Wednesday, May 6, 2020

Cyber security challenges in Smart Cities - Myassignmenthelp.Com

Questions: 1. Evaluate the effectiveness and your usefulness of the learning experience. 2. Explain how this learning process will be useful. 3. Describe objectively what happened in the learning process. Answers: Evaluate the effectiveness and your usefulness of the learning experience From the assignment 1 and 2, I have gained my experience about Challenges in Cyber Security for Business. This learning experience is valuable for me to deal with the cyber security challenges. I have observed that the internet is highly used by both government and a private company for developing the business. It is evaluated that information technology creates a different tool to protect the data in terms of cyber security. This research is valuable for me to act in information technology business. I have also developed my understanding of certain strategies to enhance the cyber security in business. I have also gained my knowledge regarding meaning and concept of cyber security. In this way, it is stated that cyber security is a process, technology, and practice which are used to keep computers, networks, program, and information from unauthorized damages and access (Elmaghraby and Losavio, 2014). From the literature review part, I have pointed that IT security is flat to maintain the deviating and deceptive information through secure techniques and procedures. This learning experience is valuable for me to protect the data. I have also analyzed that security is an essential factor which linked to people and develops the confidence among employees with respect to the internet. This learning experience is effective for me as security is required for a business to accomplish the commercial growth. Explain how this learning process will be useful By the review of the literature of the topic, I realized that for the protection of the data networking procedure, the company can use the implementation of virtualization technologies. I will apply this new knowledge and insight in the future in terms of using cloud computing in the workplace. It is evaluated that virtualization provides several benefits and measures for security threats (Dua and Du, 2016). I will apply this new knowledge to build trust among customers regarding computing system by countering threats. It has been observed that the security is been breached which could create a negative impact on the ICT system of the companies. I will apply this new knowledge in the future to avoid the breaches of security. I have also increased my knowledge about the different challenges of cyber security. It helped me in understanding that the business needs to maintain the timing of the activities, quality of the services and the technologies in order to maintain the security of the cyber security (Scully, 2014). I have also analyzed that a company should implement safe data and communication technology from initiation and all over their existence. It is analyzed that cyber security technology takes a long time to keep the information because of the long derivation of security consistency (Radvanovsky and Brodsky, 2016). I will apply this new knowledge and insights in the future in terms of making strategy. Describe objectively what happened in the learning process I read different articles and books for conducting literature review activities. I have seen different videos to gain my depth understanding about research concern. As a result, it was beneficial for me to meet the research aim and objectives in a specified time period. By reviewing the literature, I concluded that social media is widely used by people which may lead to higher cyber-attacks and threats. Furthermore, it is evaluated that adoption of social media may generate the threat of cyber-attack at the workplace (Cherdantseva, Burnap, Blyth, Eden, Jones, Soulsby, and Stoddart, 2016). At the same time, I have pointed that company should evaluate the policies and process with regards to cyber security for eliminating the risks. I read that invasion of privacy in the ecosystem could direct to create a threat in the workplace. I have also increased my understanding that cyber security should be implemented and ready to use by customers without having technical understanding. From the literature review, I have also increased my understanding of different strategies to improve cyber security in business. In this way, it is evaluated that corporation should use set of standard to manage confidentiality and personal data security issues from starting to design and development of security technologies and services (Kumar, Pandey, and Punia, 2014). It was effective for me to avoid the cyber threat within an organization. Evaluate what you learn It is evaluated that the research assisted me in sharpening my research skills and the knowledge which is used to carry on the processes of the research. I have also learned that interpretivism research philosophy is used for conducting the research as it emphasizes mainly on multiple methods to solve any given research concern. I examined the research processes used in the research and I learned that in the research, mixed method is used in order to assess the challenges of cyber security for the business. In this way, it is evaluated that deductive approach is used to focus on the concepts regarding cyber security for business (Sajid, Abbas, and Saleem, 2016). From the assignment 2, I have learned that there is a different step of qualitative research. These steps are identifying a research problem, review the literature, specifying a purpose, and collecting the data. Other steps are analyzing and interpreting the data, determining the quality of data, and reporting of research (Ch oo, 2014). I have also increased my knowledge about approaches to validity. Explain your learning process There are various activities conducted while conducting the research. In the process, these activities are conducted so that the aims and objectives of the business can be achieved within the given time period. I have also understood about various sampling techniques and how they are used with the research process. In this way, I have learned that convenient sampling technique will be applied to choose IT professionals. The main cause of using data collection method is used to pool the data in a systematic manner by using different sources (Rid and Buchanan, 2015). It was effective for me to gather the data regarding research concern. For taking the interviews of various IT professionals, for the purpose of collecting the data, face to face interviews will be conducted. I have learned that researcher should use different reliable sources like journal, article, books, and websites. I have increased my understanding of the different step of qualitative research. These steps are identif ying a research problem, reviewing the literature, specifying a purpose, collecting the data, analysing and interpreting the data, determining the quality of data, and reporting the research (Karim, and Phoha, 2014). I have also developed my understanding of different approaches to validity. In this way, I have learned that validity defined as the extent to which a concept is properly considered in a quantitative research. For selecting the managers in the IT firm, for the purpose of research, random probability sampling technique will be used. From the assignment 2, I have increased my understanding of data collection methods. I have also learned from the research process that to collect the data from the IT professionals in the Australian firms, questionnaire method should be used. This research was beneficial for me to collect the data effectively. It has been observed that the data in quantitative form will be showcased by using tables and graphs and it will be further analysed by using various statistical tools like regression methods and correlation techniques. The main cause of using this technique is used to comprehend the statistical data in a meaningful manner (Vande Putte, and Verhelst, 2014). I have also learned that two variables will be used in this research report named cyber security and business. Explain Plan how this learning you will apply I have learned about various types of limitations which can hamper the normal course of the research. In this way, I have learned that a researcher have adequate time to conduct the research. As a result, it could restricts to obtain depth assessment about research concern i.e. challenges in cyber security in business. I have also learned how to maintain time schedule in the normal course of the research which could help in scheduling each activity of the research and helps in completing it on time. This could be applied by me in future to complete the research in a specified time period. I have also increased my understanding about Gantt chart, which is used for visual representation of activities and time that will be taken for completing it. This technique could be applied to assess the timing of each activity and helps to understand those activities that will take more time to complete the research (Jing, Vasilakos, Wan, Lu, and Qiu, 2014). As a result, I would be able to become a good project manager in the future which would also help in progressing in my career. References Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. computers security, 56, 1-27. Choo, K. K. R. (2014). A conceptual interdisciplinary plug-and-play cyber security framework. In ICTs and the Millennium Development Goals (pp. 81-99). US: Springer. Dua, S., Du, X. (2016). Data mining and machine learning in cybersecurity. USA: CRC press. Elmaghraby, A. S., Losavio, M. M. (2014). Cybersecurity challenges in Smart Cities: Safety, security and privacy. Journal of advanced research, 5(4), 491-497. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481-2501. Karim, M. E., Phoha, V. V. (2014). Cyber-physical systems security. In Applied Cyber-Physical Systems (pp. 75-83). New York: Springer. Kumar, V. A., Pandey, K. K., Punia, D. K. (2014). Cyber security threats in the power sector: Need for a domain specific regulatory framework in India. Energy Policy, 65, 126-133. Radvanovsky, R., Brodsky, J. (Eds.). (2016). Handbook of SCADA/control systems security. USA: CRC Press. Rid, T., Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1-2), 4-37. Sajid, A., Abbas, H., Saleem, K. (2016). Cloud-assisted IoT-based SCADA systems security: A review of the state of the art and future challenges. IEEE Access, 4, 1375-1384. Scully, T. (2014). The cyber security threat stops in the boardroom. Journal of business continuity emergency planning, 7(2), 138-148. Vande Putte, D., Verhelst, M. (2014). Cyber crime: Can a standard risk analysis help in the challenges facing business continuity managers?. Journal of business continuity emergency planning, 7(2), 126-137.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.