For each day in your learning journey, write the date and then the learning activity you engaged in.Detail what impact the learning had on you and then include any evidence you might like to...

1 answer below »
For each day in your learning journey, write the date and then the learning activity you engaged in.Detail what impact the learning had on you and then include any evidence you might like to keeplater. This journal should be appended to this assessment when you submit it.To do this assessment well, you will need to engage in reflective analysis. Reflection is whathappens when you are quiet and calm and have appropriate time to study and is how youintegrate the materials in this subject with what you already know. Sometimes the materialsmay challenge what you already know, and at other times it may create new knowledge,opinions or ways you will integrate into your professional practice. Reflection is not acursory comment about a learning activity but instead is an authentic assessment as itinvolves you being vulnerable, allowing your personal beliefs and the way you perceive theworld around you to be challenged and, if necessary, changed by what you learn. Animportant element of reflection is your incorporation of your belief system, your morals andethics as well as how you view the impact of information systems on people.Toward the end of the trimester, take your learning journal and then build a narrative thatsummarises the journey and learnings you undertook while studying this subject. You should referto specific journal entries and/or extracts from learning activities to demonstrate your learning. Youshould refer to how you can apply the learnings in your future career or the organisation youcurrently work for. Should you wish to you can focus your self reflection on one aspect of thesubject from the following topics :- Business Intelligence and Big data- Cybersecurity- Agile Methods and system development- CRM technologies- SCM TechnologiesThere is no required format for the assessment. Students should use initiative and be sure toconform to the APA referencing style, making use of external sources as appropriate.Be sure to bookend your assignment with an introduction and conclusion. You may also like toappend your learning activities or other artefacts that demonstrate the attainment of
Answered Same DayFeb 04, 2021MIS500

Answer To: For each day in your learning journey, write the date and then the learning activity you engaged...

Arunavo answered on Feb 06 2021
145 Votes
Running Head: MANAGING INFORMATION TECHNOLOGY    1
MANAGING INFORMATION TECHNOLOGY    8
MANAGING INFORMATION TECHNOLOGY
ASSESSMENT 3: REFLECTIVE PORTFOLIO ON CYBERSECURITY
Table of Contents
Introduction    3
Reflecting on Cybersecurity    3
Conclusion    7
References    9
Introduction
    In today’s era of digitisation every organisation a
re adopting the technology as that is helping the company in making their work easy. As technology is helping the organisation to connect globally and make their business grow, hence the utilisation of technology is very essential. As with the increase in use of technology, the vulnerability of theft also increases. Many cybercrimes are taking place, in which many companies are suffering huge loss.
Therefore, the companies are now adopting the security system as to protect the important data of the companies. Many companies are providing the cyber security system to the companies based on their structure, size and requirements. The following report is about the vulnerabilities that the companies are facing due to the lack of proper cyber security and the ways the cyber security will protect the company from further theft. The report will also pre-set the reason behind adaptation of the cybersecurity by every organisation.
Reflecting on Cybersecurity
In the current reflective journal, I have described my understanding of the basic concepts of cybersecurity, the areas of the usage and the necessity to adopt it. Schatz, Bashroush and Wall (2017) defined that cybersecurity is a practice that is adopted by the companies to protect their system, networks and programs from the digital attack. The cyberattacks generally takes place to access, change or destroying the sensitive and vital information stored in the system of a company. The data are also further taken away and the users of the data are being extorted for money from the thieves who have committed this crime. As described by Limba, Pleta, Agafonov and Damkus (2019), implementing an effective cybersecurity has become a difficult task as there are many devices than the people and moreover the attackers are adopting innovative ideas to break the security and steal data.
There are many sensitive data such as medical, government, corporate and financial records that hold the personal information. Any security incident can lead to the loss of money, reputation, and money, theft of data, deletion of data and fraud, which could cripple the economy. The cybersecurity system protects the following areas:
· Network Security: It is the practiced of securing a computer network from the thieves who will target the network system.
· Application Security: The security system provides safety to the software installed and the data stored from threats. A security application installed will prevent illegal access to the system.
· Information Security: The security system will provide protect the information and data and maintain their integrity while stored or in transit.
· Disaster Recovery and Business Continuity: In this security system, the policies guide the organisation to restore their operation and information to return as the same operating capacity as before the attack.
· End-User Education: It is very common that the users fall into prey as they can accidently...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here