HI6008 Report: Exploring Cyber Security Challenges in Business
VerifiedAdded on 2024/06/04
|6
|1267
|63
Report
AI Summary
This report discusses cyber security challenges for businesses, focusing on the importance of securing computer systems from cybercrimes. It highlights learnings related to theoretical knowledge, practical application, time management, and essential cyber security skills such as networking, security analysis, and risk management. The report emphasizes analytical, evaluation, writing, and summarizing skills, along with the need for innovative thinking in addressing cyber threats. It concludes that cyber security skills are in high demand due to the increasing reliance on technology and the growing need for data protection. Desklib offers solved assignments and past papers for students.

HI6008 – Assessment 3
Challenges in Cyber Security for Business
1
Challenges in Cyber Security for Business
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
Cyber security – a short discussion..............................................................................................................3
Learning’s gained........................................................................................................................................3
Theoretical knowledge............................................................................................................................3
Skill to convert the academic knowledge to practical considerations......................................................3
Time management skill...........................................................................................................................4
Skills associated with cyber security.......................................................................................................4
Foundational Skills......................................................................................................................................4
Analytical and evaluation skills...............................................................................................................5
Writing and summarizing skills...............................................................................................................5
Thinking about the cyber security............................................................................................................5
Cyber – security skills are in high demand in the future prospects:.............................................................5
References:..................................................................................................................................................6
2
Cyber security – a short discussion..............................................................................................................3
Learning’s gained........................................................................................................................................3
Theoretical knowledge............................................................................................................................3
Skill to convert the academic knowledge to practical considerations......................................................3
Time management skill...........................................................................................................................4
Skills associated with cyber security.......................................................................................................4
Foundational Skills......................................................................................................................................4
Analytical and evaluation skills...............................................................................................................5
Writing and summarizing skills...............................................................................................................5
Thinking about the cyber security............................................................................................................5
Cyber – security skills are in high demand in the future prospects:.............................................................5
References:..................................................................................................................................................6
2

Cyber security – a short discussion
Cyber Security is the basis of PC which secures computer from cyber - crimes. The problems are
of various types like the virus contained in the computer which can affect the data, their product,
parts, etc. which hampers the administrations and intermission of the services It has incorporated
the control of physical access. In this generation, computers are used by all and with the growth
in usage of a computer; it is general that the use of anti-virus is being used in an excessive
manner from people.
Learning’s gained
In this report, I have learned that cyber security is the technology to secure the techniques and
data in the computer system. These are of many types like network security, information
security, disaster recovery security and application security. Secure transmission of information
and appropriate stockpiling of certifications can ensure validation and session administration.
Theoretical knowledge
As per my understanding, Cyber - crimes happen mainly from computers, mobiles and other
technical devices which are generally used by the youth. Cyber - crimes are committed by the
many cyber attackers which can hack the data of an individual or the corporate company which
can exploit the hardware and software. Cyber - crimes are of many types which directly attacks
the devices which are as follows:
Denial of services
Malware
Viruses
Skill to convert the academic knowledge to practical considerations
Cyber security is very important for an individual as well as corporate. In 2018, there are several
cyber security challenges and trends which are going to be introduced. I have seen that in the
society, everybody is having mobile phones in their pockets and people used to do everything on
phones with internet and uses many social networking sites and many other sites for data transfer
3
Cyber Security is the basis of PC which secures computer from cyber - crimes. The problems are
of various types like the virus contained in the computer which can affect the data, their product,
parts, etc. which hampers the administrations and intermission of the services It has incorporated
the control of physical access. In this generation, computers are used by all and with the growth
in usage of a computer; it is general that the use of anti-virus is being used in an excessive
manner from people.
Learning’s gained
In this report, I have learned that cyber security is the technology to secure the techniques and
data in the computer system. These are of many types like network security, information
security, disaster recovery security and application security. Secure transmission of information
and appropriate stockpiling of certifications can ensure validation and session administration.
Theoretical knowledge
As per my understanding, Cyber - crimes happen mainly from computers, mobiles and other
technical devices which are generally used by the youth. Cyber - crimes are committed by the
many cyber attackers which can hack the data of an individual or the corporate company which
can exploit the hardware and software. Cyber - crimes are of many types which directly attacks
the devices which are as follows:
Denial of services
Malware
Viruses
Skill to convert the academic knowledge to practical considerations
Cyber security is very important for an individual as well as corporate. In 2018, there are several
cyber security challenges and trends which are going to be introduced. I have seen that in the
society, everybody is having mobile phones in their pockets and people used to do everything on
phones with internet and uses many social networking sites and many other sites for data transfer
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

which requires excessive use of the internet. While using the internet it requires a lot of security
and a security from the unauthentic usage of internet.
The internet has extended significantly in its short presence because of quick improvement of
data innovation (IT) and business applications related to it. Advances in data and interchanged
innovations have changed the logical, instructive and business frameworks created by the
administration.
Time management skill
It is observed by me that often people when working as a cyber - security expert, leave their own
devices and expected to come up with a viable solution to the rising problems. This means that if
you want to be a success in your chosen career, you will need to know how to manage your time.
If I was in the place of cyber security expert, I would be the leader of the team who can manage
the time for both teams as well as mine. I would have bifurcated some work in the team
according to the efficiency of an individual like the following:
Restraint
Making arrangements for what will going to happen in future
Self-checking of time
Prioritization of everyday jobs
Skills associated with cyber security
I have studied that in any organization and family or in any business the cyber security is
necessary needed for learning several skills which are used in cyber security
Foundational Skills
Networking basis: The organization arranges and shapes the foundation of its registering
surroundings and without sufficient learning of essential systems and administration
standards, the security tasks will once in a while get off the ground.
Security analyst skills: The security expert screens the organization's system and
processing conditions for vulnerabilities and recognizes any dynamic dangers.
4
and a security from the unauthentic usage of internet.
The internet has extended significantly in its short presence because of quick improvement of
data innovation (IT) and business applications related to it. Advances in data and interchanged
innovations have changed the logical, instructive and business frameworks created by the
administration.
Time management skill
It is observed by me that often people when working as a cyber - security expert, leave their own
devices and expected to come up with a viable solution to the rising problems. This means that if
you want to be a success in your chosen career, you will need to know how to manage your time.
If I was in the place of cyber security expert, I would be the leader of the team who can manage
the time for both teams as well as mine. I would have bifurcated some work in the team
according to the efficiency of an individual like the following:
Restraint
Making arrangements for what will going to happen in future
Self-checking of time
Prioritization of everyday jobs
Skills associated with cyber security
I have studied that in any organization and family or in any business the cyber security is
necessary needed for learning several skills which are used in cyber security
Foundational Skills
Networking basis: The organization arranges and shapes the foundation of its registering
surroundings and without sufficient learning of essential systems and administration
standards, the security tasks will once in a while get off the ground.
Security analyst skills: The security expert screens the organization's system and
processing conditions for vulnerabilities and recognizes any dynamic dangers.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Risk Management: As a forefront digital security specialist, you may not see the
incentive in having competency in chance administration, yet hazard is the main impetus
behind all security tasks (Elmaghraby and Losavio, 2014).
Analytical and evaluation skills
I utilized analytical and evaluation skills in the context of cyber security. The security expert
screens the organization's system and registering conditions for vulnerabilities and recognizes
any dynamic dangers. I believe that in security analyst users must have the adequate
conversation as every user has to explain the importance of cyber security. For this, it is
necessary that an expert should know about the written or oral information of cyber security.
Writing and summarizing skills
I think that creativity is needed in every profession and innovativeness is the basis for data
security experts. They should have the capacity to foresee digital assaults and continually
supposing risk at one stage in front of a digital danger. This sort of ground gives rise to
innovativeness.
All we need is to understand the skills of cyber security for whatever we are doing. It is
necessary so that we can make people understand how to solve the issues in cyber securities
(Donahoe, et. al, 2017).
Thinking about the cyber security
In my view, the cyber security is a perfect solution to the cyber – crime. Most of the thefts and
threats to the computer, mal viruses, pop-ups, unusual sights which tends to open in the midway
of the work which not only slows down the computer but steals away all the information which
we have for the confidential purpose.
According to Massey, (2017) cyber securities are very important for everyone because nowadays
the networking is expanded all over the world and everyone is having mobile phones and
laptops. So for this purpose, it is necessary that the data should be in a secured way.
5
incentive in having competency in chance administration, yet hazard is the main impetus
behind all security tasks (Elmaghraby and Losavio, 2014).
Analytical and evaluation skills
I utilized analytical and evaluation skills in the context of cyber security. The security expert
screens the organization's system and registering conditions for vulnerabilities and recognizes
any dynamic dangers. I believe that in security analyst users must have the adequate
conversation as every user has to explain the importance of cyber security. For this, it is
necessary that an expert should know about the written or oral information of cyber security.
Writing and summarizing skills
I think that creativity is needed in every profession and innovativeness is the basis for data
security experts. They should have the capacity to foresee digital assaults and continually
supposing risk at one stage in front of a digital danger. This sort of ground gives rise to
innovativeness.
All we need is to understand the skills of cyber security for whatever we are doing. It is
necessary so that we can make people understand how to solve the issues in cyber securities
(Donahoe, et. al, 2017).
Thinking about the cyber security
In my view, the cyber security is a perfect solution to the cyber – crime. Most of the thefts and
threats to the computer, mal viruses, pop-ups, unusual sights which tends to open in the midway
of the work which not only slows down the computer but steals away all the information which
we have for the confidential purpose.
According to Massey, (2017) cyber securities are very important for everyone because nowadays
the networking is expanded all over the world and everyone is having mobile phones and
laptops. So for this purpose, it is necessary that the data should be in a secured way.
5

Cyber – security skills are in high demand in the future prospects:
Cybersecurity is a technique opt by the various organizations and companies to protect their
computer with a standard software by which all the software of the computer get safe and
secured from the mal virus and other unwanted threats. I think that it is the greatest solution to
the cybercrime activities.
References:
Donahoe, E., Hathaway, M., Twomey, P., Lewis, J.A., Nye Jr, J. and Tikk, E., 2017.
Getting beyond Norms: New Approaches to International Cyber Security Challenges.
Elmaghraby, A.S. and Losavio, M.M., 2014. Cybersecurity challenges in Smart Cities:
Safety, security and privacy. Journal of advanced research, 5(4), pp.491-497.
Massey, D., 2017, November. Applying Cybersecurity Challenges to Medical and
Vehicular Cyber Physical Systems. In Proceedings of the 2017 Workshop on Automated
Decision Making for Active Cyber Defense (pp. 39-39). ACM.
6
Cybersecurity is a technique opt by the various organizations and companies to protect their
computer with a standard software by which all the software of the computer get safe and
secured from the mal virus and other unwanted threats. I think that it is the greatest solution to
the cybercrime activities.
References:
Donahoe, E., Hathaway, M., Twomey, P., Lewis, J.A., Nye Jr, J. and Tikk, E., 2017.
Getting beyond Norms: New Approaches to International Cyber Security Challenges.
Elmaghraby, A.S. and Losavio, M.M., 2014. Cybersecurity challenges in Smart Cities:
Safety, security and privacy. Journal of advanced research, 5(4), pp.491-497.
Massey, D., 2017, November. Applying Cybersecurity Challenges to Medical and
Vehicular Cyber Physical Systems. In Proceedings of the 2017 Workshop on Automated
Decision Making for Active Cyber Defense (pp. 39-39). ACM.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.