CYBERSECURITY PROPOSAL
CYBERSECURITY PROPOSAL
Research Proposal
Institutional Affiliation:
NSEC506
Research Proposal on Cybersecurity
Introduction
In the global world today, the protection of intellectual property, curbing terrorism, and stop any form of threat by use of technology have become such important concepts. However, with increased emerging threats and cyber insecurity, the US continues to face a lot of challenges as far as terrorism is concerned. Many of the business organizations in the US and other parts of the world have recently struggled to keep their properties and people safe because of the increasing emerging trends and technological advancement.
The Project Objective
The research will look into the fundamental challenges, the emerging trends, and the technological advancement that has continued to pose serious risks to the United States National Security. We will as well look at the malware that usually targets security as well as the payroll which can be modified to access personal information illegally through credit cards.
Scope of the Project
The research will focus on the address to the cybersecurity challenges and understanding the sources of emerging trends and technological advancement. The proposal, therefore, predicts some of the challenges we face and the ways in which various businesses and organizations can prevent their people from these scrupulous people.
Research Questions
Many businesses and organizations in the US have faced various forms of cybersecurity attacks. These attacks have become a point of concern to the United States National Security. What follows is a set of questions that will be addressed in this particular research proposal.
Primary Questions
- Does cybersecurity affect the business organization’s performance in the US?
Secondary Questions
- Is it possible that the efficiency of National Security Agencies can reduce the cases of cybersecurity breaches?
- Is there a relationship between the level of technological advancement by the Security Agencies in combating emerging trends and technological advancement?
- Can the internal audit of the systems in place now help in reducing the cybersecurity breaches?
- What would be recommended in the wake of increased emerging trends and technological advancement?
References
Boys, J. D. (2018). The Clinton administration’s development and implementation of cybersecurity strategy (1993–2001). Intelligence and National Security, 33(5), 755-770. Retrieved from https://www.tandfonline.com/doi/abs/10.1080/02684527.2018.1449369
England, S. K. (2020). Internet of Things Device Cybersecurity and National Security (Doctoral dissertation, Utica College). Retrieved from https://search.proquest.com/openview/5d7b256576c5ad12d394c8719f1f3c15/1?pq-origsite=gscholar&cbl=18750&diss=y
Sayler, K. M. (2019). Artificial intelligence and national security. Congressional research service report R45178. Retrieved from https://www.everycrsreport.com/files/20191121_R45178_ddbcce24a6fbf02ad9e81387b5623295ac60f017.pdf
Sanchez, S., Mazzolin, R., Kechaoglou, I., Wiemer, D., Mees, W., & Schrogl, K. U. (2020). Cybersecurity space operation center: Countering cyber threats in the space domain. In Handbook Space Security (pp. 921-939). Springer. Retrieved from https://link.springer.com/content/pdf/10.1007/978-3-030-23210-8.pdf#page=922
Sivan‐Sevilla, I. (2019). Complementaries and contradictions: National security and privacy risks in US federal policy, 1968–2018. Policy & Internet, 11(2), 172-214. Retrieved from https://onlinelibrary.wiley.com/doi/abs/10.1002/poi3.189
Trump, D. J. (2017). National security strategy of the United States of America. Executive Office of The President Washington DC Washington United States. Retrieved from https://apps.dtic.mil/sti/citations/AD1043812