Tuesday, December 10, 2019

Quality Challenges Cyber Physical Systems -Myassignmenthelp.Com

Question: Discuss About The Quality Challenges Cyber Physical Systems? Answer: Introduction Cyber security can be considered to be used interchangeably for mainly information security, in which the latter takes into account the role of human in process of security whilst the former deems this as a supplementary management and also, centre person has a prospective target. Nevertheless, this kind of conversation on cyber security has significant implication since it stresses on the ethical aspects of the community on the whole. In a bid to deal with this specific issue of cyber security, diverse frameworks as well as models are designed. The current study also initiates the notions of cyber security from the dimension of its framework, workforce as well as information associated to shielding personal information in the computer. Project Objective The primary objective of this study is to conduct an assessment of literature on diverse issues associated to cybersecurity encountered by contemporary companies owing to the reputation of the internet along with internet-based services. The researcher intends to analyse diverse firms and the cyber-attacks encountered by these firms to comprehend the influence of cybercrimes (Massey 2017). Again, the secondary aim is to deliver a variety of suggestions that can be used by firms to address the threats of cybersecurity. Scope of the project In the current study, the researcher intends to analytically review the influence of the internet as well as other online services on the function of firms and comprehend the alterations in their functions to evaluate their susceptibility towards threats of cyber crime. In addition to this, the researcher also needs to assess diverse cyber threat, along with online risks encountered by corporations in current years (Monostori 2014). Different theories along with professional advice explained in the section on review of literature can help in understanding the aims of the study. Review of literature Cyber security mainly upon care that diverse individuals can get and conclusions that they arrive at whilst they arrange, handle and use systems along with Internet. Efforts are put to discover solutions for particularly cyber security analysis challenge and diverse structures are also constructed. Nevertheless, the structure faces diverse intricacies even though it was initially working at the time of development (Wan et al. 2014). The limitations draw from different aspects, namely, emerging technologies along with facility restrictions. As rightly indicated by Ruchkin et al. (2016), progression of the internet in the past decade has augmented overall utilization of the internet based services in various corporations. Several corporations utilize infrastructure founded on internet to deliver the services as this makes it seamless for organizations to reach out to global audience. In place of large firms, internet use has essentially become substantially accepted among individuals, business entrepreneurs along with small corporations. As suggested by Taylor et al. (2014), individuals make use of internet for the purpose of connecting as well as sharing with friends and families. This also delivers business opportunities to various business entrepreneurs together with small corporations to expand the business operations. In addition to this, both business concerns along with people upload various sensitive along with personal data on particularly the internet that makes them the potential target for cyber attacks. Majo rity of cyber crimes are undertaken by individuals who have admittance to the internet as well as computer as inadequacy of security dimensions can make it seamless for them to target various innocent individuals. According to Elmaghraby and Losavio (2014), there are different hackers that undertake various cybercrime for the purpose of collecting personal data of individuals along with corporations in order to acquire an unfair advantage. In addition to this, popularity of the internet has made it seamless for them. Particularly, there are various causes owing to which cyber attacks has augmented in the last decade. Harel et al. (2017) illustrated that social media sites can be regarded as one of the primary reasons for individuals susceptibility to cybercrime. Reports suggest that there are over and above 2.9 million active users on multiple social media platforms. However, together with popularity of the social media stages, the cybercrimes risk has developed thoroughly. Hackers also target the social media takes into account and corporations to acquire sensitive data. Majority of the corporations namely the PlayStation, Yahoo as well as HBO had also encountered cybercrimes that led to loss of important data. Robinson et al. (2015) suggests that mobile banking can be considered to be another important ground that contributes to enhancement of the total number of cyber crimes on particular individuals as well as firms. This is mainly because this presents the chance to acquire unfair benefit. During the year 2017, approximately 44% of the entire globes population utilizes smart phone and this enhances the overall internet based services. Utilization of online banking services namely PayPal, online shopping and use of mobile wallet has enhanced cyber security threats. Mishna et al. (2015) mentioned that in case of online banking, individuals have the need to share financial data on basically the online stages of banks. Several instances of the challenges encountered by corporations as regards online security include DDoS also known as Distributed Denial of Service attack. This happens mainly over a server and enhances the traffic of these kinds of server. Instances contain BBC, DYN, election campaign conducted by Donald Trump and five different Russian banks. In addition to this, Internet of Things (IOT) is also observed to develop at a fast space, let us say, smart home appliances have become popular among developed markets (Broy and Schmidt 2014). IoTs devices linked through single network led to risk of security. Research Questions/Hypothesis -Primary Questions -What are fundamentally the critical issues faced in the cyber security? -What are the factors affecting the cyber security? Secondary Questions -What are the challenges that are encountered majority of the time in the organizations? -What are the proper security measures against the cyber security threats? Research Design and Methodology The current research makes use of survey mechanism for the purpose of identification of diverse cyber security concerns along with experiment method for development of the framework. The current research study is associated to the cyber security management with reference to firm operating in Australia. In the current study, both primary as well as secondary data is acquired to discover the significance of network security and detection of intrusion system. In this case, primary data is gathered by means of survey method whilst secondary data is acquired from various published together with non-published data (Bogdan 2015). Primary Data: This current study can be acquired by means of survey method. Essentially, this data is basically unique in nature. Fundamentally, this data will be acquired by way of distributing the formulated questionnaire and getting the same filled by the respective respondents for the current purpose. In this case, the learner aims to use online questionnaire for the present purpose (Sha and Zeadally 2015). Sample Design: Sample design can be regarded as particular plans that can be designed by acquired samples from a selected population (Johnson 2015). In a bid to serve this specific purpose of the subject of the research, the learner intends to select a total of 30 sample units. In this case, the learner intends to utilize the sampling technique of purposive sampling along with convenience sampling. For the purpose of the present study, the population that the learner intends to select include various firms operating in different sectors in Australia. Therefore, in this case, the learner presents the sampling frame that consists of 30 industrial units in Australia. Essentially, the parameter of interest for the current study is ascertaining the challenges of cyber security in selected industrial units in Australia. Selection of respondent: The learner intends to select respondents of the current study that are operating in the industrial units in Australia and having over and above 2 years of work experience. In addition to this, the learner also intends to select the ones working in the IT or the IT security division of the firms (Mangharam et al. 2016). The researcher intends to send the questionnaire via mail to the selected respondents with request for reply. Questionnaire Questionnaire is primarily meant for the purpose of acquiring specific information regarding cyber challenges encountered by firm, different aspects of the cyber threats, primary factors contributing to the threats of cyber security (Massey 2017). In addition to this, the current study also intends to contain questions that can specifically help in gathering knowledge regarding different dimensions of cyber challenges, various instances of the cyber security threats in firms and the suggestions from the standpoint from their standpoint to combat this issue. Secondary Data The learner also intends to make use of secondary data that can be utilized for the purpose of studying the cyber security. This secondary data can be utilized to discover specific features, themes of the cyber crime, threats, and dimensions of measuring security measures to protect the security. Essentially, this secondary data can be obtained from various reputed academic journals, prior research articles, official websites as well as product documentation (Massey 2017). The current study has the intention to utilize both qualitative as well as quantitative research strategy in this regard. -Qualitative Research- The learner has the intention to utilize focus on in-depth interviews as well as carry out assessment of documents for different categories of themes. Essentially, the researcher has the intent to carry out a subjective study in this regards and describe the problem otherwise the conditions from the viewpoint of the ones experiencing the same. In this case, no statistical tests necessarily will be used in this regard. The methods of analysis marketing can be used in this study include the discourse analysis, case study analysis, observation and thematic analysis (Taylor et al. 2014). In this case, the discourse analysis takes in process of material coding, assessment of structure together with various assertions together with recognition of diverse dimensions of cyber security. -Quantitative Research- The learner also intends to present surveys as well as assess the available records for specifically numerical information. In this case, the learner has the intent to use deductive procedure and can be said to be justified as this can help in testing various pre-specified themes, constructs as well as hypotheses that can help in making up the theory (Sha and Zeadally 2015). In this case, statistical tests necessarily will be used in this regard namely descriptive as well as interpretive statistics. Research Limitations The current research primarily refers to cyber security, challenges associated to cyber security along with mechanisms that can avert the attack. However, the study does not focus on proper methods of companys security management (Sha and Zeadally 2015). Again, administrators of the corporation can undertake actions for different security management in 30 industrial units in Australia. Therefore, it might become difficult to generalise the conclusions drawn from the study. Time Schedule Main Activities 1st Month 2nd Month 3rd Month 4th and 5thMonth 6th, 7thMonth 8th, 9th and 10th Month Introducing current topic to be selected under consideration Ascertainment of objective of the project Ascertainment of scope of the project Assessment of literature Development of research questions Development of research design and research methodology Specification of research limitation Conclusion The current study helps in comprehending different studies from the standpoint of security and cybercrime. The current research proposal helps in understanding the research objective of conducting an analysis of literature on diverse issues associated to cybersecurity encountered by contemporary companies. The above study presents in detail general suggestions regarding the way to secure the system the way any kind of authenticated protocol can be used to defend the system intrinsically. References Bogdan, P., 2015, March. A cyber-physical systems approach to personalized medicine: challenges and opportunities for noc-based multicore platforms. InProceedings of the 2015 Design, Automation Test in Europe Conference Exhibition(pp. 253-258). EDA Consortium. Broy, M. and Schmidt, A., 2014. Challenges in engineering cyber-psychology systems.Computer,47(2), pp.70-72. Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety, security and privacy.Journal of advanced research,5(4), pp.491-497. Harel, Y., Gal, I.B. and Elovici, Y., 2017. Cyber Security and the Role of Intelligent Systems in Addressing its Challenges.ACM Transactions on Intelligent Systems and Technology (TIST),8(4), p.49. Johnson, T.A. ed., 2015.Cybersecurity: Protecting critical infrastructures from cyber attack and cyber warfare. CRC Press. Mangharam, R., Abbas, H., Behl, M., Jang, K., Pajic, M. and Jiang, Z., 2016, January. Three challenges in cyber-physical systems. InCommunication Systems and Networks (COMSNETS), 2016 8th International Conference on(pp. 1-8). IEEE. Massey, D., 2017, November. Applying Cybersecurity Challenges to Medical and Vehicular Cyber Physical Systems. InProceedings of the 2017 Workshop on Automated Decision Making for Active Cyber Defense(pp. 39-39). ACM. Mishna, F., Bogo, M. and Sawyer, J.L., 2015. Cyber counseling: Illuminating benefits and challenges.Clinical Social Work Journal,43(2), pp.169-178. Monostori, L., 2014. Cyber-physical production systems: roots, expectations and RD challenges.Procedia Cirp,17, pp.9-13. Robinson, M., Jones, K. and Janicke, H., 2015. Cyber warfare: Issues and challenges.CConclusionchkin, I., Samuel, S., Schmerl, B., Rico, A. and Garlan, D., 2016, December. Challenges in physical modeling for adaptation of cyber-physical systems. InInternet of Things (WF-IoT), 2016 IEEE 3rd World Forum on(pp. 210-215). IEEE. Sha, K. and Zeadally, S., 2015. Data quality challenges in cyber-physical systems.Journal of Data and Information management (JDIQ),6(2-3), p.8. Taylor, R.W., Fritsch, E.J. and Liederbach, J., 2014.Digital crime and digital terrorism. Prentice Hall Press. Wan, J., Zhang, D., Zhao, S., Yang, L. and Lloret, J., 2014. Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions.IEEE Communications Magazine,52(8), pp.106-113.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.