Analysis of Challenges in Cyber Security Business: Thales Group Report
VerifiedAdded on 2020/02/24
|7
|1447
|38
Report
AI Summary
This report provides an in-depth analysis of the cyber security challenges faced by Thales Group. It explores the importance of cyber security in protecting business information, the growing threats from cyber criminals, and the strengthening of cyber security capabilities by major companies. The report highlights the significance of formal processes in prioritizing IT security risks and developing mitigation strategies. It discusses the usefulness of cyber security awareness in various professional settings and the role of cyber security programs in developing skills in online training platforms, analytics, and reporting. Furthermore, it examines the objectivity of the learning process, emphasizing the need to mitigate cyber security challenges, particularly those related to cloud computing. The report also evaluates the learning outcomes, detailing the practical understanding gained from the project and the knowledge acquired from literature reviews and research proposals. It explains the learning process, including the analysis of challenges in cloud computing and web application attacks, and how this learning will be applied in a career as a cyber specialist, emphasizing the development of tools to handle high-security software and data protection.

Running head: CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Challenges in Cyber Security Business of Thales Group
Name of the Student:
Name of the University:
Author’s Note:
Challenges in Cyber Security Business of Thales Group
Name of the Student:
Name of the University:
Author’s Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Contents
Effectiveness and usefulness of learning experience.......................................................................2
Usefulness of the learning process..................................................................................................2
Description of the objectivity of learning process...........................................................................3
Evaluation of learning outcomes.....................................................................................................3
Explanation of the learning process.................................................................................................4
Explanation of how the learning process will be applied................................................................4
Reference List..................................................................................................................................6
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Contents
Effectiveness and usefulness of learning experience.......................................................................2
Usefulness of the learning process..................................................................................................2
Description of the objectivity of learning process...........................................................................3
Evaluation of learning outcomes.....................................................................................................3
Explanation of the learning process.................................................................................................4
Explanation of how the learning process will be applied................................................................4
Reference List..................................................................................................................................6

2
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Effectiveness and usefulness of learning experience
I have learned how cyber security has helped in protecting business information in digital
form against misuse and theft. It is one of the most important national security challenge which
is faced by Australia. I have also analyzed the research works of the previous scholars and have
found that the threat of cyber security criminals in releasing sensitive information is growing
with the passage of time. Thales Group has a branch of security personnel who are trying to
protect the data against these criminals. I have also found that many big companies have
strengthened their cyber security capabilities in the last five years. The most important thing
which I have learned is that there are certain formal processes which are to be identified in
prioritizing the IT security risks and developing certain mitigation risks (McGettrick et al. 2015).
Usefulness of the learning process
This course in cyber security awareness will help me as a business manager or as a
regional IT security officer. It will also help me if I prefer to work online with external contact or
deal with sensitive data. The online interactive training modules and the cyber safety training
programs on various games will help me when I use various mobile device or computers at work.
The cyber security business program will help me in developing security minded behavior in
relation to the real world environment (Boopathi, Sreejith and Bithin 2015). Cyber security
programs will also help me to develop my skills in various online training platforms. It will also
help me in analytics and reporting. I can also provide cyber security games training and thus
protect various kinds of threats. I can also develop my career as cyber security personnel in
protecting government data and other important files. I will apply or transfer my new knowledge
in businesses which are related to IT. I will try to secure the infrastructure and investment issues
of the various companies from getting affected or threatened by malware. It will also give me a
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Effectiveness and usefulness of learning experience
I have learned how cyber security has helped in protecting business information in digital
form against misuse and theft. It is one of the most important national security challenge which
is faced by Australia. I have also analyzed the research works of the previous scholars and have
found that the threat of cyber security criminals in releasing sensitive information is growing
with the passage of time. Thales Group has a branch of security personnel who are trying to
protect the data against these criminals. I have also found that many big companies have
strengthened their cyber security capabilities in the last five years. The most important thing
which I have learned is that there are certain formal processes which are to be identified in
prioritizing the IT security risks and developing certain mitigation risks (McGettrick et al. 2015).
Usefulness of the learning process
This course in cyber security awareness will help me as a business manager or as a
regional IT security officer. It will also help me if I prefer to work online with external contact or
deal with sensitive data. The online interactive training modules and the cyber safety training
programs on various games will help me when I use various mobile device or computers at work.
The cyber security business program will help me in developing security minded behavior in
relation to the real world environment (Boopathi, Sreejith and Bithin 2015). Cyber security
programs will also help me to develop my skills in various online training platforms. It will also
help me in analytics and reporting. I can also provide cyber security games training and thus
protect various kinds of threats. I can also develop my career as cyber security personnel in
protecting government data and other important files. I will apply or transfer my new knowledge
in businesses which are related to IT. I will try to secure the infrastructure and investment issues
of the various companies from getting affected or threatened by malware. It will also give me a
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
proper idea of the various challenges which are faced by the cyber security businesses and
develop subsequent tools so as to protect the data. I will also get an idea of how the hackers
misuse the data and destroy important software. It will help me to carry out important research
work and develop strong cyber security measures to protect the data (Liu et al. 2015).
Description of the objectivity of learning process
In the entire learning process, I have analyzed and found that the cyber security
challenges which are faced by the organization needs to be mitigated. It has given me a brief idea
of the important measures which are taken by cyber security groups in protecting important data.
I have also learned about cloud computing which is one of the major challenges of the cyber
security groups. This project will also help to change the way as to how cyber security is taught
in Australia by giving various opportunities to the students in active engagement of the learning
approaches. As the risk of cyber security business is growing, it is important to train the staffs so
that they can manage the risk in a cost effective way (Ali et al. 2015).
Evaluation of learning outcomes
This project will help me in practical perspective to understand the challenges of Thales
Group. It will also help me to know how the other industrial groups co-operates with the cyber
security businesses. As I do not have proper cryptographic knowledge, this project will help in
developing my skills. I have also gathered knowledge about certain issues after analyzing the
literature review of some famous scholars. The business research proposal has also given me an
in-depth knowledge of carrying out the research work successfully. It has helped me in analyzing
the important data which are published by other cyber security groups. It has also helped me to
choose the correct data and get an idea of the sampling process. The strategies which will be
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
proper idea of the various challenges which are faced by the cyber security businesses and
develop subsequent tools so as to protect the data. I will also get an idea of how the hackers
misuse the data and destroy important software. It will help me to carry out important research
work and develop strong cyber security measures to protect the data (Liu et al. 2015).
Description of the objectivity of learning process
In the entire learning process, I have analyzed and found that the cyber security
challenges which are faced by the organization needs to be mitigated. It has given me a brief idea
of the important measures which are taken by cyber security groups in protecting important data.
I have also learned about cloud computing which is one of the major challenges of the cyber
security groups. This project will also help to change the way as to how cyber security is taught
in Australia by giving various opportunities to the students in active engagement of the learning
approaches. As the risk of cyber security business is growing, it is important to train the staffs so
that they can manage the risk in a cost effective way (Ali et al. 2015).
Evaluation of learning outcomes
This project will help me in practical perspective to understand the challenges of Thales
Group. It will also help me to know how the other industrial groups co-operates with the cyber
security businesses. As I do not have proper cryptographic knowledge, this project will help in
developing my skills. I have also gathered knowledge about certain issues after analyzing the
literature review of some famous scholars. The business research proposal has also given me an
in-depth knowledge of carrying out the research work successfully. It has helped me in analyzing
the important data which are published by other cyber security groups. It has also helped me to
choose the correct data and get an idea of the sampling process. The strategies which will be
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
used in the research work will also help me carrying out further research in the future (Hills
2016).
Explanation of the learning process
I have completed assignment 1 and 2 to get an in-depth idea of the various challenges of
Thales Group and other cyber security groups. There are certain challenges in cloud computing
system. The security responsibility in cloud computing is not a single sided measure. It is
important to monitor those activities on a real time basis because there are different types of
cloud computing activities and it becomes difficult to keep a close monitoring of all the
activities. There are certain techniques that focus on the protected behavioral system rather than
focusing on the threat. I have also done a business research proposal of Thales Group which will
make it easier to conduct the research. A critical analysis of some important research work is
done to understand the major challenges which are faced by all cyber security businesses. It has
also given me an idea of the various attacks on the web application system which are used to
extract different types of private information or sometimes for the distribution of malicious
software. The cyber criminals try to distribute the different malicious viruses into the system
through legitimate web servers and thus I can develop certain important tools to protect the data
by carrying out further research work (Antsaklis 2014).
Explanation of how the learning process will be applied
This learning will help me in my career as a cyber specialist. I can develop important
tools to handle high security software and games. I can also analyze and find out the loopholes in
the previous research work and develop my research proposal accordingly. It will also develop
my skills to protect the data against malicious software. This will help me in developing my
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
used in the research work will also help me carrying out further research in the future (Hills
2016).
Explanation of the learning process
I have completed assignment 1 and 2 to get an in-depth idea of the various challenges of
Thales Group and other cyber security groups. There are certain challenges in cloud computing
system. The security responsibility in cloud computing is not a single sided measure. It is
important to monitor those activities on a real time basis because there are different types of
cloud computing activities and it becomes difficult to keep a close monitoring of all the
activities. There are certain techniques that focus on the protected behavioral system rather than
focusing on the threat. I have also done a business research proposal of Thales Group which will
make it easier to conduct the research. A critical analysis of some important research work is
done to understand the major challenges which are faced by all cyber security businesses. It has
also given me an idea of the various attacks on the web application system which are used to
extract different types of private information or sometimes for the distribution of malicious
software. The cyber criminals try to distribute the different malicious viruses into the system
through legitimate web servers and thus I can develop certain important tools to protect the data
by carrying out further research work (Antsaklis 2014).
Explanation of how the learning process will be applied
This learning will help me in my career as a cyber specialist. I can develop important
tools to handle high security software and games. I can also analyze and find out the loopholes in
the previous research work and develop my research proposal accordingly. It will also develop
my skills to protect the data against malicious software. This will help me in developing my

5
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
career and I can hold a better job profile in the cyber security team of the Australian Government
(Tyagi 2016).
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
career and I can hold a better job profile in the cyber security team of the Australian Government
(Tyagi 2016).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Reference List
Ali, S., Qaisar, S.B., Saeed, H., Khan, M.F., Naeem, M. and Anpalagan, A., 2015. Network
challenges for cyber physical systems with tiny wireless devices: a case study on reliable
pipeline condition monitoring. Sensors, 15(4), pp.7172-7205.
Antsaklis, P., 2014. Goals and challenges in cyber-physical systems research editorial of the
editor in chief. IEEE Transactions on Automatic Control, 59(12), pp.3117-3119.
Boopathi, K., Sreejith, S. and Bithin, A., 2015. Learning cyber security through
gamification. Indian Journal of Science and Technology, 8(7), pp.642-649.
Hills, M., 2016. Why Cyber Security is a Socio-Technical Challenge: New Concepts and
Practical Measures to Enhance Detection, Prevention and Response. Nova Science Publishers.
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M. and Liu, M., 2015, August.
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In USENIX Security
Symposium (pp. 1009-1024).
McGettrick, A., Cassel, L.N., Dark, M., Hawthorne, E.K. and Impagliazzo, J., 2014, March.
Toward curricular guidelines for cybersecurity. In Proceedings of the 45th ACM technical
symposium on Computer science education (pp. 81-82). ACM.
Tyagi, A.K., 2016. Cyber Physical Systems (CPSs) â [euro]" Opportunities and Challenges for
Improving Cyber Security. International Journal of Computer Applications, 137(14).
CHALLENGES IN CYBER SECURITY BUSINESS OF THALES GROUP
Reference List
Ali, S., Qaisar, S.B., Saeed, H., Khan, M.F., Naeem, M. and Anpalagan, A., 2015. Network
challenges for cyber physical systems with tiny wireless devices: a case study on reliable
pipeline condition monitoring. Sensors, 15(4), pp.7172-7205.
Antsaklis, P., 2014. Goals and challenges in cyber-physical systems research editorial of the
editor in chief. IEEE Transactions on Automatic Control, 59(12), pp.3117-3119.
Boopathi, K., Sreejith, S. and Bithin, A., 2015. Learning cyber security through
gamification. Indian Journal of Science and Technology, 8(7), pp.642-649.
Hills, M., 2016. Why Cyber Security is a Socio-Technical Challenge: New Concepts and
Practical Measures to Enhance Detection, Prevention and Response. Nova Science Publishers.
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M. and Liu, M., 2015, August.
Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In USENIX Security
Symposium (pp. 1009-1024).
McGettrick, A., Cassel, L.N., Dark, M., Hawthorne, E.K. and Impagliazzo, J., 2014, March.
Toward curricular guidelines for cybersecurity. In Proceedings of the 45th ACM technical
symposium on Computer science education (pp. 81-82). ACM.
Tyagi, A.K., 2016. Cyber Physical Systems (CPSs) â [euro]" Opportunities and Challenges for
Improving Cyber Security. International Journal of Computer Applications, 137(14).
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.