Tag Archives: Cyber Attacks

Cyber-Attack Proposal Summary

The following research proposal investigates the vulnerabilities that make small businesses susceptible to cyber-attacks. This proposed research will take suggestions and evaluate other previous similar research to make the study’s performance high quality. One hundred small businesses with under one hundred employees will be randomly selected to take the designed questionnaire about certain aspects of … Continue reading Cyber-Attack Proposal Summary

Cyber-Attack Layout

  Flow Chart: To start the flow chart, 100 randomly selected businesses with under 100 employees from the United States and Europe. 50 businesses will be from Europe, and the other 50 will be from the United States. After gathering the sample size for the study, managers and employees involved with the businesses’ technology will … Continue reading Cyber-Attack Layout

Saturation on Phishing and Other Cyber Attacks

The search topic for the proposed research was explaining cyber attacks such as phishing and good methods to educate and prevent these attacks. It is important for me to find articles that explain what phishing is as well as what other types of attacks are out there. It is also important that I find article … Continue reading Saturation on Phishing and Other Cyber Attacks

The Final Search

For my topic I am doing research on how cyber security involves with businesses. How having good security benefits with protecting your business. From data files, information and etc. and just want to expand on how cyber attacks try to breach data. Search 1: Terms-  Data Breach “AND” Data Privacy “OR” security Results- 346 Database- … Continue reading The Final Search

Diving Deep into Cyber Research

Citation: I am looking at using many different resources in my research about Cyber Security. Mostly with how we can prevent it, avoid it and be safe.   Frank, M. L., Grenier, J. H., & Pyzoha, J. S. (2019). How Disclosing a Prior Cyberattack Influences the Efficacy of Cybersecurity Risk Management Reporting and Independent Assurance. Journal … Continue reading Diving Deep into Cyber Research

In-Depth Investigation on Cyber-Attacks

I have a variety of sources that I will be using for my research proposal. My proposal is about cyber-attacks on small businesses. The sources I will be using have a number of areas covered in cyber-security, including Network Penetration Testing, Vulnerability assessments, perspectives of small business owners on cyber-attacks, and ransomware. Searching and Applying … Continue reading In-Depth Investigation on Cyber-Attacks

Rapidly Refining Research — Wk11

Source 1 Database: “EBSCOhost, Computer Source” Search: “Vulnerability AND Security AND Cyber Attack.” There were no other filters applied. Results: 122 Article selected: “Computer Security Vulnerability as Concerns the Electricity Distribution Grid” by Stosovic, Dimitrijevic, and Litovski. Subject terms: computer security, electric power distribution, cyberterrorism, malware, eavesdropping, artificial intelligence. Stošović, M. A., Dimitrijević, M., & … Continue reading Rapidly Refining Research — Wk11

Looking more in Depth with Cyber Attacks

Search 1: Database: Computer Source Boolean Terms: Cyber Attacks and Business Results: Using the Boolean search term led to 217 results. The filters I used were Peer-Reviewed Journals, publication date 1999 – 2022, and Full-Text Documents. Usefulness: The search yielded a slew of results, but what I was looking for was an article about cyberattacks against … Continue reading Looking more in Depth with Cyber Attacks

Boolean

Boolean searches AND Cyber Attacks

Search 1: Cyber security and Small Business Database Used: Academic Search Premier Boolean Term: Cyber security AND Small Business Limiters: Full Text Search Results: 136 Subject Terms: SMALL business. COMPUTER security. DATA protection. MANAGEMENT science. INFORMATION technology. INTELLECTUAL property infringement. Annotation: 80% of Small-To Medium-Sized Firms Fear a Security Threat. (2007). Computer Security Update, 8(4), … Continue reading Boolean searches AND Cyber Attacks

Cyber Attacks in Small Business Articles

My research topic is about cyber attacks in small businesses. Why small businesses are attacked and what can be done going forward. Simple Searches Database: Applied Science & Technology Keyword: cyber attacks Results: 1,327 Potential Article: GROSSE, E., SCHNEIDER, F. B., & MILLETT, L. L. (2021). Implementing Insider Defenses: How to avoid insider cyber-attacks by … Continue reading Cyber Attacks in Small Business Articles