HI6008 Assignment 2 Requirements
2. Project Objective
3. Project Scope
4. Literature Review
5. Research Questions/Hypothesis - Primary Question (only one question) - Secondary Questions (1, 2 ….)
6. Research Design and Methodology - Qualitative research (Students should propose the Process of the Qualitative Research (Main Steps), Approaches to reliability and Validity, Sampling, Sample Size, Data Collection Method, Variables Specifications) - Quantitative research (Students should propose the process of the Quantitative Research Design Process (Main Steps), Research Instrument, Quantitative Data Analysis Process, Sampling and Simple Size, Interviewing and Questionary Design, Reliability and Validity of Data)
7. Research Limitations
8. Time Schedule (Research plan)
10. Reference List
Economic Impact of Cyber Security on Australian Banks
Banks in Australia have quickly embraced creative innovations and present the advanced channels with basic the goals of offering the more the administrations towards their clients. This wind up enormous client inclinations towards their computerized projects of banks and their applications. It is required that banks research the issue and find proactive solutions enabling digital security. Digital assaults are influenced in quick and far reaching way. These days, in Australian banks, digital assaults are real risk which is troublesome for associations to design viably and comprehend the kind of digital security. This report presents a research design that can be used to find effective solutions for digital security in Australian banks.
2. Project Objective
The Primary objectives of the Australian Bank’s cyber security policies are that all Australians individuals are be aware of cyber crimes, secure their computers with anti viruses and act to protect their secrecy, privacy and finances online. Australian corporate operate secure and resilient information and communications technologies. Yet there are several risks that they require to manage in order to provide customers with a sustainable system. A security strategy to protect digital data is essential for them to achieve this.
The Australian Government recognized that cyber crimes are leading to many problems in Australian banking systems as it is leading to losses and breach of customer information. This project aims at providing stronger levels of understanding about various cyber crimes that impact Australian banks and how they can be dealt with. It is important that there be clear understanding about how the government standardizes security strategies for Australian banks.
Strong cyber security systems and confidence in the security of or systems will boost banking sector by adopting modern technologies in cyber space. This Strategy does not seek to address all these risks. So, this research aims at helping find solutions to forming stronger strategies for banking organizations in Australia and understanding the economic impact of cyber crime on these organizations.
3. Summarization of Literature Review and justification for literature problems, gap opportunities and hypothesis
In any case, there is a solid linkage between this Strategy and the Commonwealth Organized Crime Strategic Framework and the endeavors of all administrations to react to the dangers postured by sorted out wrongdoing. This Strategy will be a contributing component to the advancement of the Organized Crime Response Plan and particular digital security capacities and game plans will be of an incentive for effort to the group and the keeping money area on composed wrongdoing and in extending the comprehension of the utilization of new innovations to empower the commission of sorted out wrongdoing.
Australian banks are client arranged approach, the primary target of the managing an account area is putting forth the best and dependable saving money towards their clients. Banks put their clients on need list and has dependably been resolved to arrangement of very digital security framework. It keeps up the Business progression administration framework to guarantee the proceeded with arrangement of administrations following real occasions, for example, cataclysmic events (Alliye coyne, 2018).
Assaults on basic PC frameworks in both the administration and private division are being mulled over as an elective method for leading fighting and a methods by which culprits, psychological militant gatherings and threatening insight administrations could harm Australia's national advantages (Lehto, 2015).
There is a systematic understanding formed about the various trends in cyber crimes through various research in the past. This indicates a holistic approach towards solving the issues that Australian banks are facing due to cyber crime (Clark and Hakim, 2016). This helps build stronger understanding about the strategy that is to be used and the methods that can help Australian banks protect customer information and money from being hacked or thieved (Howard, 200). This is a very important aspect of helping Australian banks grow in terms of security strategy.
Australian banks find a way to safeguard the security of treats, client personality and their protection. On the off chance that we are discussing the ANZ bank they have a long history of dealing with individual data and private of the clients. The security strategy clarifies how they will oversee and ensure your own data amid the utilization of internet saving money, portable managing an account and versatile saving money applications. ANZ is bound by protection or digital security act and 13 Australian security standards set out in that demonstration.
The protection approaches of the banks apply to dealing with the individual data of their customers. This incorporates the
•How they guard your data
•How they can access, refresh and rectify data
•How to make security objection.
The main expectation that can be made with any certainty is that cutting edge ICT will keep on evolving in ways not predicted by its fashioners and that it will be utilized for noxious and authentic purposes. These variables, joined with the worldwide idea of the Internet and the confinements in the immediate impact of governments over present day ICT systems that are prevalently planned, manufactured, possessed and worked by the private part, serve to underscore the many-sided quality of the digital security challenge confronting Australia in the twenty-first century (Alliye coyne, 2018)..
Australia is helpless against the loss of monetary intensity through the proceeded with misuse of ICT systems and the bargain of licensed innovation and other touchy business information. This can possibly undermine Australians' trust in the computerized economy. Digital security is along these lines an issue of national security as well as one of monetary security. It is a test that requires an intelligible, incorporated approach – drove by government, however working in close organization with the private segment – that tries to address the key vulnerabilities of an undeniably threatening on the web condition. Standing up to and dealing with these dangers must be adjusted against the common freedoms of Australians, including the privilege to protection, and the need to elevate productivity and advancement to guarantee that Australia understands the maximum capacity of the computerized economy.
A specific application of statistics in identifying an information security related threat is the usage of a set of data which can help identify the types of sites which are mostly hacked and the kind of frauds that are committed online. Statistics may indicate that banking transaction frauds, OTP related frauds, e commerce frauds and fake account trolling are some of the major online threats to security and can help identify the possible loopholes which enable information security breach (Tobies, Renate & Helmut Neunzert, 2012). Statistics helps identify the issues related to information security and the extent to which it is rampant. The data on number of incidents that take place on a monthly or a yearly basis can help form information that can be used to strengthen security on the web media. It is important that there be an understanding of this data in order to ensure that the IT security is focused onbuilding better efficiency in working towards managing the loopholes effectively (Ramana,2007).
5. Research Questions/Hypothesis
Is the overall economic impact of cyber crime on Australian banking organizations positive or negative?
If the economic impact of cyber crime is negative, then what solutions are possible for Australian banking organizations?
Can a strategy for cyber security or digital security enable better management of economic impact of cyber crime for Australian banking organizations?
6. Research Design and Methodology
The qualitative research is to be done based on the usage of various literature for banking cyber crimes. The next step is to interview 20 bank managers of top banks in Australia and evaluate the problems that they face in day to day banking with relation to cyber crime and cyber loopholes. The usage of this method would help collect first hand information and understand the actual security strategies that are currently being used by Australian banks. This is a reliable and valid method as bank managers would have experience and understanding of cyber issues faced by their organizations. This would help find the required information on current trends in security strategies in banks in Australia. It enables the formation of stronger understanding about how security strategies are being formed.
Sample size = 20
Survey participants = Bank managers from Australian banking organizations
Interview on: What are the cyber issues they face and what strategies are currently being used
Analysis: Understanding of industry best practices and their effectiveness
The quantitative research is to be done based on collection of statistics of the nature of crime that have occurred in the past with relation to Australian banks and cyber security threats. The data can be gathered from case studies, internet and other secondary sources. The data is then to be analyzed using various statistics tools. It helps evaluate the overall situation and how prudent banks already are. This also enables provide recommendations and solutions for dealing with various possible cyber crimes.
Sample size = 10 case studies and other secondary data
Source of data = Harvard case studies and internet
Data on: What are the different cyber issues banks face and what strategies are currently being used
Analysis: Understanding of the nature of cyber crimes in order to recommend strategies for improvement of cyber security in Australian banks
7. Research Limitations
For the most part, digital assaults focus to open, private division, banks or budgetary organizations, private segment and different offices. The fundamental reason for this assault for their retribution, monetary profit, cash and exposure. These are exceedingly gifted experts with worldwide nearness. The developing danger of digital assaults causes the Australian economy presented to a potential $16 billion harm throughout the following decade. Sydney is at most serious hazard took after by Melbourne, Brisbane, Perth and Canberra. The situation is very diverse with different kinds of cyber crimes and new ones coming up every now and then. It is very difficult for banks to keep up with security strategies and it is important that they revamp their strategy every now and then and this makes the research valid only for a very short duration. Though the literature and suggested strategies are valid, their relevance in terms of technological adherence is short lived.
8. Time Schedule (Research plan)
In nutshell, Cyber security is the biggest impact on the Australian Banks. They have adopted many technologies to overcome these types of threats or virus which cause losses to their customers. This would be negative affect on their economy and their sustainable growth of banking sector. The banks or financial institutions have incurred huge amount of money to secure their website, net banking products and mobile banking to provide the cyber security towards their customers.