logo

Cyber Security Assignment (DOC)

6 Pages1749 Words101 Views
   

Added on  2020-03-15

Cyber Security Assignment (DOC)

   Added on 2020-03-15

ShareRelated Documents
Running Head: BUSINESS RESEARCHBusiness Research
Cyber Security Assignment (DOC)_1
2BUSINESS RESEARCHReflective ReportI increased my knowledge regarding challenges of cyber security in businesses from this research study. I learned about the research aims and objective of that will be effective to accomplish the research in an effective way. I analyzed that the primary aim of this research is to identify and evaluate certain cyber security challenges for businesses in Australia. Furthermore, I gained my knowledge towards the research justification that will be supportive to identify the rationality of research in an effective manner (Flick, 2015).It will support to identify the motivation of this research systematically. Cyber security is a technical procedure and implementations which is designed to secure personal computers together with their components from damages. In addition, I also learned that it is accountable to protect the software of computers, computer network, hardware devises, computer data, and programmes from the unauthorized workers from being damaged. I also gained my understanding about the significance of project in long-run. At the same time, I created conceptual understanding towards the research issues in an appropriate manner. Thereare different types of cyber security risk such as Cyber Thefts, Malware and Vectors Risks, and Cyber Espionage (Gunes, eta l., 2014). In addition to this, I also gained my understanding about some additional risk such as insecure passwords, computer sabotage, clickjacking, tampering, and insider threats. In addition to this, I deeply enhanced my knowledge towards the Cyber thefts that would be a primary issue for an organization. Cyber thefts turn around the stealing of company data, especially financial data. A large number of organizations were faced such kinds of issues that declined the financial performance (Katal, et al., 2013). Along with this, I also gained my knowledge about Cyber Espionage that is another kind of cyber security risk that will also be a negative impact on the performance of an organization. The Cyber Espionage is related to application of computers and internet to address the
Cyber Security Assignment (DOC)_2
3BUSINESS RESEARCHconfidential data of company by unauthorized people that will create a complexity in a corporate. In addition, it can be said that the cyber espionage is presently being executed by alarge number of unauthorized workers to obtain unauthorized data which will be used to blackmail to the company (Mackey, et al., 2015).Along with this, I also learned that the Cyber criminals improve their techniques by internet and computer attack with some additional devices named malware. In addition, I increased my knowledge about the malware technique that enabled the people to address unauthorized information on computers and internet. It is classified into certain parts such as worms, ransomware, Trojans, spyware, and viruses. At the same time, it can be said that such kinds of information can be effective to improve my professional life in long-term. It will be also beneficial to successfully deal with such kind of issues in long-term in a systematic way. From this research, I learned about research question and hypothesis that will be necessary for identifying the research issue (Sadeghi, et al., 2015). At the same time, I understood about two kinds’ of research questions named primary and secondary questions. The primary questions are based on statistical data while the secondary questions are based on theoretical data. Along with this, both primary and secondary data collection methods plays an imperative role in the research due to collecting the data in a specified time. In addition to this, I also learned about the research methodology that will be significant to identify the tools and techniques to accomplish the research task in an appropriate manner. From the research methodology, I gained my knowledge towards four kinds of factors such as qualitative research method, research method validity, sampling method, and data collection method (Scully, 2014). I understood that the qualitative research method is used to collect the data from the survey, observation, and interview method. At the same time, it can be said that the qualitative research method can be significant to obtain the reliable result in an appropriate manner.
Cyber Security Assignment (DOC)_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment Business Research Cybersecurity
|6
|1727
|88

Cyber Security in Business Organizations - Report
|15
|3318
|119

Business Research on Cybersecurity
|5
|1439
|37

Trends in Computer Science
|7
|1424
|49

Trends in Computer Science
|9
|964
|70

(Solved) Cyber security challenges Assignment
|8
|2715
|216