Wednesday, May 6, 2020

Cyber Security Various Aspects Conducting -Myassignmenthelp.Com

Question: Discuss About The Cyber Security Various Aspects Conducting? Answer: Introducation This research study has focused on the challenges and risks included in the cyber security and its benefits on the virtual network of an organization. This study has highlighted various risks and threats in the cybersecurity of an organization. The strategy and process of the research is decided in this week that helps in maintaining a proper path in order to complete the research. I am able to understand different risks and threats including cyber-attacks, disaster security, network security and information security. In third week, I researched about the literature review writing related to the research topic. I have fulfilled the aim of the study to analyze the cyber security aspects in an operations. In this research study, I have learned basic concept about cybersecurity in the IT field. The use of the cybersecurity strategies has helped in maintaining the security of the data and information of the companies in the market. In the first week of study, I have to understand the research topic related to the cybersecurity and made a proper plan for proper proceeding in the study. In order to collect information related to the research topic, I have read various online journals, articles and reports related to the cybersecurity in the IT field. In this context, I have learned various steps included in the research for successfully conducting it. This research has helped in gaining experience related to the cybersecurity roles in an organization. I have learned how cybersecurity of an organization works for providing security from different cyber-attacks. I have gained positive experience in order to maintain myself updated with advanced technology used in the market by the different organization. The use of the internet in various departments o the company have been acknowledged. I have learned the importance of the internet in an organization. I have also understood the challenges faced by an organization due to the use of the internet. I have learned about the dark side of the internet. Different cyber threats and illegal activities are done with the help of the internet. The literature review chapter of the research has focused on the basic concept of cybersecurity in an organization. I have learned about the NIST from this research study. I have learnt about the governance roles and responsibility in order to take control over the cybersecurity matter in the organization. I have understood the importance of government in order to prepare strategies for controlling cyber-attacks on the organizations. Various types of cyber-attacks have been described in the study including brute force attack, social engineering, distributed denial of attack, phishing attack and malware attacks. I have learned about the mitigation strategies imposed by the organization to remain safe from cyber-attacks. Antiviruses and firewalls have helped in restricting harmful viruses and malware from entering into the server and network of the organization. Restricting third-party authentication might help in controlling the entrance of viruses and use of third-party restriction to the security system of the company. I have read various journals and articles for gathering knowledge and data related to the types of attacks over the internet. Various journals have talked about different benefits and challenges of the internet and cybersecurity in the organization. I have come to know about different benefits of the internet and cybersecurity including business development overseas, connection with various clients, proper communication and confidentiality. The use of the internet has helped in developing the business of the organization. I have used a proper methodology for the conduction of the study on benefits and challenges of the cybersecurity in the business organization. The two types of research approaches have been discussed in the study including inductive and deductive approach. I have learned that the inductive approach focuses on careful observation, analysis and data evaluation. The deductive approach is quantitative and data collected is processed after proper reflection, it is analyzed. I have learned about the types of research design including explanatory and descriptive. I have used the descriptive research design that has helped in focusing on the research objectives and collecting data and information related to the research topic. This research design has requirement for providing proper data and information in order to perform proper data analysis. I have used both primary and secondary method of data collection. I have researched on various online journals, articles, books and governmental databases for collecting data and information related to the benefits and challenges of the internet and cybersecurity in an organization. The use of the secondary method has helped in gaining proper data and information related to the research. The sixth week focuses in the interviewing in qualitative research. They have shared their knowledge regarding the cybersecurity that has been beneficial for my knowledge and career. However, I have prepared survey questionnaires that were structured and close-ended. I have used the probability-sampling method. However, I have some limitations in conducting this research study. My budget related to the study was limited. Therefore, I was not able to use expensive technology for conducting the research. Many online journals and articles were not accessed, as I have to buy them. The time constraint was also limited by the budget. This has been a major problem for filtering their answers for correct data. The language was a problem in gathering data and information from the participants due to cultural diversity. In eight week I have learned about nature and sampling in quantitative research. The IT experts were not ready to answers all the questions that I have asked during the interview. Therefore, I have faced some limitations in conducting the research. However, I have managed in conducting the research successfully. I have gained a positive experience by conducting this research on the cybersecurity. I have gained various knowledge about the use of cybersecurity in an organization. This will help me in developing my career. Being a student, I have gained knowledge about the corporate world by interacting with various IT experts of the organizations. I have searched a lot over the internet related to the benefits and challenges of the cybersecurity in the organization. In the seventh week, qualitative analysis has been discussed. I have come to know about different benefits of the internet and cybersecurity including business development overseas, connection with various clients, proper communication and confidentiality. The importance of the security of the data and information in the organization has been gained. I have learned about the challenges in using the internet in a wrong way. This might help me in using my own computer and installing antivirus and firewalls for keeping my computer safe from cyber-attacks. I have read various journals and articles for gathering knowledge and data related to the types of attacks over the internet. In eleventh week, different analysis of the outcomes have been analyzed. I was able to meet different IT experts during the interview and observing their views on cybersecurity. This has been a great motivation for me in IT field and I would like to continue my career in the IT field. Weekly Analysis Week 1: In first week, I have learned about the nature and process of the research. These strategies include use of firewall and antivirus. I understood that the cybersecurity is s an important concept for different companies in the market. The future research might deals with other theories and models related to the cybersecurity. The data analysis have cleared my opinion related to importance of cybersecurity in the company. .Week 2: The second week describes about the research design and planning process of the research. The three types of research design are descriptive, explanatory and exploratory (Mackey and Gass 2015). Descriptive design has been used in a research that helps in focusing in objectives. Week 3: The third week focuses in the literature review related to research topic. Various concepts of cybersecurity has been discussed. The definitions of cybersecurity according to NIST has been referred to the research. Week 4: The fourth week refers to the ethical and legal considerations involved in the research. The Data protection Act 1998 has been followed in the research in order to secure data and information (Pannerselvam 2014). Week 5: The fifth week deals with the nature of qualitative research and sampling technique. Data has been collected from 10 managers and 40 employees. Week 6: The sixth week has focused on interviewing and focus groups. The data collected from the interview has been taken as observational data (Knobe and Nichols 2013). I have managed to organize a face-to-face interview with IT experts of different organizations. I have a great experience of meeting and talking with those IT experts. Week 7: The seventh describes about the qualitative analysis of collected data. Qualitative analysis deals with the secondary data analysis. Week 8: The eight week focuses on the sampling in the quantitative research methodology. Participants of the survey have not provided correct answers to the survey questionnaires and filled it haphazardly (Pannerselvam 2014). Week 9: The ninth week describes about the structured interviewing. I have also collected primary data from 10 managers and 40 employees. I have organized survey with those participants Week 10: The tenth week focuses on the structured observation and analysis. Three IT experts were interviewed in order to take their views and answers related to the cybersecurity in their company. Week 11: The eleventh week deals with secondary analysis and quantitative data analysis. I have organized interviews in order to collect data from the IT expert of various organizations. Week 12: The twelfth week relates with the mixed research method. I have learned a practical experience of cybersecurity and its various aspects by conducting this research. I have used qualitative way research methodology. This approach has helped me focus on the objectives of the research. References Knobe, J. and Nichols, S. eds., 2013.Experimental psychology (Vol. 2). Oxford University Press Mackey, A. and Gass, S.M., 2015.Second language research: Methodology and design. Abingdon: management. Panneerselvam, R., 2014.Research methodology. PHI Learning Pvt. Ltd.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.