University Reflective Report: Cyber Security and Business Practices

Verified

Added on  2020/03/16

|5
|1367
|221
Report
AI Summary
This reflective report analyzes the critical role of cyber security within contemporary business practices. The student explores the evolution of cyber security, highlighting its significance in protecting intellectual property and business operations from malicious attacks. Through a literature review and personal experiences, the report identifies vulnerabilities, potential threats, and challenges such as technological advancements, increasing internet usage, and the sophistication of cyber criminals. The report emphasizes the need for businesses to implement robust security measures, including system updates, encryption, and strict password policies. The student also discusses the importance of business research in identifying and mitigating cyber security risks, and the role of governments and companies in establishing a secure cyber environment. The insights gained from these assignments enable the student to develop strategies for protecting their own business from cyber threats, including employing security professionals and implementing data access restrictions.
Document Page
Running head: REFLECTIVE REPORT
Reflective Report
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
REFLECTIVE REPORT
Answer to question 1:
In the past two assignments, I have worked on the issue of cyber security within the
business practices. This issue has been prevalent in the contemporary business practices. The
advanced technology in the recent times has acted as both a blessing and a bad fortune at the
same time for the organizations. While researching about this very topic, I had identified few
things. While conducting the literature review, I had consulted several books and journals
regarding the project, where I had found out that the majority of the risk parts are due to
technological issues, therefore the cyber security has been a major issue for the businesses as
this causes several significant attacks on the privacy of the business through network abusing
or any malicious attacks. From the research, I had found out about the possible attacks that
can affect not only the business, but the individuals as well. I had identified the possible
loopholes which can be affected by the cyber criminals and how they can hamper an
individual’s life as well. My experience is quite valuable as I can ensure that my individual
life is not hampered and I can ensure my cyber security. In addition to that, I can also ensure
that my business is well protected and the cyber criminals are not capable of causing any
threat to my business. Therefore I can also protect the business infrastructures from the
virtual attacks. This experience has been valuable for me as it can protect my individual and
business security in future.
Answer to question 2:
Cyber security is mostly the protection of major intellectual property of any business
or individual that is in digital form. While researching for two previous assignments, I had
identified the possible challenges that can emerge within the business for using excessive
technology. Therefore the businesses are now using several means for protecting their digital
intellectual properties. I had also recognized the potential challenges that can affect the
Document Page
2
REFLECTIVE REPORT
businesses such as the increased numbers of users of the technology, availability of the
technology and the increasing popularity of the internet amongst the general population. My
experience regarding these challenges has helped me to chalk out the possible ways I can
protect my business from any kind of cyber crime. Through my experience, I have identified
few methods which may help me in keeping the cyber terrorists away from the business
affairs. It is very important for the businesses to keep the entire operating system updated so
that the experts can find out whether there is any chance of cyber attacks. Therefore keeping
the entire system modified will always help my business to be encrypted. It is also necessary
to encrypt the system software and the wireless networks updated for protecting the business.
Therefore the data can be controlled and the hackers will not get to the storage clouds easily.
Answer to question 3:
While researching for the assignment, I have read various books, blogs and journals
regarding this topic. One major thing that I identified that the cyber security is a complicated
matter as the attacks on digital properties can create a huge damage in the air traffic and
financial matters which is almost similar to the terrorist attacks on any physical space.
Therefore the challenges for protecting the cyber security of any space are a multi-layered
domain. The experts in the system should always be on their toes to find out whether there is
any loophole for the cyber crime. There have been several researches on an international
level and several countries are fighting against cyber crime. However the random usage of
mobile phone and internet has made cyber crime tracking more difficult. Social media plays a
great part within the challenges of cyber crime as faking the advertisements also enhance the
further challenges in cyber crime. Several researchers have indicated that the national
security should also be well-protected as it is involved with different responsibilities and
roles with the concerned stakeholders. Therefore there should be an entrusted relationship
Document Page
3
REFLECTIVE REPORT
between the government of the country and the companies, so that a well-encrypted cyber
security management can be established.
Answer to question 4:
Business research is very much important in the research learning procedure as it
determines various things about finding potential cures for the issues that can possibly
happen in the contemporary business world. The business researches tend to define the
business objectives as before initiating any business; the entrepreneurs have a major
responsibility of defining business. Therefore they should have a detailed research procedure
to find out the existing competitors within the industry. This can be very much helpful for the
research learning process. The business researches also help the students learn how to collect
necessary data from the market, both primary and secondary. The students can learn
collecting data and analyzing them for further times. This is another major thing to learn as
this will help the students to understand the determination of product quality, price, service
and value in the market.
Answer to question 5:
I have conducted the previous activities with the aim of identifying the potential
challenges of cyber security within the contemporary business activities. Cyber security is a
major issue for the businesses as it can affect their entire operations. The project has also
been done for recognizing the factors and causes that enhances the risks of cyber security
within the business channels. This particular topic is quote critical as it comes with different
kinds of causes and challenges that can be discussed further. The project has also been
conducted as cyber security requires becoming stronger as the numbers of hackers are
increasing gradually, however the companies should have an encrypted system so that the
hackers cannot get into the storage system easily. However, if the organizations are not
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
REFLECTIVE REPORT
adequately aware about the adverse situations, they can take effective steps to prevent their
data to be corrupted by the cyber criminals. I had conducted these two activities as these
hackers do not only attack the company properties, but also the individual properties. In
addition to that, it can also impact my own business as well. I had gathered sufficient
knowledge for making my business encrypted from the cyber attackers as well.
Answer to question 6:
The learning from these two past assignments has made me gather knowledge
regarding the cyber security and how the cyber crime can affect the business activities to a
great extent. My learning has taught me that the system software should always be updated so
that the system experts can easily find out the loopholes. The browsers should always be
updated as the companies can use proper filtration for controlling the company data
accessing. I have also learned that in a company, there should be proper usage of strict
policies regarding the passwords. In addition to that, all the folders, drives and files should be
encrypted. Restricting the data usage for some people would always help the company to
restrict the software and the administrative rights so that the computers of the organization
are free from any unauthorized installation. In future I can take help from such learning and
ensure that in my organization, the authority provides access to few restricted sites and use
proper internet filters so that the hackers and employees are prevented from any kind of
unnecessary data to upload in the restricted storage clouds. I have also identified that the
company should hire professionals who can deal with any kind of security issue or any
scammers bulge in the business network.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]