Essay Available:
page:
8 pages/≈2200 words
Sources:
20
Style:
APA
Subject:
Literature & Language
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 34.56
Topic:
Securing Information Systems: Safeguarding Against Electronic Threats
Research Paper Instructions:
For this assignment, you need to conduct and write an academic literature review on a topic of your choice, relevant to your degree. The review should demonstrate an understanding of the field of research related to the chosen topic and a firm grasp of competing hypotheses in the area. In preparing your submission, you need to take into account the following notes regarding topic choice, structure and content requirements.
Choosing your Topic
The topic of your literature review has to be related to one of the areas of research and/or practice that are associated with your degree. In choosing your topic, you may indicatively get inspiration from any undergraduate or postgraduate modules and projects you have undertaken, or any experience gained from placement or employment. Feedback on your topic choice will be provided from your tutors. You are strongly advised to make your choice within two days of the handout date.
Structure
You are free to structure your review in any way that you feel is more suitable to your topic. Indicatively, you can structure it as a standard essay, containing:
- An introductory section where you can define your topic, state the scope of the review and explain the organisation of the rest of the document.
- The main body where the review of relevant literature is provided.
- A concluding section where you briefly summarise the most important aspects of the literature review and point out potential gaps in existing research.
- A list of references (which is NOT included in the word count).
Content Requirements
The content of your literature review is directly dependent on your topic. However, the following are required as minimum:
- An appreciation of the professional, legal and ethical issues that are relevant to the chosen topic.
o For Information Systems Management students this may involve the ethics of dealing with trade-offs for different groups of stakeholders.
o For Computing students this may involve the ethics of cutting-edge software development for commercial purposes.
o For Artificial Intelligence students, this may involve the significant legal and ethical challenges raised by the use of AI.
o For Data Analytics, Internet of Things and Industrial Mathematics students, this may involve issues related to data privacy and protection.
o For Cyber Security and Digital Forensics students, this may involve looking into ethical hacking.
- A critical analysis of the most important academic publications relevant to the chosen topic, summarising their content, strengths and weaknesses.
- Referencing must strictly follow the APA 7th style which is used at the University of Huddersfield.
Research Paper Sample Content Preview:
SECURING INFORMATION SYSTEMS: SAFEGUARDING AGAINST ELECTRONIC THREATS
Student Name
Institutional Affiliation
Course Code
Instructor
Date
Introduction
In the digital era, protecting information systems and safeguarding against electronic threats is critical for individuals, governments, and organizations. As the reliance on technology keeps increasing and the interconnectedness of systems keeps increasing, cyber-attack threats have increased, prompting the protection of digital assets to be considered a major concern.
Cyber Threat Landscape
Cyber threats such as malware, phishing attacks, sophisticated hacking attacks, and data breaches constitute the biggest cyber security threats. These threats may lead to data leakage, integrity issues, and unauthorized system access (Cremer et al., 2022).
Objectives of the Review
This literature review aims to provide the reader with a deeper study of information systems and electronic dangers. The article comprehensively analyzes risk management techniques, detecting and preventing threats, response to incident strategies, and emerging cyber-attacks. The review seeks to synthesize current knowledge, point out gaps or contradictions, and highlight opportunities for future research and practical applications in securing information systems.
Structure of the Review
This literature review starts with a brief introduction that outlines the aim and the scope. The review proceeds to the professional, ethical, and legal dimensions pertaining to the process of securing the information system from electronic threats such as hacking. The section highlights the ethical obligation of organizations and personnel and the legal and regulatory framework governing cyber security. The following section evaluates different literature on the topic; it is the base for this literature review and identifies the strengths and weaknesses of security measures for securing information systems. After evaluation, gaps are identified in the next section and give a green light on future areas of study. The conclusion finally synthesizes the key findings, highlighting the strengths and weaknesses of all the articles reviewed while providing a concise assessment of the current state of knowledge.
Professional, Legal, and Ethical Issues
Information security systems in an organization relate to professional, legal, and ethical considerations.
Professional Responsibilities and Ethical Obligations
Individuals and organizations entrusted with the security of information systems have significant ethical obligations and professional responsibilities. The duties are mostly assigned to computer professionals and guided by the ACA code of ethics (Ethics and Security in Information Technology, 2023). Crucial and fundamental protective measures such as encryption, firewalls, and access controls need to be implemented to safeguard confidential data and digital assets (Chachak, 2024; Arogundade, 2023). Another essential requirement is the immediate and effective response to security issues such as data breaches or cyber-attacks to reduce potential harm and enhance stakeholders' confidence. High ethical standards must be upheld by professionals in the field to enhance a culture of transparency, accountability, and integrity. This comprises education and awareness on cyber security, proper handling of sensitive information, and commitment to the industry's latest and best practices (KKIENERM, n.d.).
Legal and Regulatory Frameworks
The ever-evolving landscape of cybersecurity is governed by a complex web of legal and regulatory frameworks. Data privacy laws, such as the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), impose stringent requirements on organizations to protect personal information and promptly notify individuals in the event of a data breach (Alexander, 2020).
Industry-specific regulations further heighten the need for robust security measures. The Health Insurance Portability and Accountability Act (HIPAA) mandates strict safeguards for protected health information (Centers for Disease Control and Prevention, 2019), while the Payment Card Industry Data Security Standard (PCI DSS) ensures the secure handling of financial data (Payment Card Industry Data Security Standards | University of Missouri System, n.d.).
Ethical Considerations and Dilemmas
Cybersecurity practices often raise complex ethical dilemmas and considerations. The practice of ethical hacking, while intended to identify and remediate vulnerabilities, treads a fine line between legitimate security testing and unauthorized access (Importance of Ethical Hacking for Cybersecurity | RiskXchange, 2023). On the other hand, surveillance measures such as installation of (CCTV) must be installed in a way that they observe people's privacy; privacy is a right of every citizen. The tension between security and privacy is a recurring theme, as the implementation of robust security measures may sometimes come at the cost of reduced privacy or increased monitoring (Power et al., 2021). The security departments at different levels should strike a balance between security and moral standards.
Stakeholder Considerations and Tradeoffs
Information system security stands out as a dynamic issue affecting not only the individual in the society but also the organizations (“Read ‘Computers at Risk: Safe Computing in the Information Age’ at NAP.edu,” n.d.). The community and government play a pivotal role in keeping the digital environment secure, as cyber-attacks have the potential to paralyze critical systems, breach national security, and compromise public faith; there should be government involvement in the safety of digital operations (Fadia et al., 2020). Though it requires the involvement of various actors and reaching a balance of "tradeoffs”, sustainable development is believed to be the only path towards a better tomorrow. It may be up to the governments to give equal value to the security aspects as well as the civil liberties and privacy rights of the people, while organizations should overcome the expenses and difficulties of setting up and maintaining vigilant security systems (Giordani, n.d.).
Analysis of Academic Publications
Ghelani et al. (2022) article on “Cyber Security Threats, Vulnerabilities, and Security Solutions Models in Banking.”
Key Findings
The paper by Ghelani et al. provides an insightful analysis of cybersecurity challenges in the banking sector. The authors highlight the increasing importance of cybersecurity due to the growth of online banking and digital transactions. They discuss various cyber threats like malware, phishing, SQL injection, and denial-of-service attacks that can compromise banking systems and customer data (Ghelani et al., 2022).
Strengths
Proposed Security Framework
Another key feature lies in the recommended cyber banking security framework, which offers a systematic approach to confront cybersecurity problems. It covers various topics, from entry points to threat propagation and operational controls, aiming to provide a robust defense against cyber threats. A standout trait of the framework is an encompassing method, utilizing means such as firewalls, access controls, vulnerability assessment, and security audits to upgrade the elevated security of the banking system.
Real-world Application
The authors indicate the applicability of their framework in real life by simulating the attacks to be performed and validating this approach in an e-banking scenario. This demonstrates the frameworks' feasibility and also shows the authors' attempt to connect the theoretical concepts to the practical applications.
Weaknesses
Limited Empirical Evaluation
Though the authors are engaged in attack simulations, the lack of a comprehensive empirical evaluation or case studies will not tell us the efficiency of the proposed framework in banking environments. Since the paper has not been experimentally validated in different types of banking institutions, its findings may need to be strengthened to apply in diverse banking environments through implementation.
Lack of Emerging Threat Analysis
The paper primarily focuses on traditional cyber threats. However, it does not extensively explore emerging threats like advanced persistent threats (APTs), cyber warfare, or the implicati...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
👀 Other Visitors are Viewing These APA Essay Samples:
-
how does Lu Xun arcticles affects Chinese literature
7 pages/≈1925 words | 5 Sources | APA | Literature & Language | Research Paper |
-
Downfall of Toys R us
10 pages/≈2750 words | No Sources | APA | Literature & Language | Research Paper |
-
Aviation History
11 pages/≈3025 words | No Sources | APA | Literature & Language | Research Paper |