Wednesday, December 11, 2019

Cyber Security Strategies And Performance †MyAssignmenthelp.com

Question: Discuss about the Cyber Security Strategies And Performance. Answer: Reflection report I gained my awareness about the cybersecurity that will be essential for the organization due to enhancing the financial performance in long-term. The cybersecurity is a way of ensuring the information and information structure named networking, database, and systems. There are different security strategies such as the installation of antivirus in the system, firewalls, and innovative solution to defend individual data and their system (Komninos, et. al., 2014). It can support to improve the productivity of an organization as well as an individual. In addition to this, I also learned that cybercrime enhanced on daily basis, therefore, it is obligatory for the organization to train the employees to successfully deal with issues of cybercrime in long-run. At the same time, I also understood that individual who used personal computer needs to gain their knowledge about the cybersecurity, Cyber Ethics, and cyber-crimes. It will be effective to manage the cybercrime problem in an effectiv e manner (Carr, 2016). Along with this, I learned that the assessment of cybersecurity can be significant to provide the many opportunities to the people for boost the view regarding multidisciplinary methodology. In addition to this, it can also be said that company has used many strategies and tools to protect their system from cyber-attack due to securing their confidential information. It can also a direct impact on the performance of the organization. Therefore, it can also be said that the cybersecurity can be connotation, an asset of the group, process, and framework implied to protect the business and internet authorized structures from uncertainty (Karim, and Phoha, 2014). Along with this, I created my knowledge about the project objectives that can be beneficial to perform an activity in an appropriate manner. At the same time, I also learned about some significant factors that can be crucial to in the cybersecurity named hardware, interrelationships of security controls, and cost contemplations. These can affect the performance of the organization in long-run. In addition to this, I created my awareness about challenges that are generally faced by an organization in order to impleme nt the cybersecurity. I also learned about the strategies that can be used to deal with cybersecurity issues in a systematic manner. I also gained my understanding about the cyber threat in depth. In addition to this, it can also be said that the cyber situation could be determined as a logo, circumstance, and occurring with the possibility that could damage the whole infrastructure of the corporation along with damage the resources which depend on this foundation (Vande and Verhelst, 2014). In addition to this, I also increased my knowledge about the significance of Cyber Security. Further, I created my understanding regarding the cybersecurity principles. I also gained my knowledge towards the cyber threat on cloud computing. In Addition to this, there are different factors that show the challenges of cyber security such as securing the environment, Firewall, and Intrusion Detection System. Further, it can be said that such factors can decline the financial performance of an organization (Jahankhani, et. al., 2015). I gained my knowledge about the scope of the project. I also created my undemanding about research question that includes two types of question such as primary and secondary research question. I learned that the primary research question is based on numeric data while the secondary research question relies on non- numeric data. I understood about the creation of research hypothesis to obtain the favorable outcome in future. I also understood about the research design that will be crucial to identify the techniques to complete the research objectives in a systematic way. I learned about two kinds of research methods such as qualitative and quantitative research method. In addition to this, I created my depth understanding about the qualitative research that will be beneficial in future to perform any research effectively. Along with this, it can be said that there are different kinds of methods that are involved in the observation, document review system, formulation of the theory, and arrangement of in-depth interviews. At the same time, it can be evaluated that qualitative research supported to obtain fresh information towards research issues. It will be also effective to obtain the accurate outcome in the specified time and cost (Dua, and Du, 2016).I also created my knowledge about research approaches and research philosophy that supports to perform the research activity in an effective way. Beside th is, I have observed that quantitative research can also be significant to collect the theoretical information about the research issues in an appropriate manner. In addition to this, it can also be said that the quantitative research can support to develop the conceptual framework regarding the research issues. It includes three factors such as statistical testing, the arrangement of honeypots, and sampling (Lohrke, et. al., 2016). Along with this, I developed my understanding regarding the research limitation that will influence the result of research in long-term. The research limitation includes some significant factors such as a focus on the research scope, converse with the IT specialist, technical data, and resources, time, and cost. These factors can influence the performance of research (McKenna, et. al., 2016). I also gained my awareness about time structure of the research that will be beneficial to manage the time in a systematic way. In this, I learned that how much time can be appropriate to accomplish the different research activity. In addition to this, it can be said that depth understanding about research can be supportive for me to improve my research skills. It also enhanced my professional skills as well as personal life in an appropriate manner. Moreover, thetime management skills can enable me to accomplish the research task at the specified time and cost. References Carr, M. (2016) Public-private partnerships in national cyber?security strategies, International Affairs,92(1), pp. 43-62. Dua, S., and Du, X. (2016)Data mining and machine learning in cybersecurity Management. USA: CRC Press. Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A. G., and Hosseinian-Far, A. (Eds.). (2015) Global Security, Safety, and Sustainability: Tomorrow's Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings(Vol. 534). Berlin: Springer. Karim, M. E., and Phoha, V. V. (2014) Cyber-physical systems security. InApplied Cyber-Physical Systems(pp. 75-83). New York: Springer. Komninos, N., Philippou, E., and Pitsillides, A. (2014) Survey in smart grid and smart home security: Issues, challenges, and countermeasures,IEEE Communications Surveys and Tutorials,16(4), pp. 1933-1954. Lohrke, F. T., Frownfelter-Lohrke, C., and Ketchen, D. J. (2016) The role of information technology systems in the performance of mergers and acquisitions,Business Horizons,59(1), pp. 7-12. McKenna, S., Staheli, D., Fulcher, C., and Meyer, M. (2016, June) Bubblenet: A cybersecurity dashboard for visualizing patterns, InComputer Graphics Forum. 35 (3), pp. 281-290. Vande Putte, D., and Verhelst, M. (2014) Cybercrime: Can a standard risk analysis help in the challenges facing business continuity managers?,Journal of business continuity and emergency planning,7(2), pp. 126-137.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.