Final3333333

User Generated

81853_

Computer Science

Description

Please find the attachment.

Unformatted Attachment Preview

Topic: Cyber-Security Skills Gap Fixes Must Support Minorities Final paper must follow the one of the provided templates and include, at minimum, the information below • • • • • • • • • • • • • • • • • • Title Page (1 page separate from other pages) Table of Contents (pages as needed and separate from other pages) List of Tables, Figures and Appendices (pages as needed and separate from other pages) Abstract (1 page separate from other pages) Introduction (pages as needed) • Problem Statement • Research Question (s) • Rationale (pages as needed) • Definitions (if applicable) (pages as needed) • Hypothesis (if applicable) (pages as needed) Literature Review (pages as needed) Methodology (pages as needed) Research Design • Describe and define the research approach or strategy used and how this approach was appropriate for this research Participants • Describe the sample population (number, gender, age, socio-economics, etc.) including how you obtained permission and consent Instrumentation • Describe any instruments used to collect data Procedure • Provide the detail about how you conducted the research Data Processing and Analysis • Explain, in detail, how you processed and analyzed collected data Summary Results (pages as needed) Discussion (pages as needed) Conclusions (pages as needed) References (pages as needed and separate from other pages) (minimum of thirteen (13) peerreviewed, professional references) Appendices (if applicable) (pages as needed and separate from other pages The paper does not have a page limitation (maximum or minimum) (Black font points have to be completed and edit as per the need) • • • • • The presentation must be a Microsoft Office PowerPoint file (.ppt or .pptx) uploaded. Project introduction Description of the issue, project, problem (problem statement) overview of your research findings/results (Traditional Research) Overview of what went well in the project Overview of what could be improved • o o o • Overview of what you learned about: Project management Following procedures Yourself Do not include what you learned about programming, programming languages, applications, or any other technical aspect of your research Students who developed a website, a webpage or webpages, a productivity, social media, or gaming application must present a live demonstration of their final product.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: CYBER-SECURITY SKILLS GAP FIXES MUST SUPPORT MINORITIES

Cyber-Security Skills Gap Fixes Must Support Minorities
Name
Institution

1

CYBER-SECURITY SKILLS GAP FIXES MUST SUPPORT MINORITIES

2

Contents
Introduction ..................................................................................................................................... 3
Problem Statement .......................................................................................................................... 4
Research Questions ......................................................................................................................... 5
Rationale ......................................................................................................................................... 6
Definitions....................................................................................................................................... 7
Hypothesis....................................................................................................................................... 7
Literature Review............................................................................................................................ 8
Methodology ................................................................................................................................. 12
Research Design............................................................................................................................ 13
Sample Population ........................................................................................................................ 14
Instrument ..................................................................................................................................... 15
Data Analysis ................................................................................................................................ 16
Summary ....................................................................................................................................... 16
Results ........................................................................................................................................... 16
Discussion ..................................................................................................................................... 17
Conclusion .................................................................................................................................... 17

CYBER-SECURITY SKILLS GAP FIXES MUST SUPPORT MINORITIES

3

Cyber-Security Skills Gap Fixes Must Support Minorities
Introduction
Organization familiarization with cyber security has continued to increase over the years,
and this is important as it helps in securing the organization systems from any malpractice. The
prediction of cyber security attacks is that they will continue to increase as the improvement in
technology advance. The reason for the continued increase in the insecurities in the digital world
is due to lack of professionals in the field that are skilled in handling the insecurities in the
market. It gap that is created enables the cyber-attacks, and this leads to the focus on the
importance of the creation of awareness of the changes that continue to take place in the
technological environment and the need for the protection of the business environments. The
demand for the information technology specialists continues to increase, and this is important in
the technological field as there is focus on the areas that lead to the improvement of the
efficiency of operation.
The vulnerabilities of the companies and the embracing of the changing technology
requires that there is the management of the crimes that are likely to take place and acting on the
different changes in the environment. The professionals are trained on the handling of the
various attacks, and this means that they come up with the initiatives that guide the protection of
the systems and the formation of different expectations according to the processes that are
implemented to protect the system (Huseyin & Mehmet Akif, 2016). The complexities of the
system lead to the need to focus on the measures that help in solving of the threats and the
certification of the professionals in providing effective solutions. The recognition of the security
measures and the need to focus on the company activities helps in adding value to the
organization and focusing on the activities that help in protecting the businesses.

CYBER-SECURITY SKILLS GAP FIXES MUST SUPPORT MINORITIES

4

Problem Statement
Cyber securities are the measures that an organization implements in helping to increase
the protection of the systems, and they include processes, measures, and technology. The
effectiveness of the security measures is important in helping to reduce the risks that an
organization incurs and the need to enable the proper functioning of the technologies, networks,
and systems. The damage that the attacks cause in the organization leads to increased losses, and
this necessitates for the need for the protection of the systems and the focus on the maintenance
of the company reputation. It is important that there is an improvement in the security measures
by limiting the access to the different systems as in the case; there is an improvement in the
performance of the organization and the elimination of the weaknesses that exist in the company
systems.
There are different types of threats that organizations face, and this includes the hacking,
and the criminals come up with various ways of reinventing the attack methods necessitating the
need for the professionals that are aware of the changes taking place in the market. The attacks
implemented by the hackers are effective, and this means that the protection of the data is critical
in helping to analyze the different challenges and increasing the organization of various ideas in
the management of the effectiveness of the operation of the organizations (Abawajy, 2014).
Some of the common attacks that organizations are likely to face include malware and this come
in as an attachment on an email that leads to the attackers gaining access to the information of
the user. The stealing of data takes place, and this could lead to harming the organization
especially where confidential data is involved. Phishing is an act that compels one to click on
the pop-ups, and this affects the operation of the computers as the attackers gain access to the
information in the computer. The malicious attacks in the company affect the verification process

CYBER-SECURITY SKILLS GAP FIXES MUST SUPPORT MINORITIES

5

of the different information necessitating for the implementation of measures that help in the
improvement of the effectiveness of the operation of the company. An SQL attack leads to the
increase in the exploitation of the information, and this increases the vulnerabilities of the system
creating the need to focus on the storage of data and the protection of the sensitive information in
the company.
The need for the professionals in the different organization is to help in the management
of the security of the systems and ensure that there is focus on the trends of the attackers. The
gap that exists in the cybersecurity and the skills widens with the improvement in technology.
The gap is attributed to the practices that the organization uses in hiring, and this leads to
increased complications where the staff does not have the necessary skills of handling the
insecurity issues (Amoroso, 2011). The preparation of the people in dealing with the security
issues should be focused on the analysis of the vulnerabilities and the need to come up with the
right measures that protect the business environment. Different companies in many cases are not
aware of the right qualifications of the professionals in dealing with the various cyber-attacks.
The gaps lead to the need to focus on the auditing of the systems and the development of the
different areas in the organization.
Research Questions
The research questions are important in guiding the areas in which the gaps in
cybersecurity exist ...


Anonymous
Great content here. Definitely a returning customer.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags