Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

5 Cybersecurity Student’s Name Institutional Affiliation Course Number and Name Professor’s Name Date Cybersecurity Introduction In recent years, there have been increased cases of terror attacks that pose threats to different sectors of the economy

Communications May 23, 2021

5

Cybersecurity

Student’s Name

Institutional Affiliation

Course Number and Name

Professor’s Name

Date

Cybersecurity

Introduction

In recent years, there have been increased cases of terror attacks that pose threats to different sectors of the economy. Also, with increased emerging threats and cyber insecurity, the United States, in particular, continues to face a lot of challenges as far as terrorism is concerned (Boys, 2018). The terrorists use high-end weapons with advanced technology to succeed in their missions. Several business setups and organizations in the United States of America have undergone cyber-attacks, putting them in a bad state. Other parts of the world have recently increased their pace in putting up various measures to keep their properties and people safe because of the increasing emerging trends and technological advancement (Boys, 2018). Furthermore, to curb the situation, the world's attention has shifted to protecting intellectual property, eradicating terrorists and stopping any form of danger by the use of modern technology.

Problem Statement

The US economy mostly relies on entrepreneurship as the backbone of the economy. Investors have put resources in various businesses such as the entertainment industry, food and hotel industry, transport and logistics industry. These businesses have undergone many cybersecurity attacks where their sites get hacked by internet users exposing their vital information to unauthorized people (Sanchez et al., 2020). Since this is a severe problem in the country, the security personnel have been disturbed, and technological advancements as a corrective measure are underway.

Purpose statement

At the end of this research work, the objective is to determine the policies and measures based on technological advancement that will help control the cybersecurity problem in the country. Also, the study revolves around different stakeholders in the security department, including the National Security Agency and its capacity to fight cybersecurity (England, 2020). Another critical topic captured in the research is how cybersecurity affects businesses in the country, the extent of losses they incur, and the customs that the companies can put in place to regulate the losses.

Research Questions

In the whole process,questions have been formulated by the concerned parties to aid in the project. The questions have been divided into two parts, i.e., primary and secondary, to bring the scope clearly for a good understanding. For immediate question, it emphasizes if it is true that cybersecurity has effects on the businesses in the United States of America. In part two, the questions are separated into minor segments for gathering more information for the research paper. They include; whether the National Security Agency can control the cybersecurity issue in the country or not, if there is a connection between technological advancements that exist in the country and the required technology to eradicate the menace (Sayler, 2019). Another question is whether the structures in the security docket is trusted in fighting cybersecurity in the US. Lastly, the recommendations that various stakeholders hold regarding new trends and advancement in technology are concerned.

Results of the Study

The study took one month within the boundaries of the country. Most importantly, business premises formed the Centre of study in terms of data collection. Various methods, including conducting interviews, presenting questionnaires, observations and the use of already recorded tapes and documents, helped collect data. Answers from the participants were satisfactory, thus achieving the aim of the study. It was clear from the results that cybersecurity is a problem affecting businesses in general in the country. The challenge comes when the source codes and passwords are retrieved by the hackers and use for their financial gains (Sanchez et al., 2020).To answer the question concerning state security, most of the respondents had trusted the National Security Agency in controlling cybersecurity. However, the participants raised doubts concerning coordination in structures within the security as not unanimously up to the task.

Concerning the technological advancements, most of the respondents were sure of the buildup of technology in the country. On the recommendations, the participants emphasized the government to take the matter of cybersecurity as a national concern and use state machinery to fight the problem (Sanchez et al., 2020). Also, the stakeholders urged the management of businesses to draft plans to fight cybersecurity for prosperity in the economy. Strict rules and regulations were proposed as a measure to control cybersecurity. Above all, cybersecurity is a common problem affecting the country, and every member has to join hands in handling the situation.

Independent and Dependent Variables

In the research work, there are two main competing topics, i.e., cybersecurity and the technological advancement in controlling cybersecurity. Also, an independent variable is the part of the study which does not change with the prevailing environments. In this case, cybersecurity, as part of the study, forms the independent aspect (Sivan-Sevilla, 2019). On the contrary, dependent variables are the parameters that vary in the equation to give lasting solutions to the problem. Concerning the research, the technological advancements and actions taken by the public and security department to control the problem form part of the dependent variables.

Hypothesis

The research problem is how cybersecurity affects businesses in the US and the deployment of technological advancements as a tool to control the situation.

Hypothesis statement 1: If cybersecurity is controlled, then business prosperity is guaranteed.

Hypothesis statement 2: if cybersecurity is not controlled, then business failure is guaranteed.

Expert Solution

For detailed step-by-step solution, place custom order now.
Need this Answer?

This solution is not in the archive yet. Hire an expert to solve it for you.

Get a Quote
Secure Payment