UNIVERSITY NAME Student’s name Student’s ID Challenges in Cyber Security for Business 1.0Litreture Review This literature review paper is a critical analysis of the existing literature on the challenges in Cyber Security for Business topic. It comparatively analyses a number of carefully chosen work on topic and points out the knowledge gap that exist in the context of the topic under review. 1.1Literture Review Scope Information and communication technology has undergone tremendous growth over the last half century. It is almost present in every facet of the current lifestyle. The business as virtually immersed itself into ICT and it hard to imagine many businesses today without ICT as the core driver of business. In view of this assertion, the scope of this literature review will therefore be wide, ranging from aspects to do with management of risk to information to vulnerabilities and challenges of cyber attack to business. The articles reviewed have different stands points and arguments regarding the topic of study as well similarities on the matter. The study will basically be focused on challenges in cyber security for business. (SparkNotes., n.d.) 1.2Objectives of the literature review The main objective of this study is to find out challenges businesses face in instilling cyber security measures in their business, by comparing and contrasting various scholarly works on this topic and pointing out the gap that exist in these literatures in view of the topic, to inform the basis of the future research. The paper will assist business across the world in coming up with better cyber security measures in the business in a bid to tame or eliminate this kind of risk in their business operations. (SparkNotes., n.d.) 2.0Litreture Review comparative analysis 2.1What is Cyber Security These are measures put in place to protect Information and Communication Technology (ICT) infrastructure such as network, gadgets and data from damages and attacks as well as unauthorized access. Therefore, in simple language this is basically providing security to ICT items from any form of unwanted actions. (Ashibani and Mahmoud, 2017) 2.2What is ‘challenges in cyber security’ These are drawbacks or limitations to cyber security measures. These measures are most of the time not perfect or 100% sure and sometimes they get breached due to myriad of reasons such as infiltration by advanced technology or physical vandalism of the ICT gadgets. (Carayannis, Campbell and Efthymiopoulos, 2014) 2.3 Challenges in Cyber Security for Business One of the challenges facing cyber security in business is the fact that developers tend to focus more on features as opposed to security of the gadget or the software. There is more interest in having software or an ICT infrastructure that responds more to business or economic needs than minding on security. The vendor or the developer will want to come up with an ICT innovation that will enables businesses to interact more with customers and give them more options of doing business. According to Fischer 2016, experts more often than not point out that effective security features needs to be the integral part of the software development. Sometimes interoperability of an ICT innovation is the desired feature in business sense to be able to give the company to integrate most of its operations into combined platform but the same feature can be what is exposing the business to cybercrime. The business therefore faces the challenge in trying to cope up with stiff business environment while at the same time limiting its infrastructure features to make room for cyber security. It is also quite challenging to predict what cyber crime will happen in future. It is only after happening that a solution can be developed. This is owed to the fact technology always advances and metamorphoses into different forms that were not easy to predict. Therefore according to this article by Fischer, business can be update with security features but a latest technological advancement can render the security level installed inadequate leading to breach of the cyber security put in place by the business. (Fisher, 2016) On the hand, according to audit company KPMG’s article written by Barlock Buffomante and Rica 2014, challenges faced by businesses in cyber security is not all about technological advancement or lack of it. In there view many companies believe that by investing in the top notch cyber security they have eliminated the cyber attack risk 100%. That, “our weapon has to be better than those of attackers”. This notion is wrong according to the article, because the cyber security world is dominated by specialist suppliers that sell cyber security products that have great specs, but a proper and robust cyber security involves proper policy and human factor. That business faces a challenge of properly reconciling factors that affects the level of cyber security in business by over emphasizing on one or few factors and overlooking the others. The challenge of human factor being compromised to facilitate breaching of the cyber security in place is real. This is basically ethical issues and gross misconduct on part of the employees of the company in business. Therefore according to the article, businesses should focus on robust policy making, training of the employees as well as customers on top of investing in top notch cyber security solutions to holistically tackle the issue of cyber attack. This then will minimize cyber attacks to the lowest levels amid the challenges in human factor and ethical issues on the part of the employees. (Barlock, Buffomante and Rica, 2014) In view of Jang, 2015 article on cyber security threats, challenges and opportunities of November 2016, there is about half a million cyber attack attempts happening in cyberspace in every minute. His assertions are similar to what KMPG holds according its article reviewed above. The writer points out that it is important to invest in human resource to tackle the issue of cyber attacks other than the infrastructure. The ICT workforce is critical to the fight against cyber attacks. That any business needs to get right the ethical issues concerning ICT workforce as well as the developers of the innovations. The article asserts that, some developers leave a window in their innovations through which they can gain access into the core business systems of their clients secretly. Once the software has been purchased and installed by the client the developer comes back to access the system remotely using the window he created when he developed the system. There is a challenge to the managers of the business in ascertaining whether the workforce can be compromised or not. This a big challenge faced by businesses because it is not feasible to determine what exactly someone will do in future. The background checks can be done but still the risk of being compromised is always real. Further to this, the article points out that evolvement of Internet Things what is commonly referred to as ‘IOT’ has expanded the cyber attacks surface area, that business are expected to embrace new developments in bid to please customers while at the same time broadening the field of attack. This dilemma puts the business in a strict path of balancing the two important aspects of the business. He adds that the strict balancing act is occasioned by the fact that businesses have one major objective of making profit, and to achieve this they have to practically consider every legal and viable business means to achieving this objective, which include embracing technological innovations in ICT which in turn exposes them to cyber attacks. (Jang, 2015) According to Johnson, 2013 holds that the biggest challenge that business faces in cyber security efforts is the facts that specialized cyber attack groups will continue expanding and improving on their tactics to breach cyber securities of the target companies. The groups are made up of highly qualified Information Technology experts that have formed the groups and infiltrated company systems for the purposes of extortion or stealing money. This, according to the writer of the article is one of the major challenges to any business. The groups are most of the time composed of former employees who have insight and hindsight knowledge of the business cyber security measures and can easily come up with an innovation to evade the whole set up. It is not economically viable for business to ensure that all critical information within the knowledge of its former employee experts are replaced, because then that will mean the business fundamentally changes its core security features which likely to be a capital intensive exercise. The business will always remain risk to threats posed by these groups regardless of the level of investment channeled towards cyber security. (Johnson, 2013) 3.0 Quality and currency of the Literature reviewed 3.1 Quality of the sources The quality of the sources of the literature reviewed is high and good owing to the fact that the sources include scholarly journals and major companies of international repute among other credible sources. The sources are all referenced accordingly to acknowledge their contribution to this paper. (SparkNotes., n.d.) 3.1 Currency of the sources The sources for this paper are all current with some being published in the year 2017. This shows that the sources contain latest and up to date information on the context of the subject under consideration. Emphasis was laid on the currency of the secondary materials before they were chosen to be part of this review to ensure that obsolete information regarding the topic is eliminated as much as possible. (SparkNotes., n.d.) 3.3 Validity and Reliability All information obtained from the existing literature for the purpose of this review is valid and reliable. Various stand points on the subject matter have been obtained and comparatively analyzed to give a wider scope on the subject matter. This ensures that sufficient dept in literature have been covered so that the review and the gap indentified is as comprehensive as possible. Further to this, adequate background checks of the sources of the articles considered were carried out before their respective views were incorporated in the study. (SparkNotes., n.d.) 4.0 Research gap and contribution of this paper From the analyzed articles it is evident that challenges faced by businesses in cyber security are enormous and dynamic. From the viewpoint of the design challenges to the emergence and growth of cyber crime groups’ challenges, the existing literatures have less information regarding the challenge of time lag between the time data is breached to the time the detection is made. There is need to address this knowledge gap that exists in within the context of the topic under discussion. The time lag challenge should be investigated more to try and find out ways of minimizing the same through information and communication technology innovation by first highlighting the contribution and/or effect of this challenge to the whole issue of cyber attack. Once this challenge has as been adequately highlighted, then there will be greater motivation to invent solutions that will reduce this lag to the minimum level possible. 5.0 Conclusion Having reviewed different stand points of different authors in relation to the topic under consideration, it is important to note that some of them shared some similarities in the way they put forth the challenges faced by businesses in cyber security. There is need for the business to have a holistic approach to the issue of cyber attacks in order to tackle the problem effectively. The question of human factor in the whole process is paramount because the technologies and the innovations do not work in absolute isolation and are therefore manned by human beings in one way or another. It is therefore crucial that ethical issues are also addressed to minimize cyber attacks. The question of ethical issues should only touch on the internal employees of the business or the company but it should be extended to vendors or developers who come up with this innovations. It is also important for the businesses to appreciate the fact that cyber attacks can not be eliminated 100% and therefore, once they have invested in top notch cyber security innovation, they should also continually review this innovations, in order to remain alive to the fact that cyber attacks continually evolves so should cyber security. References Ashibani, Y. and Mahmoud, Q. (2017). Cyber physical systems security: Analysis, challenges and solutions. Computers & Security, 68, pp.81-97. Barlock, S., Buffomante, T. and Rica, F. (2014). Cyber security: it’s not just about technology The five most common mistakes. KPMG, [online] 1(1), pp.3-9. Available at: https://assets.kpmg.com/content/dam/kpmg/pdf/2014/05/cyber-security-not-just-technology.pdf [Accessed 4 May 2017]. Carayannis, E., Campbell, D. and Efthymiopoulos, M. (2014). Cyber-Development, Cyber-Democracy and Cyber-Defense. New York, NY: Springer. Christou, G. (n.d.). Cyber security in the European Union. Czosseck, C. (2009). The virtual battlefield. Amsterdam: IOS Press. Dutt, V. and Kaur, A. (2013). Cyber security: testing the effects of attack strategy, similarity, and experience on cyber attack detection. International Journal of Trust Management in Computing and Communications, 1(3/4), p.261. Fisher, B. (2016). Addressing Pressing Cybersecurity Issues through Collaboration. IT Professional, 18(4), pp.60-69. Jang, Y. (2015). Big Data, Business Analytics, and IoT: The Opportunities and Challenges for Business. The Journal of Information Systems, 24(4), pp.139-152. Johnson, M. (2013). Cyber crime, security and digital intelligence. Surrey: Gower. SparkNotes. (n.d.). Lysistrata (SparkNotes Literature Guide).