Reflective Journal: Business Research, Cybercrime, and Future Career

Verified

Added on  2023/06/10

|7
|1313
|356
AI Summary
This reflective journal details a student's learning journey in understanding cyber security through business research. The journal highlights key takeaways from assignments, focusing on the motives behind cybercrimes and the vulnerabilities of organizations. It reflects on the importance of IT departments in preventing cyber breaches and the role of ethical hacking in future security strategies. The student discusses the impact of cybercrimes on individuals and society, emphasizing the need for awareness and proactive measures. The research underscores how various attack methodologies target different institutions, from financial firms to individual internet users. The journal concludes with a renewed interest in pursuing a career in IT and contributing to cybercrime prevention, recognizing the significant implications of this field for the business world. Desklib provides students with access to this assignment and many other solved assignments for learning.
Document Page
Running head: BUSINESS RESEARCH
BUSINESS RESEARCH
Student’s Name
University Name
Author’s Name
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
2BUSINESS RESEARCH
Reflective Journal
Introduction
The learning experience that I had from the previous assignments helped me to clearly
understand the various means of implementing cyber security. However in order to realise
cyber security, it is essential to understand the major cyber threats that requires the
implementation of security for threat prevention. Cybercrimes are committed by people who
have an accomplished understanding of the Informational Technology. Analysing the
previous two assignments it have been observed that cyber criminals mostly target the major
organisations and breach their financial accounts. I have gained an in-depth knowledge
regarding how the organisations become vulnerable to the attacks of cyber criminals. The
major approaches that the cyber criminals adapt to breach the data records have been clearly
understood in the course of doing the assignments.
Reflective Journal Scope
The extent to which cybercrime and the vulnerability of the major foundations before
the cyber criminals have increased, have made cyber-crime and the technologies used in
cybercrime, a topic of study. However, as an outcome of this learning experience, I have
realised that it is not always that the criminals breach in to steal the bank details of the
organisations. Breach of data base is also one major sort of criminality that is sought after by
criminals in many case.
Critically and depth of learning reflections reflective analysis
Week 1
This research helped me to understand the major kinds of motives with whiuch the
cybercrimes are implemented. Hence the learning outcomes of this course would help me to
Document Page
3BUSINESS RESEARCH
study further the technologies that can be used by the organisations so as to prevent their
organisation’s data or the financial information from being leaked. In my future career, these
learning outcomes would help me to get placed in frontline companies as data analysts or IT
experts.
Week 2
In future I suppose every major global organisations should have a specialised IT
department which would work towards preventing cyber breaches. In this context I would
stand at a favourable position, as I have gained in a comprehensive knowledge of the
technologies that are being implemented by the cyber criminals. Conclusively, in the research
work, I have made profound research regarding how the technologies are implemented by the
criminals.
Week 3
As such my knowledge about the criminal methodology would help me to work
proficiently as a deemed professional as a data expert. Cybercrimes can affect a person in
general life. Cyber criminals can breach the bank and other financial details of individuals
also.
Week 4
My knowledge, gained in as an outcome of accomplishing this research study would
help me to become more alert about such crimes being committed here and there in the
society and I would be in a better position to prevent people around me and my community
from becoming victims to cybercrime.
Week 5
Document Page
4BUSINESS RESEARCH
In the course of this assignment I became aware of the various metrics that are implemented
by the cyber attackers. The cyber criminals also have separate traits of methodologies for
launching attacks on various kinds of institutions. The DDoS network is used specifically for
the financial and the major audit firms (Graves, Acquisti & Christin, 2016). The heavy users
of internet are however prone to the attacks of IoT. The cyber footprint mapping of such
people are easy and as such their data becomes vulnerable. Similarly Ransom ware and
Smartphone malware are other big threats. However, personally I suppose that the pro-active
nature of the cyber criminals is a bigger threat.
Week 6
These cyber criminals as I have researched are independent individuals or organisations.
However, as per Brewster et al. (2015), the money they acquire or the information they
breach in are sold to many terrorism groups also. As an outcome, data security is becoming
all the more important. The research conducted in the course of this study has helped me to
realise that in the upcoming future, the practice of ethical hacking is going to be a major
weaponry to stall the cyber-attacks in the future.
Week 7
The research that I had conducted in the course of this assignment, helped me to make
this assignment more relevant and significant. In the course of this research study I have
attempted to highlight how and why the major organisations have become prone to the cyber-
attacks. I suppose in a research journal related to cybercrime and hacking, there should be
sufficient implications regarding what are the predominant practices that makes an
organisation prone to such attacks.
Week 8
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
5BUSINESS RESEARCH
I have described throughout this report, how the use of multiple payment channels or
data storages like Cloud storage and multiple portals for financial transactions makes
individuals or organisations prone to such attacks. In the course of the literature review,
Week 9
I studied that in spite of high level of security, various organisations can become
prone to data thefts. Any individual of that particular organisations can be proactive on the
social media and might share or transfer any important information over Facebook or other
common social platforms in any moment of hurry. He or she would be completely unaware of
the fact the Facebook profile have been stalked by any hacking group.
Week 10
I also gained knowledge regarding how firewalls and potential antivirus can be developed to
identify attempts to breach into the cyber space of any organisation. In this context, I would
like to mention that the leading cloud storage or data protection agencies are also not able to
provide security against certain spoofs of the data crimes.
Week 11
The random sampling technique used in this research have been very much helpful in
reflecting the various instances of data breaches. In the small scope of this research study it is
difficult to exemplify and relate the various ways in which the major data breaches have
taken place. However a synopsis of the major events and the ways they affect an
organisations have been highlighted in the research study.
Week 12
The major reason of selecting this topic of study is that this is a high end issue that has
been a threat for the business world and have massive outcome on its accomplishment.
Document Page
6BUSINESS RESEARCH
Hence, this research study is a small endeavour of collecting facts and statistics along and
analysing them to shed light on this burning issue. Along with the ethical considerations, this
research study have serious implications for future scope n also.
Conclusion
As mentioned earlier in this research journal, working on this research topic, I have
gained in a new enticement to work on this topic and gain practical knowledge that would
help me to deliver value as IT professional or work in a job role to prevent cybercrime.
Document Page
7BUSINESS RESEARCH
Reference List
Brewster, B., Kemp, B., Galehbakhtiari, S. and Akhgar, B., 2015. Cybercrime: attack
motivations and implications for big data and national security. In Application of Big Data
for National Security (pp. 108-127).
Graves, J.T., Acquisti, A. and Christin, N., 2016. Big data and bad data: on the sensitivity of
security policy to imperfect information. U. Chi. L. Rev., 83, p.117.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]