.

Wednesday, December 11, 2019

Cyber Security and Its Challenges-Free-Samples -Myassignementhelp

Question: Write a Reflective Journal on Challenges in Cyber Security for Business. Answer: Introduction and Reflective Journal Scope Cyber security and its challenges for business are considered for two major and significant facts that are impactful on the business growth and fundamental aspects related to business processes and functional specifications of business operations included within the any business organization. In contrast with these facts, there are various important facts and consequences that are identified through the literature review and research proposal presorted on this particular research topic. This reflective journal is presenting and highlighting the impactful areas about this research topic with respect to fundamental consequences involved within the system architecture of business organizations that are mainly impacted by the cyber security and its challenges. Reflective Journal Scope The scope of this reflective journal is presenting significant areas of research process that manages developmental aspects involved within best possible areas of research about cyber security issues in business sectors. The reflective journal will be capable of analyzing and funding the seriousness and impactful nature of the cyber security issues and problems introduced within the business sectors with respect to various arbitrary needs and demands of business cases and sectors. Critically and depth of learning reflections reflective analysis The study of various literatures has revealed to me that cyber security issues and their impactful circumstances are impacting on the business growth and developmental concerns. Therefore, in order to retrieve the consequences and functional disadvantages of cyber security and its issues impacting on the business sectors, I need to evaluate my research work done on two significant assignments (assignment 1 and assignment 2) for analyzing the impacts and harmful effects of cyber security and its disadvantages affecting the growth of business cases. I have studied the responsive and impactful situations involved within the business cases that are impacted for cyber security and its challenges. Evaluation of effectiveness and usefulness of the learning experiences The evaluation of the experiences is mainly based on the challenges and issues that are incurred for cyber security issues within the business sectors. I have noticed that cyber threat is becoming one increasing threat to the growth structure of business sectors. According to different researches done on this segment of research I consider the cyber security threats are most impacts risks involved within the development of business growth. I found that the business organizations are experiencing decreased growth issues and functional aspects as there are lack of security measures implemented within business organizations that impacts on the significant development of organizational performance depending on various factors, efficiency of technical knowledge of employee, proper security measures required for resolving security issues caused by cyber attacks etc. I have found the lack of technical knowledge about security perspectives for cyber attacks to be the most impactful cause for cyber attacks to business sectors. I feel the organizations should implement new standards and also should recruit new responsible heads for technical development of the organization. This experience have the value in guiding me for my future career development in the field of cyber security issue identification or any kind of recruitment process within different business sectors with respect to various fundamental aspects related to growth aspects of organizations and business cases. I think this experience is valuable enough for me in understanding the major causes and effects of cyber security issues incurred because of cyber attacks within business sectors or business cases. Usefulness of the learning processes The knowledge about cyber security aspects and consequences are important for my career and also increasing programs course knowledge within organizations. I found these learning useful for learning about ethical hackers, vulnerability analysis of software packages and fundamental issue analysis for security associate degree programs that are perfect for degree courses and functionality analysis for particular industry that is focusing on real world application on analysis for cyber security threats and capability analysis for graduate levels and master level programs. Completion of advanced level of training programs and security clearances for applications of cyber attacks in organizations are effective for me to be studied and learned while managing as well as developing my career. Description of the objectives in the learning process The learning process of me mainly consists of stages and functional steps that are incorporated within the research process for managing successful completion of the research process with respect to various objectives and aims of this considered research process. I learned the scopes for this research that states that ICT organizations are interested enough for understanding the gaps in identifying security gaps for cyber security threats involved within business cases. In addition to this, main objectives for this research I also have learned. I found the objective for this research to be the risks and functional aspects that are impacting on success of the project must have to be identified for resolving issues involved within organizations. Evaluation of the learning Evacuation of learning from my research work is important for managing significant development of functional areas of development within the research learning processes with respect to fundamental aspects involved within business sectors. In contrast with these facts, I have also identified that business learning process is important for managing cyber security aspects involved within any professional organizations and functional areas of business cases. The business research is proved to be helpful for me as I have learned various consequences related to functional areas related to cyber security aspects and functionalities that make one business organizations weak. This aspect has made me concerned about the resolving process for the cyber security threats and functional problems. Explanation of learning process According to various papers that is had to study during this research process highlighted various significant aspects that can impact on the job profiles and career options when I will search for job in my career. The consequences helped me to discuss the functional aspects for managing important security threats related to cyber attacks and fundamental aspects involved within cyber attacks. The explanation of this research learning process is very important in order to retrieve the concerns for cyber attacks that can save organizations from losing their economic strength with respect to other considered organizations. From the point of view of my feelings about this research work, this is identified that the responses of respondents are analyzed with respect to critical concerns about cyber attacks within organizations and I can say that the organizations are more focused about these concerns for mitigating their issues. Application of the learning from research Applications of these learning are very important in my career for managing significant development in case of organizational development and prosperity. In contrast with these facts, there are various aspects that I have learned during this study or research work that made me aware of the security issues involved within business organizations. In contrast with these facts, there are various functional and innovative aspects that I have learned during this research that is helpful for my graduate and master level of studies that impacts on the development of functional aspects related to educational structures for organizations and business cases. Therefore, I think every organization should be aware of these considerations and they should also introduce new technological support for their organizational development with respect to functional aspects involved within different organizations with respect to their organizational objectives and aims involved within their structure of wor k culture. I also can conclude this thing that security framework for organizational development helps the organization in achieving more sustainability and also this helps them in earning profits for their functional development and growth. Conclusion This can be concluded that this reflective journal is presenting the significant and important facts about various critical situations that are caused by serious challenges of cyber security issues involved or being introduced within the business sectors with respect to various functional needs and demands of the business cases and fictional areas. This reflective journal is presenting the functional and fundamental issues and lessons learned from the entire research process. The reflective journal is nothing but the presentation of significant areas of learning that is collected while studying and conducting the research within specific areas or domains. Bibliography Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities: Safety, security and privacy.Journal of advanced research,5(4), pp.491-497. Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Incio, P.R., 2014. Security issues in cloud environments: a survey.International Journal of Information Security,13(2), pp.113-170. Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2014. Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model.Journal of Information Security,6(01), p.24. Jokar, P., Arianpoo, N. and Leung, V., 2016. A survey on security issues in smart grids.Security and Communication Networks,9(3), pp.262-273. Kim, D.Y., 2014. Cyber security issues imposed on nuclear power plants.Annals of Nuclear Energy,65, pp.141-143. Komninos, N., Philippou, E. and Pitsillides, A., 2014. Survey in smart grid and smart home security: Issues, challenges and countermeasures.IEEE Communications Surveys Tutorials,16(4), pp.1933-1954. Kshetri, N., 2013. Cybercrime and cyber-security issues associated with China: some economic and institutional considerations.Electronic Commerce Research,13(1), pp.41-69. Singhal, M., Chandrasekhar, S., Ge, T., Sandhu, R., Krishnan, R., Ahn, G.J. and Bertino, E., 2013. Collaboration in multicloud computing environments: Framework and security issues.Computer,46(2), pp.76-84. Stojmenovic, I. and Wen, S., 2014, September. The fog computing paradigm: Scenarios and security issues. InComputer Science and Information Systems (FedCSIS), 2014 Federated Conference on(pp. 1-8). IEEE. Stojmenovic, I., Wen, S., Huang, X. and Luan, H., 2016. An overview of fog computing and its security issues.Concurrency and Computation: Practice and Experience,28(10), pp.2991-3005. Wang, W. and Lu, Z., 2013. Cyber security in the Smart Grid: Survey and challenges.Computer Networks,57(5), pp.1344-1371. Wells, L.J., Camelio, J.A., Williams, C.B. and White, J., 2014. Cyber-physical security challenges in manufacturing systems.Manufacturing Letters,2(2), pp.74-77.

No comments:

Post a Comment