This is a two parter a bibliogarphy and a 21 page paper to go with the current topic in which you are working on. Everything must be in APA format and cannot exceed 25% of originality (plagerism). Att

Running Head: Capstone Proposal Form


American Public University System

American Military University

SCMT Undergraduate Capstone Proposal Form

Date:

Student Name

Session #

Submitted in partial fulfillment of the degree requirements for the

BA in Security Management

Abstract

With technology advancement and the technological risks facing business organizations today, there is need to investigate if cyber security will keep up with rising changes in technology crimes. Many business organizations are suffering huge losses due attack of organization data by cyber criminals due to lack of security to their systems or their securities are breached by cyber criminals. This study is seeks investigate impact of cyber security crisis planning as a way of curbing cyber criminals, impact of cyber security crisis management and regular surveillance of technology in an organization as one of the process of curbing cyber-crime. The study will use qualitative research methods in data collection and analysis. The rationale for this methodology is due to its in depth understanding of a phenomenon that is under study.

Problem Statement

With technology ever advancing and cyber criminals rising to meet the changes, can cyber security keep up?

Purpose Statement

Cyber criminals are increasing changing their tact of doing crimes as the technology is advancing. Usage of computer software which allow multiple users like business organization, vendors and customers face a high risk of being hacked if adequate security is not taken into consideration. With advancement in technology, cyber criminals are increasingly advancing to beat the advancements in security that is brought about by the advancement in technology. Cyber criminals are able to access sensitive information stored in computers, mobile devices and even hacking into financial accounts of those people who use magnetic or swipe cards.

The most effective way for mitigating risk associated with cyber-crime in an organization is identification of assets to protect. Priorities are then given to those assets which are most important and store crucial data such as corporate and client’s data that incase of attack, an organization may suffer huge losses.

The risk management process starts with cyber security outline which is established by each department in a business organization. Usually, there exists software in market which can assist in mapping the data of organization. When data has been mapped, better decisions on how that data can be secured and therefore reduce risk of being attacked by the cyber criminals. With technology advancement and the technological risks facing business organizations today, there is need to investigate if cyber security will keep up with rising changes in criminals as a result advancement in technology.

Research Questions

Q1. Is cyber security crisis planning appropriate to curb cyber criminals?

Q2. Is Cyber security Crisis Management appropriate in deterring cyber-crime?

Q3. Is regular surveillance of technology in an organization way to curb cyber-crime?














Key Points Addressed

P1. To study the cyber security crisis planning as appropriate way to curb cyber criminals.

P2. To investigate the impact of Cyber Security Crisis Management in preventing cyber- criminal

Q3. To assess regular surveillance of technology in an organization as one of the process of curbing cyber-crime













Proposed Methodology/Research Strategy

This study will use qualitative research methods. The rationale for this methodology is due to its in depth understanding of a phenomenon that is under study. The methodology gives descriptions that are detailed which may be used to build a theory. The second reason for usage of qualitative method is due to its explanatory nature in that the research will allow finding of new ideas and occurrences that were never anticipated.

This study will be a small scale research and therefore the use of qualitative method of research will be justified. Qualitative method is usually associated with small scale research since the method of collecting data mainly involve; focus groups, observation and interviews. Finally, this method is warranted since the researcher may aid as a participant. In this case, the researcher offers insights as well as may observe during data collecting process.


Assumptions

The researcher assumes that the respondents will cooperate and provide the data required for the study to be successful.

Scope

The study will investigate if cyber security is up to the task of curbing cyber criminals. The researcher has considered (*****insert area) town as an area of study. Primarily, the study will focus on cyber security on tackling cyber criminals that are on rise due to advancing in technology.as a result of advancement in technology. The scope of study will be limited to financial institutions.

Limitations

This study may face a challenge of accessing classified cyber security information from the institutions the research will be conducted. Due to busy learning schedule on the side of researcher, it may be a challenge to get adequate time to conduct the research appropriately.

Tentative Schedule

Week 1 write up proposal

Week 2 write up project

Week 3 Project presentation

Week 4 Data collection

Week 5 Data analysis

Week 6 Report writing









References

http://www.maharashtrafireservices.org/pdf/pune_mitigation_plan.pdf (13/2/2018)


http://www.scmagazineus.com/IC3-report-Internet-crime-up-to-240-million-in-2007/ article/108706/


J. J. Prichard and L. E. MacDonald, “Cyber Terrorism: A Study of the Extent of Coverage in Computer Security Textbooks,” Journal of Information Technology Education, vol. 3, 2004

M. Crotty, The Foundation of Social Research: Meaning and Perspective in the Research Process. St Leonards, NSW: Allen and Unwin, 1998.

R. Ahmad, Z. Yunos, S. Sahib, and M. Yusoff, “Perception on Cyber Terrorism: A Focus Group Discussion Approach,” Journal of Information Security, vol. 03, no. 03, pp. 231–237, 2012.