In the current digital age, most people have become very dependent on technology for their daily work tasks. With the rise of the technological advancements, cyber-attacks have also increased. Over the past few years, there have been several security breaches. When sensitive data are breached, both organisations and consumers are affected. In the present research, we analyse the cyber security risks and its impact on organisations. To perform the analysis, a big data technology such as R programming is used. For example, using a big data analysis, it was found that the majority of businesses detected at least one incident involving a local area network (LAN) breach.
 T. Agarwal, D. Henry and J. Finkle, “JPMorgan hack exposed data of 83 million, among biggest breaches in history,” 2014 [Online]. Available: http://www.reuters.com/article/2014/10/03/usjpmorgan-cybersecurityidUSKCN0HR23T20141003
 Bureau of Justice Statistics, “Data Collection: National Computer Security Survey (NCSS),” [Online]. Available: https://www.bjs.gov/index.cfm?ty=dcdetail&iid=260#BJS_data_experts
 D. Chaikin, “Network Investigations of Cyber Attacks: The Limits of Digital Evidence,” Crime, Law and Social Change, vol. 46, no. 4-5, pp. 239-256, Mar. 2007. https://doi.org/10.1007/s10611-007-9058-4
 ENISA, EISAS (enhanced) report on implementation, 2011.
 R. Gandhi, A. Sharma, W. Mahoney, W. Sousan, Q. Zhu, and P. Laplante, “Dimensions of Cyber-Attacks: Cultural, Social, Economic, and Political,” IEEE Technology and Society Magazine, vol. 30, no. 1, pp. 28- 38, 2011. https://doi.org/10.1109/mts.2011.940293
 O. Hathaway and R. Crootof, “The Law of Cyber Attack,” Faculty Scholarship Series, p. 3852, 2012 [Online]. Available: http://digitalcommons.law.yale.edu/fss_papers/3852
 S. Hinde, “Computer Security: Mapping the Future,” Computers and Security, vol. 22, no. 8, pp. 664-669, 2003.
 B. Krebs, “The target breach, by the numbers,” 2014 [Online]. Available: https://krebsonsecurity.com/2014/05/the-target-breach-by-the-numbers/
 N. Kshetri, “Diffusion and Effects of Cyber-Crime in Developing Economies,” Third World Quarterly, vol. 31, no. 7, pp. 1057-1079, Oct. 2010. https://doi.org/10.1080/01436597.2010.518752
 R Project, “The R Project for Statistical Computing,” [Online]. Available: https://www.r-project.org/
 R. Sharma, “Study of Latest Emerging Trends on Cyber Security and its challenges to Society,” International Journal of Scientific & Engineering Research, vol, 3, no. 6, Jun. 2012 [Online]. Available: https://www.ijser.org/researchpaper/Study-of-Latest-Emerging-Trendson-Cyber-Security-and-its-challenges-to-Society.pdf
 T. Shimeall, Cyberterrorism. Software Engineering Institution Carnegie Mellon University Pittsburgh, pp. 1-18, 2002.
 R. Sidel, “Home depot’s 56 million card breach bigger than target’s,” 2014 [Online]. Available: https://www.wsj.com/articles/home-depotbreach- bigger-than-targets-1411073571
 N. Sales, “Regulating Cyber-Security,” Northwestern University Law Review, vol. 107, no. 4, 2013.
 R. von Solms and J. van Niekerk, “From Information Security to Cyber Security,” Computers & Security, vol. 38, pp. 97-102, Oct. 2013. https://doi.org/10.1016/j.cose.2013.04.004
 M. Uma and G. Padmavathi, “A Survey on Various Cyber Attacks and Their Classification,” International Journal of Network Security, vol. 15, no. 1, pp. 390-396, 2013.
 J. Vijayan, Targeted Cyber Attacks Testing IT Managers, 2010.