Reflection on Research Proposal: Cybersecurity for Businesses

Verified

Added on  2020/03/16

|6
|1368
|118
Report
AI Summary
This report is a reflection on a research proposal focused on the challenges of cybersecurity for businesses. The student details their learning experience, emphasizing the acquisition of knowledge about cyber threats and the importance of cybersecurity. The reflection covers the research process, including literature review, methodology, and the identification of cyber-attack methods such as phishing and malware. The student also discusses mitigation strategies, such as stronger authentication and vulnerability management. The report highlights the value of the learning experience in enhancing research skills and understanding the impact of cybersecurity on businesses, leading to a consideration of a career in cybersecurity to offer solutions. The student also shares how they plan to apply the knowledge gained to protect businesses and individuals from cyber threats, including advising on data protection measures. The report concludes with a list of references used during the research process.
Document Page
Reflection on Research Proposal 1
REFLECTION ON RESEARCH PROPOSAL
by [Name]
Course
Professor’s Name
Institution
Location of Institution
Date
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Reflection on Research Proposal 2
Evaluation of the effectiveness and usefulness of the learning experience
In my own opinion, the learning experience in the process of doing this research proposal
is a boost to my academic career. I have acquired more knowledge about cybersecurity that has
opened my eyes quite a lot. Going through several kinds of literature just to come up with this
proposal is a humbling process that requires patience and dedication.
The value of my experience after researching, compiling, and reporting on this proposal
is immeasurable. Going through several books, taught me that diligence in everything is the key
to achieving success (Motiwalla 2007). The insights I have interacted with has enabled me to
take more caution while browsing the internet. Revelations of how businesses face operations
sabotage are real and every business should think of ways of making cybersecurity a priority.
The usefulness of the learning experience
This learning experience has enhanced my understanding of the course. Going out class
activities to conduct research on my own is the best experience for any scholar. In particular, I
learned of several ways through which cyber-attackers use to propagate their heinous acts of
vandalism. Apart from what I learned in class, this learning process has boosted my
understanding of the course, more so horning my research skills. Valuable lessons of analyzing
and synthesizing big literature materials is a plus to my course material.
Generally, the program objectives require students to carry out extra research in addition
to what is taught by lecturers. As such, this learning experience gave me a platform to sharpen
my research skills which have been very valuable so far in my career. Going through several
academic materials online and in books has helped me achieve the learning expectation of the
program.
Document Page
Reflection on Research Proposal 3
From what I have learned on how cybersecurity issues affect many businesses, big and
small, I think it would be good if I pursue further career opportunities in cybersecurity. As a
specialist, I will help many businesses and organizations to keep safe of their systems which
often sabotage systemic operations. This career will not only enable earn income but will give a
platform to learn more besides impacting the lives of people around me.
In general, carrying out this research proposal has equipped me with more skills to stay
cautious while online (Schmitz and Wiese 2006). From now henceforth, I know how to identify
incidents of phishing, which has cost many people of their confidential data. I also know how to
put measures in place to avoid cyber-attack incidents. Moreover, I have also learned how cyber-
attacks can cause closure of businesses. As such, I am in a position to advise my friends and
families on the basic principles on staying alert on the World Wide Web.
Description of what happened in the learning process
I started this learning process by evaluating the topic of the research proposal, which is,
challenges of cybersecurity for businesses. After settling on the topic, I went ahead to read
materials relating to cybersecurity. At that point, I came across several ways through which
cyber vandals use to steal, destroy, confidential business information. To stay focused on my
goal, I did set my parameters, first by outlining the objectives of the research proposal, then
specifying my scope of operations so that I do not go beyond my objectives.
I read about how cyber-attackers conduct sabotage by stealing confidential business data.
I also read ways through which individuals, organizations, and businesses can use to protect their
operation from cyber-attacks. Furthermore, I learned of many businesses who are victims of
hacking and the statistics are worrying. For example, a multinational company, Google was
Document Page
Reflection on Research Proposal 4
attacked in China where the company lost confidential information. Subsequently, I wrote the
methodology section and compiled the whole research proposal.
Evaluation of what I learned
My learning could not have been successful were it not for business research guidelines.
According to Creswell (2013), business research provides guidelines that define the approach of
a research activity. Through business research insights, I learned that qualitative approach was
applicable in this kind of study. This is because, I will be going to collect data on opinions,
feelings, and beliefs on how cyber-attacks are affecting businesses.
Business research taught me how to structure my proposal, what to include and the right
method of identifying my target group and coming up with reasonable sample size. I have also
identified strategies to conduct a professional literature review and ways to collect quality data to
achieve my research goals.
My learning process
By conducting this research proposal, I learned ways through which cyber vandals use to
attack businesses. Such methods include; phishing, network probes, brute force cracking,
malware and ransomware, structured query language injection, a man in the middle, and denial
of service attacks (Pawar and Anuradha 2015). These revelations confirm the hypothesis that
cyber-attacks are real on businesses. Consequently, I also learned on some of the strategies that
businesses, organizations, and companies can use to prevent and overcome cyber-attacks. Those
strategies include; providing stronger authentication, accelerating efforts in managing traffic,
testing vulnerability matrix and management, and upgrading security and validating testing
(Beres et al. 2008).
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Reflection on Research Proposal 5
I did these activities of finding out ways through which cyber-attackers use to steal confidential
information to answer my research questions and objectives. Furthermore, answering on the
mitigation strategies offers solutions to the identified problems facing the business community.
A plan of how I will apply this learning experience
This learning experience will be very vital in my career journey and future profession as I
aspire to own a company which will be offering cybersecurity solutions. Since most businesses
and organizations use technology, their operations and data are in danger of cyberattacks.
Therefore, I am tempted to pursue a career in cybersecurity to offer mitigation solutions to the
business community. From the exposure I have acquired in the process, I have identified
numerous opportunities and gaps to fulfill. I also wish to advance my career on cybersecurity to
solidify my understanding and look into a specific field to specialize on. Even before enrolling
for cybersecurity program, I can now caution my friends, families, and small businesses on the
importance of taking measures to protect their data such as passwords. Executing this plan will
help protect businesses and individuals from losing their data.
Document Page
Reflection on Research Proposal 6
References
Beres, Y., Griffin, J., Shiu, S., Heitman, M., Markle, D. and Ventura, P., 2008, December.
Analysing the performance of security solutions to reduce vulnerability exposure window.
In Computer Security Applications Conference, 2008. ACSAC 2008. Annual (pp. 33-42). IEEE.
Creswell, J.W., 2013. Research design: Qualitative, quantitative, and mixed methods approaches.
Sage publications.
Motiwalla, L.F., 2007. Mobile learning: A framework and evaluation. Computers &
education, 49(3), pp.581-596.
Pawar, M.V. and Anuradha, J., 2015. Network security and types of attacks in
network. Procedia Computer Science, 48, pp.503-506
Schmitz, B. and Wiese, B.S., 2006. New perspectives for the evaluation of training sessions in
self-regulated learning: Time-series analyses of diary data. Contemporary educational
psychology, 31(1), pp.64-96.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]