Wednesday, May 6, 2020

Reflection Report for Cyber Security on Delta - myassignmenthelp

Question: Write about theReflection Report for Cyber Security on Delta Insurance. Answer: Reflection report Evaluate the effectiveness and your usefulness of the learning experience This research proposal was effective for me to develop my knowledge and skills. It is also useful for generate understanding about the Impact of Cyber Security on Delta Insurance of Bangladesh. From the introduction chapter, I have learned that Bangladesh is becoming a vulnerable nation in terms of cyberspace. Since, cyber-attacks may create possibilities of loss of asset with high extent (Williams, 2015).Along with this, it can be evaluated that a large number of cyber attacks has been arisen in the financial corporation in Bangladesh such as Bangladesh bank faced a heist in 2013 that causes big financial loss (Vasigh, et. al, 2014). This learning experience was beneficial for me to make strategy within delta insurance. Since, this company expected to invest high amount on measures of cybersecurity in the upcoming years. Explain how this learning process will be useful to you I will implement these learning experiences within the company to deal with cybersecurity. It can be explained that business tends to avoid periodically and any kind of uncertainty assessment to execute the security policy due to different causes. These are inadequate time, shortage of fund, and incapability to provide the high extent of awareness regarding information security as well as training and education (Warf, 2016). Describe objectively what happened in the learning process This business research was useful for me to develop research and technical skills. Through this research, I have learned that both primary and secondary question is made by a researcher to respond the answer through research. I have also developed my understanding regarding potential hypothesis which is created to assess the two different variables i.e. dependent and independent variable. As a result, I am competent to become a good technical manager as I have high knowledge regarding cybersecurity. Evaluate what you learn I have considered different activities to complete the research objectives such as I have used research design and methodology to complete the research in a methodological way. This learning experience would be valuable for me to make further research in future. Through this research, it is analyzed that a large amount of information will be quantitative as it will aid to determine the impact of cybercrimes on business in Bangladesh (Crandall, et. al., 2013).I have also pointed that data which are collected through the research will help to identify the level of risk related to cyber attacks and its impact on the business process. Consequently, I can use this data gathering process to make further research associated with cybersecurity issue. For this research, it is analyzed that main primary data will be gathered through a questionnaire in which researcher will mainly emphasize on Delta insurance company (Entrekin, and Scott-Ladd, 2013). As, now, I am competent to use survey throug h a questionnaire. I have also developed my understanding regarding questionnaire. In this way, it can be evaluated that a large number of the questionnaire will be provided to IT department of a corporation. It is also analyzed that Ms-excel and SPSS will be used to analyze the data (Faruk and Rahaman, 2015). This learning was also valuable for me to develop my technical skills as I am able to use different software for conducting the research. This skill is effective for me to assess the reliability and validity of research outcome. From the finding regarding the security of delta system, I have assessed that there was an enhancement in business cybersecurity and the attacks were becoming fewer due to strict security measure for defending the system. This experience was beneficial for me to suggest the delta insurance company to invest in cybersecurity. As a result, I can grow my personal as well as professional life in future. Explain your learning process From the finding of data, I have pointed that use of BYOD has a major risk to secure the data of corporation because there is inadequate control over information which is accessed through such devises. Along with this, I have gained my knowledge through respondent responses. In this way, it can be evaluated that management of delta insurance was working hard to take full control of the circumstances which have covered a large part of the financial institution in Bangladesh (Lindsay, 2015). This learning is significant for me to make further research on delta insurance company as I can enhance my professional career. In addition, I have developed my knowledge regarding commitment of firm to security measures. In this way, it is analyzed that information risk management approach is used to assess issues which may affect the safety of its customers information (Dunn Cavelty, 2013). As a result, I am competent to implement the information risk administration strategy at the workplace which could foster my professional life. From the discussion chapter, I have gained my experience that a large number of a financial institution facing cyber attacks however delta insurance has to move in faster for developing better security action to secure its system. As a result, I will use this experience to encourage the stakeholders for investing a large amount in cyber security of Delta Company. Through the survey, I have observed that large numbers of workforces are happy and confident regarding the measures of the company. This learning experience was effective for me to decline and avoid cyber-attacks. It is also analyzed that when a team member has a favorable attitude regarding efforts which are made by a corporation to decline cyber-attack then it may improve the firms goodwill and customers will be willing to invest in the corporation (Gordon, et. al., 2015). As a result, this learning experience can be effective to become a good technical manager in the future. Explain Plan how this learning you will applied Through this research, I have learned that company should make a strict measure for using the BYOD as they pose a key challenge to the security of the system. Consequently, I am able to make a strict action for exercising BYOD. Besides this, I have developed an understanding regarding research limitations. In this way, it is observed that fewer IT firms can be able to give an interview (Wang, and Lu, 2013). Another limitation that was pointed me is that there are only a few participants who able to understand the straightforward question. This learning experience was beneficial for me to focus on the research limitation during research as it can enhance the quality of research outcome. References Crandall, W. R., Parnell, J. A., and Spillan, J. E. (2013)Crisis management: Leading in the new strategic landscape. USA: Sage Publications. Dunn Cavelty, M. (2013) From cyber-bombs to political fallout: Threat representations with an impact in the cyber-security discourse.International Studies Review,15(1), pp. 105-122. Entrekin, L., and Scott-Ladd, B. D. (2013)Human resource management and change: a practicing manager's guide. UK: Routledge. Faruk, O., and Rahaman, A. (2015) Measuring Efficiency of Conventional Life Insurance Companies in Bangladesh and Takaful Life Insurance Companies in Malaysia: A Non-Parametric Approach,Management Studies and Economic Systems,2(2), pp. 129-144. Gordon, L. A., Loeb, M. P., Lucyshyn, W., and Zhou, L. (2015) The impact of information sharing on cybersecurity underinvestment: a real options perspective,Journal of Accounting and Public Policy,34(5), pp. 509-519. Lindsay, J. R. (2015) The impact of China on cybersecurity: fiction and friction,International Security,39(3), pp. 7-47. Vasigh, B., Fleming, K., and Humphreys, B. (2014)Foundations of airline finance: Methodology and practice. UK: Routledge. Wang, W., and Lu, Z. (2013) Cybersecurity in the Smart Grid: Survey and challenges,Computer Networks,57(5), pp. 1344-1371. Warf, B. (2016)E-Government in Asia: Origins, Politics, Impacts, Geographies. USA: Chandos Publishing. Williams, B. M. (2015)An Administrative Compendium on Trends for Identifying Adequate Blood Donation by African Americans: A Collection of Literary Research Procedure Papers. UK: Xlibris Corporation.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.