Sunday, December 8, 2019

Reduce Vulnerability Exposure Window †Free Samples to Students

Question: Discuss about the Reduce Vulnerability Exposure Window. Answer: Introduction: In my own opinion, the learning experience in the process of doing this research proposal is a boost to my academic career. I have acquired more knowledge about cybersecurity that has opened my eyes quite a lot. Going through several kinds of literature just to come up with this proposal is a humbling process that requires patience and dedication. The value of my experience after researching, compiling, and reporting on this proposal is immeasurable. Going through several books, taught me that diligence in everything is the key to achieving success (Motiwalla 2007). The insights I have interacted with has enabled me to take more caution while browsing the internet. Revelations of how businesses face operations sabotage are real and every business should think of ways of making cybersecurity a priority. This learning experience has enhanced my understanding of the course. Going out class activities to conduct research on my own is the best experience for any scholar. In particular, I learned of several ways through which cyber-attackers use to propagate their heinous acts of vandalism. Apart from what I learned in class, this learning process has boosted my understanding of the course, more so horning my research skills. Valuable lessons of analyzing and synthesizing big literature materials is a plus to my course material. Generally, the program objectives require students to carry out extra research in addition to what is taught by lecturers. As such, this learning experience gave me a platform to sharpen my research skills which have been very valuable so far in my career. Going through several academic materials online and in books has helped me achieve the learning expectation of the program. From what I have learned on how cybersecurity issues affect many businesses, big and small, I think it would be good if I pursue further career opportunities in cybersecurity. As a specialist, I will help many businesses and organizations to keep safe of their systems which often sabotage systemic operations. This career will not only enable earn income but will give a platform to learn more besides impacting the lives of people around me. In general, carrying out this research proposal has equipped me with more skills to stay cautious while online (Schmitz and Wiese 2006). From now henceforth, I know how to identify incidents of phishing, which has cost many people of their confidential data. I also know how to put measures in place to avoid cyber-attack incidents. Moreover, I have also learned how cyber-attacks can cause closure of businesses. As such, I am in a position to advise my friends and families on the basic principles on staying alert on the World Wide Web. Description of what happened in the learning process I started this learning process by evaluating the topic of the research proposal, which is, challenges of cybersecurity for businesses. After settling on the topic, I went ahead to read materials relating to cybersecurity. At that point, I came across several ways through which cyber vandals use to steal, destroy, confidential business information. To stay focused on my goal, I did set my parameters, first by outlining the objectives of the research proposal, then specifying my scope of operations so that I do not go beyond my objectives. I read about how cyber-attackers conduct sabotage by stealing confidential business data. I also read ways through which individuals, organizations, and businesses can use to protect their operation from cyber-attacks. Furthermore, I learned of many businesses who are victims of hacking and the statistics are worrying. For example, a multinational company, Google was attacked in China where the company lost confidential information. Subsequently, I wrote the methodology section and compiled the whole research proposal. My learning could not have been successful were it not for business research guidelines. According to Creswell (2013), business research provides guidelines that define the approach of a research activity. Through business research insights, I learned that qualitative approach was applicable in this kind of study. This is because, I will be going to collect data on opinions, feelings, and beliefs on how cyber-attacks are affecting businesses. Business research taught me how to structure my proposal, what to include and the right method of identifying my target group and coming up with reasonable sample size. I have also identified strategies to conduct a professional literature review and ways to collect quality data to achieve my research goals. By conducting this research proposal, I learned ways through which cyber vandals use to attack businesses. Such methods include; phishing, network probes, brute force cracking, malware and ransomware, structured query language injection, a man in the middle, and denial of service attacks (Pawar and Anuradha 2015). These revelations confirm the hypothesis that cyber-attacks are real on businesses. Consequently, I also learned on some of the strategies that businesses, organizations, and companies can use to prevent and overcome cyber-attacks. Those strategies include; providing stronger authentication, accelerating efforts in managing traffic, testing vulnerability matrix and management, and upgrading security and validating testing (Beres et al. 2008). I did these activities of finding out ways through which cyber-attackers use to steal confidential information to answer my research questions and objectives. Furthermore, answering on the mitigation strategies offers solutions to the identified problems facing the business community. This learning experience will be very vital in my career journey and future profession as I aspire to own a company which will be offering cybersecurity solutions. Since most businesses and organizations use technology, their operations and data are in danger of cyberattacks. Therefore, I am tempted to pursue a career in cybersecurity to offer mitigation solutions to the business community. From the exposure I have acquired in the process, I have identified numerous opportunities and gaps to fulfill. I also wish to advance my career on cybersecurity to solidify my understanding and look into a specific field to specialize on. Even before enrolling for cybersecurity program, I can now caution my friends, families, and small businesses on the importance of taking measures to protect their data such as passwords. Executing this plan will help protect businesses and individuals from losing their data. References Beres, Y., Griffin, J., Shiu, S., Heitman, M., Markle, D. and Ventura, P., 2008, December. Analysing the performance of security solutions to reduce vulnerability exposure window. InComputer Security Applications Conference, 2008. ACSAC 2008. Annual(pp. 33-42). IEEE. Creswell, J.W., 2013.Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. Motiwalla, L.F., 2007. Mobile learning: A framework and evaluation.Computers education,49(3), pp.581-596. Pawar, M.V. and Anuradha, J., 2015. Network security and types of attacks in network.Procedia Computer Science,48, pp.503-506 Schmitz, B. and Wiese, B.S., 2006. New perspectives for the evaluation of training sessions in self-regulated learning: Time-series analyses of diary data.Contemporary educational psychology,31(1), pp.64-96.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.