Business Capstone Project: Learning Experience and Cybersecurity Challenges
Verified
Added on 2023/06/11
|11
|2790
|139
AI Summary
This Business Capstone Project evaluates the effectiveness and usefulness of the learning experience and explains how this learning process will be useful to address cybersecurity challenges in businesses. The content includes a description of the learning process, evaluation of learning, and a plan to apply the learning.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: BUSINESS CAPSTONE PROJECT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
BUSINESS CAPSTONE PROJECT2 Table of Contents Evaluate the effectiveness and your usefulness of the learning experience.................................................3 Explain how this learning process will be useful to you..............................................................................4 Describe objectively what happened in the learning process.....................................................................6 Evaluate what you learn..............................................................................................................................7 Explain your learning process.....................................................................................................................8 Explain Plan how this learning you will apply............................................................................................8 References.................................................................................................................................................10
BUSINESS CAPSTONE PROJECT3 Evaluate the effectiveness and your usefulness of the learning experience I have gained my understanding of the Cybersecurity issues in businesses that were useful for me deal with the cybersecurity concern. From the assignment 2, I have developed my experience that cybersecurity entails several technologies which are intended to maintain the data, system, and data from different kinds of cyber attacks. I have also developed my knowledge about the objectives of this research. In this way, I have learned that the key aim of the research is to assess several types of security measure that could be executed by an organization to address the threats posed by different cyber attacks. Through the literature review, I have also built my comprehension about meaning and concept of cybersecurity. In this way, it is evaluated that the cybersecurity defined as the technologies and systems that are constructed for protecting different networks, programs and systems from the attack of cyber threats by a virus, spam and different online attacks (Anitha, Paul, and Kumari, 2016). This learning experience was effective for me to protect the data within an organization. I have also increased my understanding of different challenges of cybersecurity measures. In this way, I have learned that Ransomware viruses can disrupt the business operation and are focused by the attackers with the purpose of demand according to preference from the victims. I have also gained my learning experience about expansion of Artificial intelligence. In this way, it is analyzed that artificial intelligence is used to deal with different types of cyber-attacks (Bryman, 2017). I have also observed that this measure does not require more expenses for maintenance and also function 24*7 hours. I have gained my understanding that the gaining cyber attacks become a serious business concern because a large number of corporations are highly vulnerable to distinct kinds of cyber attacks. This leaning process would be beneficial for me to make further research on the given research issue. I have also developed my understanding that effective defense technique should be applied
BUSINESS CAPSTONE PROJECT4 by a company with the intention of computer technologies and internet. It is also evaluated that the rate of cybercrime is gaining and such kind of issue is a great source of concern in business as they are investing the high amount in hiring the number of IT professionalism and avoid the business from such crimes (Taylor, Bogdan, and DeVault, 2015). This learning experience could be beneficial for me to avoid the cyber threat from the business. This business research has also developed my understanding regarding project scope. In this way, it is evaluated that there is a large number of businesses which use computer technologies with the intention of business in order to avoid the cybersecurity issues (Hillier, 2012). I have also gained my knowledge about the scope of this project. In this way, I have observed that this project has wider scope due to gaining understanding regarding cyber threats and cybersecurity. Explain how this learning process will be useful to you This course was beneficial for me to apply the new knowledge in the future. From the business research program, I have learned that Internet of Things (IoT) has eased the procedure but it increases the chances of a cyber attack. I have also developed my experience that business should implement different measures of security like user verification codes, complex security measures, and two-factor authentications in order to eliminate such uncertainty. This learning process will be useful for me to use the security measures in the business. As a result, it would be beneficial to improve my career in long-term. Assignment 2 has also developed my knowledge about the vulnerability of serverless applications. In this way, I have assessed that the facts and figures regarding the customers in business organizations are at the high risk due to less server application and could easily provoke cyber attacks. This learning process will be useful for me to avoid the cybersecurity in the future. I have also developed my experience regarding insider threats. In this way, it is discussed that internal threat is considered as breaches of data and
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
BUSINESS CAPSTONE PROJECT5 harmful data that are caused of wicked workforce intention and attackers want to get the opportunity of it (Jacko, 2012). Under this way, I have also learned that the mobiles are also considered in the cyber attacks due to spreading viruses via several applications. I have also increased my knowledge about false advertisements and different feedbacks. In this way, it is identified that customers often go down in the trap of attackers due to false advertisement of company on the social media (Shipman, 2014). Thus, this new knowledge will be applied by me to improve the reputation and business operation of organization. I have also developed my understanding regarding about the techniques for dealing with the cybersecurity. In this way, it is pointed that that the cloud monitoring software and security checks is required for corporation to make sure the integrity and safety (Walters, 2014). This learning would be applied by me to face the challenges of cybersecurity in the business. I have also increased my learning that the unavailability of firewall in large amount of servers at the workplace as well as existence of outmoded ones is a threat for company but advantageous for hackers. I have also developed my understanding regarding existence of new firewall system as it could be advantageous to deal with the threats for organization. I have also increased my learning regarding machine learning algorithms. It is observed that this machine learning algorithms is practiced to assess different frauds and success rate of different type of marketing campaign and other innovative applications (Sullivan-Bolyai, Bova, and Singh, 2014). I have also pointed that the social engineering provides the chances to attacker for hacking the system like phishing technology, deceive important facts and figures and utilizes them for hacking the system straightforwardly. This learning process will be useful for me to avoid the possibility of hacking system from organization. As a result, it can enhance my personal and professional career. Through the literature review, I have assessed that installing
BUSINESS CAPSTONE PROJECT6 anti-phishing technology requires maintaining the system from hackers. It is also observed that uses of drone are increasing with the intention of business purposes by company as cyber attackers utilize the opportunity for hijacking the drones (Gnanadesikan, 2011). This learning process was useful for me to enhance my understanding the threat of cybersecurity. In this way, it is pointed that Crypto-currencies such as Bitcoin are formulated in blockchain and technological innovation with decentralized (Xia, Yang, Wang, and Vinel, 2012). I have also gained my understanding that organization should secure the record of transaction to deal with cyber challenges. This business research was useful for me to develop my understanding that blockchain enables an organization to focus on different types of decentralized access control. I have also increased my comprehension that interconnection through a web of the internet is increasing which makes an organization to face threats due to insecure data transfer, insecure web interfaces, inadequate communication technique and inadequate effective security measures. This learning was beneficial for me to enhance my technical skills. I have also developed my comprehension that the robotics is used by IT experts that could be posed by different malicious software. I have also built my knowledge that 77% of the malicious items on the internet are malware and a single mistake by the company can destroy the operating system as well as servers entirely. This learning experience would be practiced by me in order to use the internet cautiously. Describe objectively what happened in the learning process I did different activities to complete the research such as identifying research concern, literature review, and research methodology. For completing these activities, I read different articles, academic publication and used to online websites. I have also conducted interview and surveys for performing the business research. Under the literature review, it is analyzed that the attack of
BUSINESS CAPSTONE PROJECT7 viruses such as Wannacry and Shamoon v2 can disturb the whole performance of business (Marshall, Cardon, Poddar, and Fontenot, 2013). I have also learned that there are different kinds of cyber threats challenging for the organization as several computer devices and internet is used by the company for business operation. Through the research methodology, I have learned that research methodology is a science of studying how to perform the investigation. It is also observed that both primary and secondary data collection method will be used to collect the information regarding research concern (Ashenden, and Lawrence, 2016). This learning process was useful for me to use the data gathering procedure in the future. I have also improved my comprehension regarding primary mode of data collection. In this way, I have pointed that primary data collection will contain the survey and interview in order to pool the first-hand information. I have also analyzed that survey and interviews are used to gather the opinion of people about the research problem. Evaluate what you learn Through business research, I have observed that both qualitative and quantitative research design was useful for the research process. In this way, I have learned that for qualitative data gathering, the interview would be conducted with the expert of the computer in the business organization. It would provide the data associated with issue face by the company about the cybersecurity and measures in place to fight against such issues (Knowles, Prince, Hutchison, Disso, and Jones, 2015). I have also perceived that survey would be used for quantitative data gathering as it would be beneficial for pooling the numeric facts and figures about the issues. This business research was also useful for me to develop my awareness of the sampling technique. In this way, I have learned that simple random sampling technique would be implemented for choosing the survey participants and sample size. This business research was useful for me to gain knowledge about
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
BUSINESS CAPSTONE PROJECT8 the online questionnaire. As a result, I would be capable for conducting the online questionnaire in the future. I have also generated my experience regarding questionnaire structure. In this way, I have learned that Likert scale would be practiced for conducting the survey. This learning would be implemented by me in terms of developing the research questionnaire. I have also learned that the reliability of data could be tested via Cronbach’s alpha coefficient. This business research was useful for me to apply this learning process in the future in terms of conducting the research. Explain your learning process In assignment 1, I did different activities such as identification of research concern, formulation of research aim and objectives, and literature review. In assignment 2, I have summarized the literature review and used research methodology that was beneficial for completing the research in a systematic manner. Through the research methodology, I have generated my experience regarding limitation of research. In this way, it is pointed that the limitation of this research may be time constraint because more time would be required for pooling the data through interview and survey participants (Graham, Olson, and Howard, 2016). I have also observed that restricted time could impact on the result of research. Explain Plan how this learning you will apply This course was relevant for me to address the cybersecurity challenges in the business. It was also beneficial for me to develop the research plan. In this way, it is evaluated that research plan contains different activities which would be performed for completing the research (Fielder, , Panaousis, Malacaria, Hankin, and Smeraldi, 2016). It will also show the expected time that each activity will take to complete the research in the future (Carr, 2016). This research plan was beneficial for me to complete the research in a chronological way.
BUSINESS CAPSTONE PROJECT9
BUSINESS CAPSTONE PROJECT10 References Anitha, A., Paul, G., &Kumari, S. (2016). A Cyber defense using Artificial Intelligence.International Journal of Pharmacy and Technology,8, 25352-57. Ashenden, D., & Lawrence, D. (2016). Security dialogues: Building better relationships between security and business.IEEE Security & Privacy, 14(3), 82-87. Bryman, A. (2017). Quantitative and qualitative research: further reflections on their integration. InMixing methods: Qualitative and quantitative research(pp. 57-78). London: Routledge. Carr, M. (2016). Public-private partnerships in national cyber‐security strategies.International Affairs, 92(1), 43-62. Fielder, A., Panaousis, E., Malacaria, P., Hankin, C., & Smeraldi, F. (2016). Decision support approaches for cybersecurity investment.Decision Support Systems, 86, 13-23. Gnanadesikan, R. (2011).Methods for statistical data analysis of multivariate observations(Vol. 321). New Jersey: John Wiley & Sons. Graham, J., Olson, R., & Howard, R. (2016).Cybersecurity essentials.CRC Press. Hillier, F. S. (2012).Introduction to operations research. Tata McGraw-Hill Education. Jacko, J. A. (2012).Human-computer interaction handbook: Fundamentals, evolving technologies, and emerging applications. Florida: CRC Press. Knowles, W., Prince, D., Hutchison, D., Disso, J. F., & Jones, K. (2015). A survey of cyber security management in industrial control systems.International journal of critical infrastructure protection, 52-80.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
BUSINESS CAPSTONE PROJECT11 Marshall, B., Cardon, P., Poddar, A., & Fontenot, R. (2013). Does sample size matter in qualitative research?: A review of qualitative interviews in IS research.Journal of Computer Information Systems,54(1), 11-22. Shipman, M. D. (2014).The limitations of social research. London: Routledge. Sullivan-Bolyai, S., Bova, C., and Singh, M. D. (2014). Data-collection methods.Nursing Research in Canada-E-Book: Methods, Critical Appraisal, and Utilization, 287. Taylor, S. J., Bogdan, R., &DeVault, M. (2015).Introduction to qualitative research methods: A guidebook and resource. New Jersey: John Wiley & Sons. Walters, R. (2014). Cyber attacks on US companies in 2014.The Heritage Foundation,4289, 1- 5. Xia, F., Yang, L. T., Wang, L., &Vinel, A. (2012). Internet of things.International Journal of Communication Systems,25(9), 1101-1105.