When students writing Assignment 3 need to follow steps:
Answer the questions:
− What is your opinion about learning experience?
− What is the value of this experience?
− course
− program
− future career
− life generally
Answer the question: ‘How you will transfer or apply your new knowledge and insights in the future?’
‘What you did, read, see, and hear?
New insights, connections with other learning, your feelings, hypotheses, conclusions. Answer the questions:
‘What was the reason you did particular activities (Assignment 1, Assignment 2?
The learning experience that I had from the previous assignments helped me to clearly understand the various means of implementing cyber security. However in order to realise cyber security, it is essential to understand the major cyber threats that requires the implementation of security for threat prevention. Cybercrimes are committed by people who have an accomplished understanding of the Informational Technology. Analysing the previous two assignments it have been observed that cyber criminals mostly target the major organisations and breach their financial accounts. I have gained an in-depth knowledge regarding how the organisations become vulnerable to the attacks of cyber criminals. The major approaches that the cyber criminals adapt to breach the data records have been clearly understood in the course of doing the assignments.
The extent to which cybercrime and the vulnerability of the major foundations before the cyber criminals have increased, have made cyber-crime and the technologies used in cybercrime, a topic of study. However, as an outcome of this learning experience, I have realised that it is not always that the criminals breach in to steal the bank details of the organisations. Breach of data base is also one major sort of criminality that is sought after by criminals in many case.
Critically and depth of learning reflections reflective analysis
Week 1
This research helped me to understand the major kinds of motives with whiuch the cybercrimes are implemented. Hence the learning outcomes of this course would help me to study further the technologies that can be used by the organisations so as to prevent their organisation’s data or the financial information from being leaked. In my future career, these learning outcomes would help me to get placed in frontline companies as data analysts or IT experts.
Week 2
In future I suppose every major global organisations should have a specialised IT department which would work towards preventing cyber breaches. In this context I would stand at a favourable position, as I have gained in a comprehensive knowledge of the technologies that are being implemented by the cyber criminals. Conclusively, in the research work, I have made profound research regarding how the technologies are implemented by the criminals.
Week 3
As such my knowledge about the criminal methodology would help me to work proficiently as a deemed professional as a data expert. Cybercrimes can affect a person in general life. Cyber criminals can breach the bank and other financial details of individuals also.
Week 4
My knowledge, gained in as an outcome of accomplishing this research study would help me to become more alert about such crimes being committed here and there in the society and I would be in a better position to prevent people around me and my community from becoming victims to cybercrime.
Week 5
In the course of this assignment I became aware of the various metrics that are implemented by the cyber attackers. The cyber criminals also have separate traits of methodologies for launching attacks on various kinds of institutions. The DDoS network is used specifically for the financial and the major audit firms (Graves, Acquisti & Christin, 2016). The heavy users of internet are however prone to the attacks of IoT. The cyber footprint mapping of such people are easy and as such their data becomes vulnerable. Similarly Ransom ware and Smartphone malware are other big threats. However, personally I suppose that the pro-active nature of the cyber criminals is a bigger threat.
Week 6
These cyber criminals as I have researched are independent individuals or organisations. However, as per Brewster et al. (2015), the money they acquire or the information they breach in are sold to many terrorism groups also. As an outcome, data security is becoming all the more important. The research conducted in the course of this study has helped me to realise that in the upcoming future, the practice of ethical hacking is going to be a major weaponry to stall the cyber-attacks in the future.
Week 7
The research that I had conducted in the course of this assignment, helped me to make this assignment more relevant and significant. In the course of this research study I have attempted to highlight how and why the major organisations have become prone to the cyber-attacks. I suppose in a research journal related to cybercrime and hacking, there should be sufficient implications regarding what are the predominant practices that makes an organisation prone to such attacks.
Week 8
I have described throughout this report, how the use of multiple payment channels or data storages like Cloud storage and multiple portals for financial transactions makes individuals or organisations prone to such attacks. In the course of the literature review,
Week 9
I studied that in spite of high level of security, various organisations can become prone to data thefts. Any individual of that particular organisations can be proactive on the social media and might share or transfer any important information over Facebook or other common social platforms in any moment of hurry. He or she would be completely unaware of the fact the Facebook profile have been stalked by any hacking group.
Week 10
I also gained knowledge regarding how firewalls and potential antivirus can be developed to identify attempts to breach into the cyber space of any organisation. In this context, I would like to mention that the leading cloud storage or data protection agencies are also not able to provide security against certain spoofs of the data crimes.
Week 11
The random sampling technique used in this research have been very much helpful in reflecting the various instances of data breaches. In the small scope of this research study it is difficult to exemplify and relate the various ways in which the major data breaches have taken place. However a synopsis of the major events and the ways they affect an organisations have been highlighted in the research study.
Week 12
The major reason of selecting this topic of study is that this is a high end issue that has been a threat for the business world and have massive outcome on its accomplishment. Hence, this research study is a small endeavour of collecting facts and statistics along and analysing them to shed light on this burning issue. Along with the ethical considerations, this research study have serious implications for future scope n also.
As mentioned earlier in this research journal, working on this research topic, I have gained in a new enticement to work on this topic and gain practical knowledge that would help me to deliver value as IT professional or work in a job role to prevent cybercrime.
Brewster, B., Kemp, B., Galehbakhtiari, S. and Akhgar, B., 2015. Cybercrime: attack motivations and implications for big data and national security. In Application of Big Data for National Security (pp. 108-127).
Graves, J.T., Acquisti, A. and Christin, N., 2016. Big data and bad data: on the sensitivity of security policy to imperfect information. U. Chi. L. Rev., 83, p.117.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). HI6008 Business Research. Retrieved from https://myassignmenthelp.com/free-samples/hi6008-business-research/big-data-for-national-security.html.
"HI6008 Business Research." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/hi6008-business-research/big-data-for-national-security.html.
My Assignment Help (2021) HI6008 Business Research [Online]. Available from: https://myassignmenthelp.com/free-samples/hi6008-business-research/big-data-for-national-security.html
[Accessed 19 April 2021].
My Assignment Help. 'HI6008 Business Research' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/hi6008-business-research/big-data-for-national-security.html> accessed 19 April 2021.
My Assignment Help. HI6008 Business Research [Internet]. My Assignment Help. 2021 [cited 19 April 2021]. Available from: https://myassignmenthelp.com/free-samples/hi6008-business-research/big-data-for-national-security.html.
MyAssignmenthelp.com is a one-stop solution for online proofreading services. You are welcome to ask ‘edit my paper’ for your pre-written paper. Our online essay editors will check your paper in no time and deliver a flawless assignment to help you bag the best grades. They have experience in dealing with all kinds of assignments based on more than 100 subjects. You can also ask our essay and assignment writers to write a perfect assignment from scratch for you.
Answer Introduction The report will discuss about the importance of UML in bringing the success towards OO software projects today. Object oriented software engineering is a methodology and object modelling language. Ivar Jacobson developed Object oriented software engineering in 1992 (Larman 2014). UML is a standard language used for constructing, specifying, visualising and for documenting artefacts associated with developing a software sys...
Read MoreAnswer “Indeed every opinion is a marriage of information and predisposition”. This is one of arguments made by Zaller in his book, “The Nature and Origin of Mass Opinion”. Undoubtedly the elite discourse has a very crucial role to play in determining the information which voters have regarding potential election candidates (Zaller, 1992). You like or not quite a large number of people who live in large societies a...
Read MoreAnswer: Introduction: Procurement is one of the most important strategic areas of operations in modern business organisations. The pressing need to embrace profitability and sustainability simultaneously has led the business organisations to form strategies to procure raw materials and spare parts. Efficient management of procurement enables the firms to maintain lower cost of production which ultimately raises the profit percentage. Efficien...
Read MoreAnswer: Introduction Innovations are a fresh idea of a person for solving a problem in an efficient way. These are improving the business processes in different terms, such as increasing efficiency, more productivity, better services, and quality products. Innovations are base for effective business operations. It is a way to change previous ideas for more growth and benefits to the business of an organization (Baregheh, Rowley, & Sa...
Read MoreAnswer: Reflective Report An unusual assignment, which was given to us by the Organizational Behavior and Leadership styles subject respected instructor Dr. Sulafa Badi. This assignment is to make a (12) minutes video to reflect some theories we discussed in this subject, and to demonstrate them on the real-life employee in the daily work in the company. In this report we will write how we worked together as a team to produce this video. We ...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
It was perfect I don\'t have to get it redone really on point and very happy with it thanks so much. You guys are a lifesaver
Australia
Good work from them!! Great service!! They didn’t make me wait on my work I got it on time!!
Australia
a great work. to be honest i was\'t sure if the expert would get everything right, but it turned really well.
Australia
The work has been done properly, exactly as required. I\'m very happy with it. Thanks to the expert for such a masterpiece.
Australia