge, confirming or developing a theory, challenging a current assumption, creating a basis for further research Reference List Formatting Guidelines 12-point font Times New Roman Double-spaced 1-inch margins An APA running head – shortened title, all caps limited to 50 characters, in the upper left corner of each page Page number at the top right of each page A title page with the paper’s title (no more than 12 words in length), your name, supervisors name, department and the name of your institution An abstract (150-250 words), centered and bolded at the top of the page Follow the abstract with a short list of key words In-text citations (formatted accordingly to APA 7 guidelines) References page (formatted accordingly to APA 7 guidelines) Include at least 6 references References that are not cited will result in a zero for the report! Made-up citations and citations without references will result in a zero for the report! Running head: BUSINESS ANALYTICS PROPOSAL Business Analytics Proposal Mohammad Mirza Cal State University Fullerton 1 BUSINESS ANALYTICS PROPOSAL 2 Business Analytics Abstract Cyber risk refers to the risk of a cyber business or virtual environment compromising the internet, wireless communication, or even cloud computing. Attempts to give a more precise definition of this risk have been made. For instance, the CRO forum defines cyber risk as any threat emanating from the utilization of electronic information and its transmission. This often includes technology tools like telecommunication networks and the internet (Strupczewski, 2021). Cyber risk also encompasses the physical damage which results from cyber-attacks and fraud that is committed when information is misused or any form of liability that arises from the storage of information. Furthermore, compromise to data integrity and confidentiality as a result of access by unauthorized persons presents potential cyber risks. There are reputation-related risks to institutions that could potentially hurt an organization in terms of finances and image due to the compromised trust in their systems. Over the last decades, there have been increased instances of cyber threats on customer data, leading to massive leakages of confidential information like customer financial information. BUSINESS ANALYTICS PROPOSAL 3 Introduction The increased cyber-attacks on electronic data systems have led to a significant surge in cyber risks. This hence has called for more attention to examine causes and develop appropriate solutions that would enhance cybersecurity and avert potential risks that would compromise data confidentiality or integrity. The purpose of this essay is to examine the issue of cyber risk. The aim is to establish the causes, risks posed, risk characteristics and remedies that can be used to prevent such risks. This essay is important in understanding the scope of cyber risks, which is critical in coming up with appropriate remedies. Literature Review The origin of cyber risks could either be internal or external. A cyber risk event is often either deliberate, malicious or intentional (Kashyap & Wetherilt, 2019). However, there are situations when they are unintentional, especially when associated with a glitch of software, misconfiguration of IT components or malfunction of hardware. Having a clear understanding of cyber risk causality is vital from various perspectives. It helps establish internal control systems and IT safety components (Radanliev et al., 2018). There is often a convergence of cyber risk effects and other risk domains. The discussion of cyber risks is often on a standalone basis. It is because cyber risk has turned into a material threat over a few years ago. As a matter of fact, effects associated with cyber risk have yet been confined or isolated. However, the impacts often cause consequential strain of events that often influence and overlap with the other cyber threats. Hence, from a broader framework of risk management, it is challenging to evaluate potential cyber risks. BUSINESS ANALYTICS PROPOSAL 4 Cyber risk affects convergence with operational threats. This is whereby an event of cyber risk has the potential of causing external fraud, financial losses, damage of electronic data or even theft of confidential data (Radanliev et al., 2019). Besides, convergence may also impact legal as well as regulatory risks. When organizational or customer’s privacy is breached, it leads to the loss of confidentiality, hence attracting legal penalties. There are also systematic related risks. In this case, the magnitude of a cyber risk effect could result in different degrees of loss for informational integrity. Reputational risks also could result in the loss of public confidence and prolonged disruptions to services. An exponential increment in cyber risk has been recorded since there are various points at which data is exchanged or information leaks. Today, access to information has become global, and there is no longer corporate confinement (Böhme, Laube & Riek, 2019). Internal and external cyber risks to data loss have risen with the increased growth in the points at which data exchanges occur. For example, the use of removable storage devices has largely increased. Thus, given the rise in the level of data storage capacity and the portability of such devices, there is a high risk of data theft. The use of USBs further creates additional risk associated with targeted computer malware distribution, disruption or, in some instance’s corruption of electronically transmitted data. The continued growth and use of outsourcing to the third-party FinTech providers such as cloud computing that entails transmission of information increase the cyber threats due to potential cyber control weakness, possible human error or, in some instances, targeted intrusions of electronic data platforms (Antonucci, 2017). Lead players in cases of cyber risks are numerous and diverse. There is a broad array of players involved in planning, initiating, financing and BUSINESS ANALYTICS PROPOSAL 5 undertaking cyber-related attacks. Such could include untrained staff, dishonest employees, international cybercriminals, entities sponsored by governments and competitors. Gaps Nature, scale, and effect linked to an incident of cyber risk pose critical challenges in addressing this issue. To enhance both the effectiveness and relevance of supervisory expectations, guidance, regulations and processes, there is a need for having a continuous assessment to know whether there is still alignment with risk components. There is a limitation of appropriately qualified and experienced technical professionals in nearly all jurisdictions to deal effectively with cyber-related risks. The demand for these skills has continued to increase across different organizations. The material level of data is required for enhanced cooperation between national and universal stakeholders. Also, timely exchange of information on the likelihood, effects, and possible mitigation of cyber risks is vital in fostering the resilience of cyber risks in various jurisdictions. Research Design and Methods The research will employ a case-study design. The design will help narrow down the research problem into small and discrete problems that can easily be researched. The study design will test for applicability of various research theories and models about cyber risk. Content analysis will be used as the research method. The research will be used to quantify and analyze the presence, meaning, and relations between words and concepts. Inferences will also be made regarding the cyber risk. Some of the factors that will be considered will include; study base, study timeline, and research design in terms of qualitative or quantitative research and research reliability. BUSINESS ANALYTICS PROPOSAL 6 Implications and Contributions to Knowledge The establishment of risk-based cyber risk mitigation priorities is a key supervisory approach. This entails information sharing, learning as well as experiences between various cyber risk supervisory agencies. Cyber risk supervision programs can be enhanced by assessing the experiences of individual firm recovery processes. Cybersecurity enhancement processes need to be elaborate. Such processes would involve cyber risk identification, which involves baseline situations, risk exposure, threat profile, and expected losses. Besides, it involves protection through increased cybersecurity capabilities and third-party patches, which ensures security and the functionality of the application environment while reducing the risk of cyber risk exposure. Cyber risk detection is also important and involves periodic scans of security issues, vulnerabilities and network vulnerability recognition through penetration tests. Response and recovery also playa a major role in reducing cyber risks in that it helps to boost risk preparedness and effectiveness in responding to emerging threats. BUSINESS ANALYTICS PROPOSAL 7 References Antonucci, D. (2017). The cyber risk handbook: creating and measuring effective cybersecurity capabilities. John Wiley & Sons. Böhme, R., Laube, S., & Riek, M. (2019). A fundamental approach to cyber risk analysis. Variance, 12(2), 161-185. Kashyap, A. K., & Wetherilt, A. (2019, May). Some principles for regulating cyber risk. In AEA Papers and Proceedings (Vol. 109, pp. 482-87). Radanliev, P., De Roure, D. C., Nicolescu, R., Huth, M., Montalvo, R. M., Cannady, S., & Burnap, P. (2018). Future developments in cyber risk assessment for the internet of things. Computers in industry, 102, 14-22. Radanliev, P., De Roure, D., Nurse, J. R., Nicolescu, R., Huth, M., Cannady, S., & Montalvo, R. M. (2019). Cyber risk impact assessment-assessing the risk from the IoT to the digital economy. Strupczewski, G. (2021). Defining cyber risk. Safety science, 135, 105143. BUSINESS ANALYTICS PROPOSAL 8 Research Schedule Research Phrase Objective Deadline Cyber risk To help define what cyber 10th April 2021 threat entail and associated risks Cyber security To help in understanding 15th April 2021 what cyber security is and how it can be enhanced Cyber space To help understand the whole 25th April 2021 theme surrounding internet usage Impact assessment and final Help understand the process draft of examining cyber risks. Finish final draft 30th April 2021 Purchase answer to see full attachment Tags: local government Global operations Cyber Risks Cyber security risks security maturity model User generated content is uploaded by users for the purposes of learning and should be used following Studypool’s honor code & terms of service.

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Homework Free only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Homework Free are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Homework Free is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Homework Free, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

Homework Free Org

Your one stop solution for all your online studies solutions. Hire some of the world's highly rated writers to handle your writing assignments. And guess what, you don't have to break the bank.

© 2020 Homework Free Org