Thursday, August 27, 2020

Banking, Customer Satisfaction IDBI Bank Awareness

Banking, Customer Satisfaction IDBI Bank Awareness Part I 1.1 Title of the examination 1.2 Scope of the examination 1.3 Objective of the examination 1.4 Significance of study 1.5 Researcher system 1.1 Title of the investigation:- â€Å"A overview on banking items, consumer loyalty consciousness of IDBI Bank† 1.2 Scope Importance of the Study Every single venture concentrate alongside its specific targets additionally have scope forâ future. Also, this degree in future provides for new investigates another need to explore aâ new venture with another extension. Extent of the examination comprise a couple futureâ business plan as well as gives thought regarding another business which becomesâ much progressively beneficial for the explores then the more established one. Extent of the investigation could give the anticipated situation for another saw in my projectâ are not actually having all the highlights of the extension which I depicted above yet alsoâ not coming up short on all the highlights. Exploration study could give a thought of system extension for catching moreâ market and client with better administrations and lower cost, with out compromisingâ with quality. In future client prerequisites could be included with the item and administrations forâ getting an edge over contenders. Shopper conduct could likewise be utilized to dispatch a newâ product with additional advantages which are required by clients for their accountâ (saving or current ) as well as for their speculations. Variables which are liable for the exhibition for bank can likewise be utilized forâ the adjustment of the system and item for being progressively productive. 1.3 Objectives of the investigation:- To know the client needs and desires. To discover the elements which client think about in opening a record To realize that up how much a client is happy with the bank To know the client objections and their redressal 1.4 Significance of the investigation:- Each exploration is led to satisfy certain destinations and these target thusly satisfy some reason and are of essentialness for at least one then one gathering these examination is noteworthy for:- To the Researcher:- This examination gives the specialist a reasonable knowledge of different exercises and capacity of the bank The specialist will likewise have the option to create on inside and out information on banking part The investigation is likewise required for the halfway satisfaction of the prerequisite for the level of MBA according to the educational program To the Bank:- The investigation would help IDBI Bank to know the clients disposition (about mindfulness and fulfillment level) towards its different items. 1.5 Research Methodology:- 1) Type of Research is elucidating in nature 2) Universe Customer of IDBI Bank in New Delhi 3) Sampling Unit Existing client of IDBI Bank 4) Sampling Technique Convenience strategy for examining was utilized 5) Sample Size 200 respondents 6) Data Type Primary optional information Essential DATA The Primary information are those which are gathered once more and just because, and thusâ happen to be unique in character. Optional DATA The optional information are those which have just been gathered by somebody elseâ and which have just been gone through the factual procedure. Section II 2.1 Industry Introduction 2.2 Introduction to IDBI bank: All about 2.3 Management Organization 2.4 IDBI bank business outline 2.5 IDBI bank hierarchical diagram 2.6 Product Services 2.7 Subsidiaries of IDBI 2.8 Review of writing 2.1 Industry presentation The Indian Banking industry, which is administered by the Banking Regulation Act of India, 1949 can be comprehensively characterized into two significant classes, non-booked banks and planned banks. Planned banks compriseâ commercial banks and the co-employable banks. As far as ownership,â commercial banks can be additionally gathered into nationalized banks, the State Bank of India and its gathering banks, local rustic banks and private sectorâ banks (the old/new local and remote). These banks have over 67,000â branches spread the nation over in each city and towns of all niche andâ corners of the land. The main period of money related changes brought about the nationalization of 14 majorâ banks in 1969 and brought about a move from Class banking to Mass banking. This thusly brought about a huge development in the geological inclusion ofâ banks. Each bank needed to reserve a base level of their loanâ portfolio to segments recognized as â€Å"priority sectors†. The assembling sectorâ also developed during the 1970s in ensured environs and the financial area wasâ a basic source. The following influx of changes saw the nationalization of 6 moreâ commercial banks in 1980. From that point forward the quantity of planned commercialâ banks expanded four-overlap and the remote banks (numbering42), local ruralâ banks and other booked business banks represented 5.7 percent, 3.9â percent and 12.2 percent separately in stores and 8.41 percent, 3.14â percent and number of bank offices expanded eight-overlay. Furthermore, that was notâ the breaking point of development. After the second period of money related segment changes and progression of theâ sector in the mid nineties, the Public Sector Banks (PSB) s discovered itâ extremely hard to contend with the new private part banks and theâ foreign banks. The new private area banks previously showed up afterâ the rules allowing them were given in January 1993. Eight newâ private segment banks are directly in activity. These banks due to their lateâ start approach best in class innovation, which thus causes them toâ save on labor costs. During the year 2000, the State Bank Of India (SBI) and its 7 associatesâ accounted for a 25 percent share in stores and 28.1 percent share in credit. The 20 nationalized banks represented 53.2 percent of the stores and 47.5â percent of credit during a similar period. Current Scenario: The business is as of now in a change stage. From one perspective, the PSBs, which are the backbone of the Indian Banking framework are in the process ofâ shedding their fat as far as inordinate labor, extreme non Performing Assets (Npas) and unreasonable administrative value, while on theâ other hand the private part banks are solidifying themselves throughâ mergers and acquisitions.â PSBs, which as of now represent in excess of 78 percent of absolute bankingâ industry resources are burdened with NPAs (an amazing Rs 830 billion inâ 2000), falling incomes from conventional sources, absence of present day technologyâ and a gigantic workforce while the new private segment banks are forgingâ ahead and revamping the customary financial plan of action by method of theirâ sheer advancement and administration. The PSBs are obviously at present working outâ challenging procedures even as 20 percent of their huge representative strengthâ has dwindled in the wake of the effective Voluntary Retirement Schemes (VRS) plans. The private players anyway can't coordinate the PSBs extraordinary reach, incredible sizeâ and access to ease stores. Thusly one of the methods for them toâ combat the PSBs has experienced the merger and obtaining (M A) course. In the course of the most recent two years, the business has seen a few such occurrences. For example, HDFC Banks merger with Times Bank Icici Banks acquisitionâ of ITC Classic, Anagram Finance and Bank of Madurai. Centurion Bank, Indusind Bank, Bank of Punjab, Vysya Bank are supposed to be keeping watch. The UTI bank-Global Trust Bank merger anyway opened a pandoras box andâ brought about the acknowledgment that everything was not well in the working of manyâ of the private part banks. Private part Banks have spearheaded web banking, telephone banking,â anywhere banking, versatile banking, charge cards, Automatic Teller Machines (ATMs) and joined different administrations and incorporated them into theâ mainstream banking field, while the PSBs are as yet wrestling with disgruntledâ employees in the result of effective VRS plans. Likewise, following Indias duty to the W To understanding in regard of the administrations sector,â foreign banks, including both new and the current ones, have been permittedâ to open up to 12 branches every year with impact from 1998-99 as against theâ earlier specification of 8 branches. Assignments of government weakening their value from 51 percent to 33 percent in November 2000 has additionally opened up another open door for the takeover ofâ even the PSBs. The FDI rules being more excused in Q1FY02 may alsoâ pave the path for remote banks taking the M A course to gain willing Indianâ partners. In the interim the financial and corporate area log jam has prompted anâ increasing number of banks concentrating on the retail section. A significant number of them areâ also entering the new vistas of Insurance. Manages an account with their incredible reachâ and a standard interface with the retail financial specialist are the best positioned to enter intoâ the protection area. Banks in India have been permitted to give charge basedâ insurance administrations without hazard interest, put resources into a protection companyâ for giving foundation and administrations backing and set up of a separateâ joint-adventure insurance agency with chance cooperation. Total Performance of the Banking Industry Total stores of planned business banks expanded at aâ compounded yearly normal development rate (Cagr) of 17.8 percent during 1969-99, while bank credit extended at a Cagr of 16.3 percent per annum. Banksâ investments in government and other affirmed protections recorded a Cagr ofâ 18.8 percent for each annum during a similar period. In FY01 the monetary lull brought about a Gross Domestic Product (GDP) growth of just 6.0 percent as against the earlier years 6.4 percent. The WPI Index (a proportion of swelling) expanded by 7.1 percent as against 3.3 percentâ in FY00. Essentially, cash gracefully (M3) developed b

Saturday, August 22, 2020

Leadership and Responsibilities Nelson Mandela

Question: Talk about theLeadership and Responsibilities for Nelson Mandela. Answer: What makes one a pioneer? Is administration inborn or made after some time? These inquiries are among those which have given individuals a ton to consider. The two elements can impact the administration characteristics of an individual (Gujral, 2013). For example, through instruction, people acquire abilities on the board of assets. Appropriate administration is the thing that great authority is about. What number of individuals on the planet can fall in the rundown of good pioneers? The rundown is interminable. Individuals like Malcolm X of the US, Mother Teresa of India, and Nelson Mandela of South Africa among a few others. A decent pioneer consistently assumes liability (Krass, 2017). Nelson Mandela was an extraordinary pioneer who is notable on the planet history. He was a government official, hostile to politically-sanctioned racial segregation progressive and later the President of the South African Republic from 1994 to 1999 (Hollingsworth, 2013). Nelson Mandela had the option to end the politically-sanctioned racial segregation framework in South Africa. By and by, he set a model for the remainder of the world. Individuals are altogether equivalent paying little mind to their race, sexual orientation, age or position in the administration. The politically-sanctioned racial segregation framework started when South Africa was under the provincial government. There was segregation of individuals by race (skin composition) to the degree whereby the blacks were made slaves in their nation. As a bold chief, Mandela rose to shape bunches which would battle for human rights. There are a few authority characteristics which can be ascribed to Mandela. They include: Mandela was certain reasoning, he generally thought of how to improve the lives of the considerable number of networks living in South Africa. Mandela was a visionary chief. He had the option to see the comprehensive view of South Africa, the enduring the network experienced and the route forward to tackle all the difficulties. A decent pioneer ought to have the option to recognize the necessities of his kin and how every single one of them can benefit from outside assistance to accomplish what they want. Nelson had an ordering He was a valiant pioneer who showed up at whatever point his kin required him. He never loved savagery and effortlessly worn foes with a grin. He was centered around his crucial vision. He never halted the battle till he accomplished what he needed. He had trust. Great pioneers ought to have trust in whatever they do. A pioneer with no expectation is a disappointment. Assurance was additionally part of his system driving South Africa to autonomy in 1994. A decided pioneer has faith in himself. Having faith in oneself prompts improvement of confidence. An individual with confidence will consistently mind the lives of others. There are numerous things which can be found out about administration from Nelson Mandela. People can differentiate between a pioneer and a ruler. Mandela was a pioneer. A pioneer consistently contemplates others, in contrast to a ruler. To be a noteworthy pioneer for your kin, you need assurance. One ought to be prepared to accept duty as there are a few difficulties that pioneers face. For example, Mandela was detained. There are times pioneers face hardships. A decent pioneer will exploit the difficulties to fortify his group to continue battling for what they accept. From Nelson, pioneers get familiar with the noteworthy of being centered around their undertaking. Be it business, political or sports; center is the most significant. For example, when understudies are in bunch conversations, those with pioneers without center wind up neglecting to accomplish their primary target. A less engaged individual is effectively influenced aside by others. Settling on choices become a major issue for such a pioneer. Practicing persistence is likewise something else which pioneers gain from Mandela. Things don't come as quick as most will anticipate. In any case, the easy method of doing things isn't generally the most ideal way. Systems should be included for a pioneer to settle on a choice (Strategy and administration, 2016). In the system, consultancy is basic. A group head should shape a gathering to help in running the administration. Two heads are superior to one, differing assessments from a few people lead to the improvement of a dependable choice. The idea of the impact of a pioneer relies upon various elements like for example, how well does the general public know the pioneer? Nelson had the option to impact practically all individuals from South Africa to battle in completion the politically-sanctioned racial segregation framework (Sadler, 2013). This set a genuine model for most pioneers in the African Continent who chose to assemble their endeavors to end bigotry. Actually, the entire world was moved by the battle of this man. His quality, voice, humbleness and serene method of dealing with debates roused numerous individuals. From that, we discover that quiet exchanges can likewise unravel issues, brutality isn't the main method of moving toward major issues in the general public. The nearness of a pioneer when tending to issues influencing the network is significant. Individuals don't require virtual pioneers. They need pioneers they can see, pioneers who can settle on choices for their benefit. By and by, bold people who are prepared, to come clean, consider a spade a spade and not a spoon. On the off chance that things are terrible, they are awful, no compelling reason to cover up. A pioneer who uncovers things of numerous regularly gets the help of the greater part. Having a lion's share close by is an affirmation of accomplishment. Individual attributes contribute much in making a decent pioneer. From the manner in which you handle things, the manner in which you direct your organizations and the manner in which you communicate with individuals, it is anything but difficult to tell the sort of pioneer you are. References Gujral, G. S. (2013). Initiative characteristics for compelling pioneers. Hollingsworth, T. (2013). Nelson Mandela: Leading The Way Forgang, W. G. (2016). Serious methodology and administration: a manual for unrivaled execution. Lanham, Md, Rowman Littlefield Publishers Krass, P. (2017). The book of initiative intelligence: exemplary compositions by incredible business pioneers. New York, Wiley. Sadler, P. (2013). Initiative. London, Kogan Page Ltd Methodology and administration. (2013). Bradford, England, MCB University Press. Swart, I. (2015). Religion And Social Development In Post-Apartheid South Africa: viewpoints for basic commitment. Stellenbosch, SUN Press Whyte, Q. (2014). Apatheid and different strategies. Johannesburg, South African Institute of Race Relations

Friday, August 21, 2020

Tips to Help You When Writing Research Papers Online

Tips to Help You When Writing Research Papers OnlineWriting research papers online can be extremely daunting, but if you know what you're doing and you have a few tips you can do this. You just need to focus on getting a good guide to help you along the way.There are many different online sources you can use to write your research papers, and most of them will give you an outline that you can follow. You'll want to make sure you find a good guide that will help you understand how the different steps of writing research papers online work.You can get great information from reviews and forums in regards to writing research papers online. You'll be able to see first hand what other people are doing and find out what they've experienced with writing research papers online. You'll also be able to find out some great tips that you can take and use to make your life easier.You can start by trying to find a good guide to help you with writing research papers online. These guides typically in clude what steps you should be taking, which is helpful and where to find the resources that you will need to successfully complete the project. They also usually have the outline of what you'll be working on so you can focus on the areas you're interested in.They will also be able to help you with the key words you will need to be using when you're researching online sources. This is very important because the online sources you're looking for won't always be available in the English language, which makes it very important that you have the right keywords for the terms you're looking for.You can also find many great ways to make writing research papers online easier by choosing the right paper templates and software. Many of these templates are based on well-known research papers that will help you get the project done quickly and easily. You can get help from forums and review sites to get a good idea of what to look for when you're choosing your template.Another great resource to use to help you get started on writing research papers online is a guide that can help you get your own copy of the original research papers. Most of these guides are free, but you might need to pay for this kind of help. You can find these types of guides in most public libraries and bookstores.As you can see, there are many different things you can do to help you get started on writing research papers online. Finding a good guide and getting the right knowledge is the first step to being successful.

Monday, May 25, 2020

Risk Workshop and Risk Register Free Essay Example, 2000 words

Medium risks would be considered crucial too and the low Risks would be considered containable for the project. Alternatively, a high risks posts much threat to the project, a medium Risk could occur occasionally and a low risk would not be likely to affect the project. These scales provide standard measures for the stakeholders (Heldman, 2005). In the above mention analysis, numeric values play a vital role in the estimation of the impacts of the risks felt. This analysis is normally applied for big projects where Risks could cause serious problems. There is System software specifically designed for the above task though smaller projects can be handled manually. The values can be estimated and specific points. In the above mention analysis, numeric values play a vital role in the estimation of the impacts of the risks felt. This analysis is normally applied for big projects where Risks could cause serious problems. There is System software specifically designed for the above task t hough smaller projects can be handled manually. The values can be analyzed depending on level of the threat to be analyzed. Flayton electronics had the following problems or risks. We will write a custom essay sample on Risk Workshop and Risk Register or any topic specifically for you Only $17.96 $11.86/pageorder now ID CATEGORY RISK IMPACT DESCRIPTION PROBABILITY RISK VALUE 1 Technical Scope definition Vague scoop allows scoop throughout the project Caused by the technical errors made 89 80 management Project management Project management vaguely established Management problems encountered 78 80 Commercial Contractual terms and the tendering conditions The Memorandum of Understanding signed is not clear and specific Problems involving the system of commerce in the project 80 80 Each of the Risks tabled above are critical to the well being of the project. According to Gray & Larson (2008), â€Å"Defining the Project Scope sets the stage for developing a project plan. Project scope is a definition of the end result or missions of the project- a product or service for your client/ customer† (p. 92) a well-defined scoop ensures the success of a project since it is the main motive of the project. If a project misses a scoop then it is as well a dead project. The scoop outlines all the aspects of the project. Other factors critical to the success of a project include such as risk analysis are equally crucial to the success of a project. If these factors are not brought out prior to the project then the stake holders are clearly handling a visionless project that will crumble the moment Risks start knocking. Furthermore, agreeing on proper terms helps in making a logic approach to the project.

Thursday, May 14, 2020

The Dnp Essay - 724 Words

Statement of Purpose Doctor of Nursing Practice Essay Luisa Walsh 2/18/2013 In today’s healthcare system, nursing is a challenging field as a result of rapid technological advances and changes in healthcare policies. As a dedicated nursing professional, with a great passion for learning, I strive to stay on top of these changes. I am determined to increase my knowledge to be an instrumental part of providing quality healthcare. The demands of nursing are high; however the rewards are even higher. Nursing requires both a supreme understanding of the science of health, and a caring bedside manner befitting only those who seek a position of such a personal involvement in the well-being of a patient. Academically, I will put forth all of†¦show more content†¦In addition, a DNP degree will help me better serve my community by advocating for quality and safety healthcare system. Once attained, I would seek employment at either a school or university with the mission of educating nursing students to practice the highest quality of patient care. One of the major issues facing the nursing profession today is the lack of advance nursing practices. The medical field is in crisis. Doctors are stretched to the limits, and patients are demanding more advanced care. To alleviate some of the concerns facing medicine in the 21st century, advance nursing practices is a vital area in the contribution of understanding and working within the bounds of a team structure, and the promotion of communication between the interdisciplinary health team. The mission of the advance nursing practice is to help individual patients, and their families, determine and achieve optimum physical, mental and social potential, and to do so within the challenging context of the environment in which they live and work Nurses are among the largest professional care group within the healthcare service industry. We are responsible for providing quality care and assisting patients towards independent and healthy living. Considering the changing working environment, health care practitioners like nurses areShow MoreRelatedThe Argument For The Dnp1975 Words   |  8 PagesThe Argument for the DNP Nurses have been an integral part of health care for years. Many of the nurses people see regularly are Registered nurses or BSN, aka Bachelor of Science nurses that more or less are similar in work load, only separated by amount of education. It takes two years to receive an RN as well as passing a rigorous examination while it takes four years to receive ones â€Å"BSN†. Advanced practice nurses are those who have taken their education further and have received a master levelRead MoreWhat Comparisons Can Be Found Between the Gcu Mission and Domains/Con Mission and Program Competencies (for Your Selected Specialty Track, Links Located in the Course Materials) with the Aacns Essentials for Masters655 Words   |  3 Pages| Admission Essay to University of Miami Elizabeth Akande | | | My name is Elizabeth Akande and I am seeking for an admission into the Master’s degree program at University of Miami (UM) at the School of Nursing. I have always believed in giving back to the community and in sharing my competencies and skills with others. My desire to help people in the field of nursing has powered myRead MoreStatement of Purpose: Master of Science or Family Nurse Practitioner616 Words   |  3 PagesPersonal Statement Essay I appreciate this chance to let you know a little bit about myself, my career ambitions, my educational plans, and my dreams and aspirations. For as long as I can remember I have been interested in the field of medicine. My journey in nursing began when I became a Certified Nursing Assistant (CNA) and then went on to become a Licensed Practical Nurse (LPN). I continued my education earning an Associates degree and now will be graduating with my Bachelor of Science NursingRead MoreThe Image Of Nursing1280 Words   |  6 Pagesindividual, specializing in delivery of quality, compassionate and caring care that is so unique in a meaningful way. With the media involved, the images, both reflect and reinforce the social aspect of nursing throughout the continuum of care. This essay will seek to explore common and complexed images of nursing and tell a story of how those images can play a part in the reflecting and the various status of the nursing we know today. Images left on our patients In the hospital settings, patientsRead MoreEssay on Theoretical Framework: Compassion Fatigue2255 Words   |  10 Pages2148-NURS-5327-400-EXPLOR-SCI--THEORIES-NURSING--2014-Fall Theoretical Framework Paper Word Count: 2,335 THEORETICAL FRAMEWORK: Framework of Compassion Fatigue University of Texas at Arlington Exploration of Science and Theories for Nursing N5327 Rhonda Mintz-Binder, DNP RN CNE September 11, 2014 Compassion fatigue, which is also known, as secondary traumatic stress is a natural effect that occurs as a result of taking care of patients who are in pain, stressed, suffering, or traumatized. Compassion fatigueRead More65 Successful Harvard Business School Application Essays 2nd Edition 147256 Words   |  190 PagesGRIFFIN NEW YORK 65 SUCCESSFUL HARVARD BUSINESS SCHOOL APPLICATION ESSAYS, SECOND EDITION. Copyright  © 2009 byThe Harbus News Corporation. All rights reserved. Printed in the United States of America. For-information, address St. Martins Press, 175 Fifth Avenue, New York, N.Y. 10010. www.stmartins.com Library of Congress Cataloging...in..Publication Data 65 successful Harvard Business -School application essays : with analysis by the staff of The Harbus, the Harvard Business School newspaper

Wednesday, May 6, 2020

Lifeboat Ethics By Garret Hardin And A Modest Proposal By...

Lifeboat ethics by Garret Hardin and a modest proposal by Jonathan Swift Garrett Hardin in Lifeboat Ethics: The Case against the Poor Garrett Hardin describes about how the well-off states are in the lifeboat and the deprived states are swimming in the sea. He also tells about how the US facilitates other states. Hardin thinks that if the administration remains serving other states and letting citizens in then America will also sink. We must encourage them if we desire to save at least part of the world form ecological destroy. Why should I support the deprived states? Why should I let the migrants in? I notice no reason for serving somebody that is not an American. These non American care taking my diligent assets that they did not produce. I am exhausted of the USA giving my funds to the deprived states. The administration is giving these people my funds. By letting these people on our lifeboat the administration is sinking us all. If we do let an additional 10 people in our lifeboat, we will have misplaced our security aspect, an engineering code of value. I cannot acquire opportunity in serving people if it is going to put me in threat. Instead of giving the funds to non Americans it should be utilized just in America. The funds utilized to facilitate the inferior states can be very helpful in the US. The traditional people work had for their money. The administration supports deprived families with housing, food, education and different things. The well-off have more

Tuesday, May 5, 2020

IT Risk Management Cryptanalysis and Security Enhancement

Question: Describe the IT Risk Management and Cryptanalysis and Security Enhancement. Answer: 1. The case study is based on the activities of ENISA (European Union Agency for Network and Information Security) regarding the rising numbers of the cyber security threats and attacks. ENISA deals with these threats and attacks and takes suitable steps against the reported activities within the countries that are under the European Union (Enck et al., 2014). ENISA takes steps against all kinds of cyber attacks like Malicious Code Injection, Web-based Attacks, Denial of Service Attacks, Spamming, Phishing, Botnets, Exploit Kits and others. Before ENISA started working against cyber threats, there were rising number of cyber attack cases. In addition to regular virus and malicious codes attacks, some more methods of attacks were reported at various parts of the world (Sridhar, Hahn Govindarasu, 2012). Unethical hackers and software experts are always trying to invent new ways to break into secure systems without getting traced or detected. Some of these attacks are so strong that they cannot be prevented even using the strongest antivirus softwares. Due to these attacks, many international business organizations, commercial and government sectors lose huge amount of confidential information and business statistics. ENISA is taking a number of steps for stopping these attacks (Peltier, 2013). They have already arrested a number of hackers who have invented strong undetectable hacking softwares. ENISA is also very active in designing anti-virus and anti-hacking softwares that will be able to shut down the strong hack tools permanently. In addition, they are trying to create an awareness among people so that they do not fall trap to malicious web links and softwares. However, in spite of the activities of ENISA, nothing will be successful unless the internet users are more careful while using the internet and take suitable protection for their computer systems before using the internet. 2. ENISA security infrastructure can be represented as follows. Figure: ENISA Security Infrastructure (Source: Created by Author) As seen from the diagram, ENISA has a central network surveillance system that keeps checking data traffic through all the servers connected to it. If some unusual activity is detected, it is evaluated and classified (Humaidi Balakrishnan, 2012). If it is authorized and ethical hacking, it is released from the server. However, if it is an unethical hack or hacking tool, it is immediately banned using firewalls or anti-virus softwares. Moreover, suitable steps are taken to locate the hacker and arrest him. However, with advanced technology, hackers are creating undetectable attack softwares that are extremely hard to trace and detect. Hence, there is a need to design even better and stronger antivirus and firewall softwares with the latest technology available to detect and block these activities. 3. In addition to external threats, there are insider threats that must be mitigated in order to maintain an ethical environment within the organization. Some suitable strategies for combating insider threats are as follows. Internal Surveillance System Internal surveillance system should be implemented in order to keep tabs on the activities of the employees in the computer. For this purpose, surveillance cameras can be installed in the employees cubicles (Zissis Lekkas, 2012). Moreover, internal server surveillance should also implemented in order to monitor employees activities in the internet. Again, there should be an employee appointed to keep watch on the monitoring process so that no employee can tamper proof of his misdeed. Access Restriction System With the change in hierarchy of the job posting in the company, access to organization documents and information should be changed. In other words, with decreasing role in the organization, access should be more restricted (Kuperman, Gardner Pryor, 2013). For instance, the assistant manager should have lesser access to companys documents that the manager and so on. Website Blocking In order to prevent misuse of the internet and accidental downloads by the employees, certain malicious websites should be banned completely in the companys server. This will minimize the chances of the malicious file downloads by accidental clicking of unwanted links. In spite of all these, insider threats will still remain and can only be removed completely by the company by implementing strict guidelines on the use of the internet and websites. Moreover, the companys internal server must be monitored and maintained every day in order to detect any unusual activity (He Johnson, 2012). Moreover, some strong firewalls should be installed in every employees system to prevent unwanted and malicious attacks. 4. Of all the top threats, the most significant one is web application attack. It is most significant due to the following reasons. Literally Everywhere Web application attacks can occur anytime from any website, be it within secure domain or open server. These attacks come in the form of malicious links. These links appear anywhere in the internet in the form of some attractive offer or some advices regarding PC upgrade / repair (Crossler et al., 2013). Many internet users fall prey to these offers and whenever they click on the link, the malicious files get downloaded automatically. Accidental Click Sometimes, these links are hidden so properly that the user cannot differentiate between safe link and malicious link. Most of the times, the user accidentally clicks on the malicious links and downloads the malicious files that infect his computer immediately (Yang et al., 2013). Due to these hidden links, chance of accidental clicking increases substantially. Infected Download Links Sometimes, the hackers hide the malicious files even within some legitimate download link of a verified and trusted website (Power, Sharda Burstein, 2015). Whenever the user chooses to download that particular file or application, the malicious files also get downloaded and they infect the computer easily, without the knowledge of the user. Some of these links also come in the form of fake emails promising huge rewards for the user. Whenever the user downloads the link, his system gets infected. Ransomware There have many reported cases where even a ransomware has been found within the malicious files. This is the most extreme case of web application attack where important files of a user are encrypted by the ransomware within a few seconds (Kolkowska Dhillon, 2013). These files cannot be decrypted unless the user pays certain amount of money demanded by the ransomware. 5. The most significant and key threat agents are as follows. Cyber Criminals These are highly skilled and powerful unethical hackers that use hacking tools for robbing money by ransom, leak of confidential data and others. These hackers have invented extremely powerful and almost undetectable hacking tools and malicious softwares, which they use as ransomware and spyware (Peltier, 2016). Using these softwares, these hackers access confidential data and steal or encrypt them for ransom. Hacktivists These are some hackers that are motivated politically for the unauthorized activities. Mostly, these hacktivists use their hacking techniques against some opposition political parties in order to leak confidential information or damage their database by destroying important files. Nation Threats These are international internet terrorists that are authorized by a countrys government to spy on some other country or leak their defensive strategies (Von Solms Van Niekerk, 2013). These hackers work from a country that has authorized them and hence, they are extremely hard to catch. Cyber Terrorists These are some skilled group of hackers that use the internet as mean for spreading the idea of terrorism among common users. These groups do not do hacking for money, they use hacking techniques for simply destroying confidential files of a country or use the web service to spread viral and hardcore videos like beheading a man alive, burning a woman alive, etc. They also break into the personal profiles of the citizens of a country or even some public sectors for creating a hazard (terrorism) in the future. In order to minimize their impacts on system, the systems should be strongly protected with security firewalls and additional encryption safety (Bin Muhaya, 2015). Moreover, automated malicious attack detection system can be designed and installed in order to warn the user regarding some unusual activities in the server. In addition to these, regular server maintenance and surveillance should carried out in hourly basis. 6. Social hackers are those who use social media for stealing someones personal information by phishing, hacking into account, etc. According to Van Huis et al. (2013), this is an extremely common type of hacking that targets mainly unprotected profiles (weak predictable passwords) and use the personal information of a user for making a fake identity. Cherdantseva Hilton (2013) said that these types of hackers have good engineering knowledge and they apply it for hacking others profiles in the social media. Although these hackers primary target is not money, they are a major threat to the community as they as act as someone else and use the fake identity for unethical purposes. In more serious cases, these hackers use someone elses identity for committing serious crimes in the internet and the user gets caught even though he is not responsible for the crime. On the other hand, Peltier (2015) said that these are generally low or medium skilled young hackers that do social hacking mainly for fun or testing skill. According to Cherdantseva Hilton (2013), social hacking is done by two ways phishing and hacking through some low cost hack tools. Phishing is done to record someones username and password and the hacker uses these records to break into the users profile. On the other hand, some hackers use cheap hacking tools to directly hack a users profile for stealing his personal information. Bin Muhaya (2015) has suggested that social hacking can be minimized by enforcing double or multiple security checks before the user is allowed to login to his account. However, social hacking is still extremely prevalent and the users must be more careful over using the social media in order to prevent social hacking. The user must a use a strong password encryption and should not share his personal information in the social media. 7. The threat probability and threat level has been shown in the table below. Threat Probability Extent of Threat Drive-by downloads (renamed to Web-based attacks) Very High High Worms/Trojans High Very High Code Injection Medium Medium Exploit Kits Low Very High Botnets High High Physical Damage/Theft/Loss Low Medium Identify Theft/Fraud High High Denial of Service High Very High Phishing Medium Low Spam Low Medium Rogueware / Ransomware / Scareware Medium Very High Data Breaches High High Information Leakage Very High Very High Targeted Attacks (renamed to Cyber espionage, merged with Watering Hole) Low High Watering Hole (threat consolidated with other threats/attack vector) Low Medium From the trend of the threats, it can be seen that the threats that deal with other users or companys confidential information are most likely to occur and in most of these cases, the possible threat extent is catastrophic. Other threats are less likely to occur but they can also cause some severe damage against a general user. However, there are also some common threats that are very like to occur but these attacks can be stopped by taking simple measures. On the other hand, some attacks like ransomware are less likely to occur but they can deal extremely severe damage to a companys servers and systems. As seen from the statistical table in the case study, the cases of strong hacking like ransomware and others are constantly rising as more and more advanced technologies are being used by the hackers. Unless suitable steps are taken against these cyber hazards, more and more secure data will be lost and many business organizations, commercial sectors will lose their business data, co nfidential information forever. 8. The ETL process can be further improved with the help of more powerful technology. Hackers are designing new software and hacking tools every day. In fact, nowadays, hackers have invented some technology such that most of their unethical activities mostly go undetected or untraced due to the use of very high advanced technology (Bin Muhaya, 2015). ENISA should take more strict steps like monitoring every systems connected to the server as well as protecting systems using strong firewalls and encryptions. Moreover, ENISA can do back hacking i.e. they can monitor activities of traced hackers using their own technique (hacking). This will be ethical hacking and can be done by employing very highly skilled software experts and using them as threat agents to the hackers (Von Solms Van Niekerk, 2013). ENISA also needs to upgrade its networking infrastructure in order to do faster access to main server, more accurate tracing of a hacker, quick response to unusual activities in the server a nd others. Before ENISA started working against cyber threats, there were rising number of cyber attack cases. ENISA has already taken a number of steps for stopping these attacks (Power, Sharda Burstein, 2015). They have arrested a number of hackers who have invented strong undetectable hacking softwares. ENISA is also very active in designing anti-virus and anti-hacking softwares that will be able to shut down the strong hack tools permanently (Sridhar, Hahn Govindarasu, 2012). In addition, they are trying to create an awareness among people so that they do not fall trap to malicious web links and softwares. However, in addition to all these, upgrading to latest technology and using more powerful firewalls will help the company improve the ETL process significantly. On the other hand, the common users will have to be more careful and install latest firewall softwares to prevent unethical activities as much as possible. 9. As per the studies of different researchers, from 2016 onwards, there will be a rising number of identity theft / fraud, information leakage, cyber espionage and data breaches. Unethical hackers and software experts are always trying to invent new ways to break into secure systems without getting traced or detected. Some of these attacks are so strong that they cannot be prevented even using the strongest antivirus softwares (Sridhar, Hahn Govindarasu, 2012). Due to these attacks, many international business organizations, commercial and government sectors lose huge amount of confidential information and business statistics. ENISA is very active in designing anti-virus and anti-hacking softwares that will be able to shut down the strong hack tools permanently (Power, Sharda Burstein, 2015). They mentioned breaches are on the rising from 2013 although some of them have already been stopped, banned and mitigated. However, with the development of science and technology, more and more hackers are entering into the internet using fake account and fake names and are using them for unethical activities. With the advancement of technology, these attacks are occurring more and more using more powerful tools (Von Solms Van Niekerk, 2013). It is expected that in 2020, these attacks will occur so much that ENISA will be unable to shut them down easily unless they upgrade to the latest technology. ENISA should also install server surveillance system in order to maintain and monitor traffic activities in the server. However, all these upgrades and improvement of services must be done immediately before it is too late to recover. 10. ENISA should not be satisfied with the current state of Information System Security. Although they have done a very good work in banning many unethical websites and arresting unethical hackers, they should not be satisfied as there are still increasing numbers of unethical hacking and data security breach (Cherdantseva Hilton, 2013). ENISA has a central network surveillance system that keeps checking data traffic through all the servers connected to it. If some unusual activity is detected, it is evaluated and classified. If it is authorized and ethical hacking, it is released from the server. Again, if it is an unethical hack or hacking tool, it is immediately banned using firewalls or anti-virus softwares (Bin Muhaya, 2015). However, recently, hackers have developed certain tools that are extremely hard to detect or trace. To this, ENISA should further strengthen its cyber security and surveillance systems in order to stop the new types of attacks more effectively (Peltier, 2013). They should also invent new softwares to detect untraceable malicious files and prevent them immediately from entering into the system. Moreover, they should encourage people to use strong firewall softwares in order to prevent unethical activities while using the internet. References Bin Muhaya, F. T. (2015). Cryptanalysis and security enhancement of Zhu's authentication scheme for Telecare medicine information system.Security and Communication Networks,8(2), 149-158. Cherdantseva, Y., Hilton, J. (2013, September). A reference model of information assurance security. InAvailability, reliability and security (ares), 2013 eighth international conference on(pp. 546-555). IEEE. Crossler, R. E., Johnston, A. C., Lowry, P. B., Hu, Q., Warkentin, M., Baskerville, R. (2013). Future directions for behavioral information security research.computers security,32, 90-101. Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B. G., Cox, L. P., ... Sheth, A. N. (2014). TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones.ACM Transactions on Computer Systems (TOCS),32(2), 5. He, Y., Johnson, C. W. (2012, October). Generic security cases for information system security in healthcare systems. InSystem Safety, incorporating the Cyber Security Conference 2012, 7th IET International Conference on(pp. 1-6). IET. Humaidi, N., Balakrishnan, V. (2012). The influence of security awareness and security technology on users behavior towards the implementation of health information system: A conceptual framework. In2nd International Conference on Management and Artificial Intelligence IPEDR(Vol. 35, pp. 1-6). Kolkowska, E., Dhillon, G. (2013). Organizational power and information security rule compliance.Computers Security,33, 3-11. Kuperman, G. J., Gardner, R. M., Pryor, T. A. (2013).HELP: a dynamic hospital information system. Springer Science Business Media. Peltier, T. R. (2013).Information security fundamentals. CRC Press. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Power, D. J., Sharda, R., Burstein, F. (2015).Decision support systems. John Wiley Sons, Ltd. Sridhar, S., Hahn, A., Govindarasu, M. (2012). Cyberphysical system security for the electric power grid.Proceedings of the IEEE,100(1), 210-224. Van Huis, A., Van Itterbeeck, J., Klunder, H., Mertens, E., Halloran, A., Muir, G., Vantomme, P. (2013).Edible insects: future prospects for food and feed security. FAO. Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security.computers security,38, 97-102. Yang, Y. P. O., Shieh, H. M., Tzeng, G. H. (2013). A VIKOR technique based on DEMATEL and ANP for information security risk control assessment.Information Sciences,232, 482-500. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592.