Tuesday, May 5, 2020

Challenges Of Cyber Security In Businesses †MyAssignmenthelp.com

Question: Discuss about the Challenges Of Cyber Security In Businesses. Answer: Reflective Report I increased my knowledge regarding challenges of cyber security in businesses from this research study. I learned about the research aims and objective of that will be effective to accomplish the research in an effective way. I analyzed that the primary aim of this research is to identify and evaluate certain cyber security challenges for businesses in Australia. Furthermore, I gained my knowledge towards the research justification that will be supportive to identify the rationality of research in an effective manner (Flick, 2015). It will support to identify the motivation of this research systematically. Cyber security is a technical procedure and implementations which is designed to secure personal computers together with their components from damages. In addition, I also learned that it is accountable to protect the software of computers, computer network, hardware devises, computer data, and programmes from the unauthorized workers from being damaged. I also gained my understanding about the significance of project in long-run. At the same time, I created conceptual understanding towards the research issues in an appropriate manner. There are different types of cyber security risk such as Cyber Thefts, Malware and Vectors Risks, and Cyber Espionage (Gunes, eta l., 2014). In addition to this, I also gained my understanding about some additional risk such as insecure passwords, computer sabotage, clickjacking, tampering, and insider threats. In addition to this, I deeply enhanced my knowledge towards the Cyber thefts that would be a primary issue for an organization. Cyber thefts turn around the stealing of company data, especially financial data. A large number of organizations were faced such kinds of issues that declined the financial performance (Katal, et al., 2013). Along with this, I also gained my knowledge about Cyber Espionage that is another kind of cyber security risk that will also be a negative impact on the performance of an organization. The Cyber Espionage is related to application of computers and internet to address the confidential data of company by unauthorized people that will create a complexity in a corporate. In addition, it can be said that the cyber espionage is presently being executed by a large number of unauthorized workers to obtain unauthorized data which will be used to blackmail to the company (Mackey, et al., 2015). Along with this, I also learned that the Cyber criminals improve their techniques by internet and computer attack with some additional devices named malware. In addition, I increased my knowledge about the malware technique that enabled the people to address unauthorized information on computers and internet. It is classified into certain parts such as worms, ransomware, Trojans, spyware, and viruses. At the same time, it can be said that such kinds of information can be effective to improve my professional life in long-term. It will be also beneficial to successfully deal with such kind of issues in long-term in a systematic way. From this research, I learned about research question and hypothesis that will be necessary for identifying the research issue (Sadeghi, et al., 2015). At the same time, I understood about two kinds of research questions named primary and secondary questions. The primary questions are based on statistical data while the secondary questions are based on theoretical data. Along with this, both primary and secondary data collection methods plays an imperative role in the research due to collecting the data in a specified time. In addition to this, I also learned about the research methodology that will be significant to identify the tools and techniques to accomplish the research task in an appropriate manner. From the research methodology, I gained my knowledge towards four kinds of factors such as qualitative research method, research method validity, sampling method, and data collection method (Scully, 2014). I understood that the qualitative research method is used to collect the data from the survey, observation, and interview method. At the same time, it can be said that the qualitative research method can be significant to obtain the reliable result in an appropriate manner. Along with this, I also learned that the qualitative research can gain the understanding about the research dilemma. I increased my knowledge towards the research method validity that can be effective to measure accuracy of this research. It would be significant to improve my professional as well as personal life (Silverman, 2016). In addition to this, I also learned about sampling method that will be effective to improve my research skills in an appropriate manner. There are two kinds of sampling methods such as probability sampling and non-probability sampling method. Additionally, both sampling methods were significant in the research. The non-probability sampling method selects participant on the basis of certain factors such as age, gender, education, experience, and skill. It can create partiality in the research during the selection of respondents to accomplish the task of research in an appropriate manner. In this research, probability sampling method is useful because the research is subjective in nature while the non-probability sampling method is used in case the research dilemma is objective in nature. The probability sampling method is useful because it mitigates the biases from the research in a systematic way. The probability sampling method offers an equal chance to participants for reacting on the survey through a questionnaire (Taylor, et al., 2015). It includes random sampling method to select the respondents in an appropriate manner. Moreover, I increased my knowledge towards the probability sampling method in depth that was effective to boost my research skills and developed that capability to select the participants to collect the information about a research problem. Along with this, I also improved my knowledge regarding data collection methods such as primary data collection method and secondary data collection method. The primary data collection method is important to obtain fresh or new data systematically. There are different sources that can be used to collect the primary data like observation, survey, and questionnaire (Tonge, et al., 2013). At the same time, I also created my knowledge towards the secondary data collection methods like company websites, academic journals, textbook, online and offline sources, and magazine. Moreover, the secondary data collection method is fully relied on the primary data. The underst anding about the data collection method can be helpful for increased the additional research skills and groom my personality because of enhancement of the knowledge in a systematic manner (Yan, et al., 2013). I also gained my awareness about the research limitation that will be appropriate to perform the research in an appropriate manner in long-run. Along with this, I learned that there are some significant factors that are considered in the research limitation such as lack of funds, respondents are failed to react on the questionnaire, participants are not capable to provide an accurate response and an unspecified time (Taylor, et al., 2015). In addition to this, I also created my understanding about the research plan along with importance of the research plan. Additionally, it can be said that Gantt chart is also effective to estimate the time for completion of the research. I gained depth knowledge regarding Gantt chart that will support to improve my timemanagement skills in an appropriate manner. Thetime management can be significant to accomplish the task in less time and cost (Tonge, et al., 2013). References Flick, U. (2015)Introducing research methodology: A beginner's guide to doing a research project, USA: Sage. Gunes, V., Peter, S., Givargis, T., and Vahid, F. (2014) A survey of concepts, applications, and challenges in cyber-physical systems.TIIS,8(12), pp. 4242-4268. Katal, A., Wazid, M., and Goudar, R. H. (2013) Big data: issues, challenges, tools and good practices, InContemporary Computing (IC3), 2013 Sixth International Conference on(pp. 404-409). IEEE. Mackey, A., and Gass, S. M. (2015)Second language research: Methodology and design, UK: Routledge. Sadeghi, A. R., Wachsmann, C., and Waidner, M. (2015) Security and privacy challenges in the industrial internet of things, InDesign Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE(pp. 1-6). IEEE. Scully, T. (2014) The cyber security threat stops in the boardroom,Journal of business continuity and emergency planning,7(2), pp. 138-148. Silverman, D. (Ed.). (2016).Qualitative research, USA: Sage. Taylor, S. J., Bogdan, R., and DeVault, M. (2015)Introduction to qualitative research methods: A guidebook and resource, USA: John Wiley and Sons. Tonge, A. M., Kasture, S. S., and Chaudhari, S. R. (2013) Cyber security: challenges for society-literature revie,IOSR Journal of Computer Engineering,2(12), pp. 67-75. Yan, Y., Qian, Y., Sharif, H., and Tipper, D. (2013) A survey on smart grid communication infrastructures: Motivations, requirements and challenges,IEEE communications surveys and tutorials,15(1), pp. 5-20.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.