Business Research: Reflection Report on Cyber Security Challenges

Verified

Added on  2021/05/31

|7
|1925
|49
Report
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Reflection Report
RUNNING HEAD: Reflection Report
Business Research
Challenges in Cyber Security for Business
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Challenges in Cyber Security for business 1
Table of Contents
Evaluation of effectiveness and usefulness of the learning experience.................................................2
Usefulness of the learning experience...................................................................................................3
Happenings of the process of learning..................................................................................................3
Evaluation of learning............................................................................................................................4
Explanation of learning process.............................................................................................................4
Explanation of the plan for applying the learning..................................................................................5
References.............................................................................................................................................6
Document Page
Challenges in Cyber Security for business 2
Evaluation of effectiveness and usefulness of the
learning experience
This reflective report is about my research project conducted on the topic ‘Challenges in
Cyber Security for businesses’. This research was conducted in phases as planning was done
at first so as to complete the research by the deadline. The first week went in the planning
of research after the selection of the research topic.
The research is very useful for me as it provides vast knowledge about the concept of Cyber
security and how it faces challenges in the cyber environment. It is experienced that the
change and increased use of technology provided a good platform to the companies for
taking their functions and business at global level but it comes with a backlog. The backlog is
that it is very challenging to maintain security of cyber systems and information shared on
this platform. The increased number of cyber stacks is becoming major issue for the
companies because it poses a big threat to their financial and confidential data ( Suh, et. al.,
2014). It increases the importance of cyber security for the businesses. The research report
mentioned about the standards which need to be maintained by the companies in order to
maintain their security (Goel and Hong, 2015).
Different articles and books have been reviewed in order to obtain information about the
topic so that quality research can be done. It helped me in gaining much information about
growing use of technology and the forms of cyber-attacks which are the major concern for
today’s corporate world. The research literature review helped me in gaining understanding
about the new marketing standards and how the large organisations are structured to gain
revenue in the highly competitive environment. It also helped me in brushing up my
communication skills and knowledge about social media content. I also learned how
companies use social media to maintain better connection between the customers and
business. The research was conducted and prepared by setting the primary and secondary
questions which are supposed to be answered with the help of primary and secondary
research. Different methods have been used in order to complete the research. Well-
structured interviews and survey questionnaires have been developed so that the research
seems complete and it also helps in collecting both the subjective and quantitative data.
Document Page
Challenges in Cyber Security for business 3
This research also made me aware about the current cyber-attacks and the challenges which
the companies have to face for maintaining cyber security in the business. I learned what is
sampling and what the different types of sampling which are used to select respondents for
the purpose of interviews and questionnaires. The research also helped me in learning
about various data analysis tools which are used to increase the effectiveness of the data
collection and in gaining the final conclusion of the data collection.
Usefulness of the learning experience
This learning process is useful for me as it will help me in developing knowledge in me
regarding Cyber security and its related concerns which the businesses have to face
nowadays. It is seen that Cyber security is not only posing a threat to the financials of the
business but also to the reputation of the business in the market (Ab Rahman and Choo,
2015). This learning is useful as it will assist me in achieving better grades in my course and
will make me updated about such an ongoing trend in the business world. This knowledge
is also useful because it can be applied to my professional life as well. Be it a managerial
position or as an employee, I can be asked for providing my reviews on how to maintain
security of cyber systems of business. It would help me in providing my own opinions in
front of my colleagues and seniors. It will also help me in taking necessary actions, if I start
up my own business in future.
Happenings of the process of learning
The process of learning initiated with the planning where the action plan was made as to
how the research should be completed. I learned that the companies are spending much of
their profits for securing their cyber systems because most of the businesses are nowadays
operated on digital platform for which security maintenance is the prerequisite.
The research process further involved the development of research objectives and setting
research questions on the basis of which the whole research is to be made. I learned about
the importance of research methodology and how it helps in collecting and analysing the
data for taking out conclusions for the research. I learned about the concepts of reliability
and validity concepts and different sources of information which is used for collecting
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Challenges in Cyber Security for business 4
relevant information. The process of learning further moves on when the conclusions are
drawn from the data analysis.
Evaluation of learning
It is clear that Cyber security is the hot topic nowadays. The increased use of the smart
devices like smartphones, tablets, laptops, etc. have increased the threats from the cyber
attackers to the significant information of the business (More and Kumar, 2014). High
amount of data which is maintained by the business is at risk if not protected properly
(Goutam, 2015). I also came to know that there is a huge need of employees in the field of
cyber security affairs which needs government to run training programs in the country so
that a huge pool of talent can be created to combat the cyber security challenges. I also
learned that most of the cyber security threats are generated while operating social media
accounts. The use of social media have enhanced the risk of cyber security (Bradley, 2017). I
learned about the advanced technologies which are used to prevent the data of the
companies. These technologies include data encryption, firewalls, GRC tools, automated
policy management tools and many more (Amit and Zott, 2012). I can also be a part of the
training program which will widen up my career opportunities. After completing the
training, it could be a great opportunity for me to prevent data breach which can be my
personal data or professional data.
Explanation of learning process
The general idea of business research was made so that the research ideas could be
implemented successfully. Learning process was made to complete the given activities of
research in a given time frame. I learned about various techniques which help the
companies in solving the complexities faced by the companies. Just like the companies find
out one or the other method to solve its problems, we should try to find out solution to
every problem in our daily life. It motivates us to live a good life with a better perception
about everything in life (Moon, 2013).
The large sized companies like apple, Microsoft, Google and more are facing the cyber
security threat as they are threatened to be the victim of cyber-attacks every now and then.
The increased users of internet has increased the threat of cyber-attacks and this is why, the
Document Page
Challenges in Cyber Security for business 5
users are taught for keeping strong passwords so that they can be protected and can teach
other to be secured by using some of the preventive measures. This small step planned can
bring a big change in the percentage of cyber-attacks. This will safeguard the businesses and
will open the ways for the small and medium businesses to make better profits in future
(Boud, 2012).
Explanation of the plan for applying the learning
The plan was made in order to complete the research. It was planned that activities are
required to be conducted which give a proper meaning to the research. The research
started from planning and went on to data collection after the selection of data sources.
After the collection of data, this is to be analysed with the help of statistical tools. These
statistical tools will further be applied in my professional life when the data is to be analysed
for marketing research or to make certain decisions in the company. This learning will be
applied in my personal and professional life as I have learned how to manage limited time
available for maximum utilisation and for achieving desired objectives. I have also gained
much confidence which will be applied in future in interacting with my team mates and
presenting my ideas to my seniors. The questionnaire and interview processes helped me in
improving my interpersonal skills and communication skills which will further help me in
interacting with the clients in professional life. It will also help me in keeping my ideas
clearly in front of the jury in my college and it will help me in getting better grades on the
basis of clarity in my ideas and presentation. The self-awareness is increased which will
make me proactive for the situations in future. I also realised that I can further join research
and development field in future as I have gained much interest in the subject (Wynee,
2010).
Document Page
Challenges in Cyber Security for business 6
References
Ab Rahman, N.H. and Choo, K.K.R., 2015. A survey of information security incident handling
in the cloud. Computers & Security, 49, pp.45-69.
Amit, R and Zott, C 2012. Creating value through business model innovation. MIT Sloan
Management Review, 53(3), p.41.
Boud, D. ed. 2012, Developing student autonomy in learning, Routledge.
Bradley, R, 2017. Why Cybersecurity matters to your business? Forbes.
Goel, S. and Hong, Y., 2015. Security challenges in smart grid implementation. In Smart Grid
Security (pp. 1-39). Springer, London.
Goutam, R K, 2015. Importance of Cyber Security. International Journal of Computer
Applications. Volume 111 – No 7.
Moon, J A 2013, Reflection in learning and professional development: Theory and practice,
Routledge.
More, R M and Kumar, A, 2014. A Study of Current Scenario of Cyber Security Practices and
Measures: Literature Review. International Journal of Engineering Research and General
Science, Volume 2, Issue 5.
Suh, S.C., Tanik, U.J., Carbone, J.N. and Eroglu, A. eds., 2014. Applied cyber-physical systems.
Springer New York.
Wynee, R 2010, ‘Student Perceptions of Reflective Learning Activities’, Fall2010MidAtlantic
ASEE Conference.
chevron_up_icon
1 out of 7
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]