Wednesday, May 6, 2020

Smart Grid Cyber Security Challenges †Free Samples to Students

Question: Discuss about the Smart Grid Cyber Security Challenges. Answer: Introduction: I created my knowledge about the challenges in cybersecurity for business. The cybersecurity becomes a major problem for the business in current years at the same time it can be evaluated that such kinds of issues are emerged by rapid changes in the technical development at the international level (Elmaghraby, and Losavio, 2014). In addition to this, I have observed that cyber thread is also increased by rapidly enhancement in the practices of computers, mobile, internet, and other devices. I have pointed that there are some significant kinds of factors that create the cyber threats such as network attacks, attacks, and viruses. Along with this, these factors can affect the financial performance of the firm in long-run. Along with this, it is also evaluated the cybersecurity can be beneficial to positively operate the business and obtain the favorable result in long-term (Yang, and Wen, 2017). Along with this, I also learned about the project scope which can support to determine the possibility of the research. I also gained my knowledge about the objectives of project systematically. I created my depth knowledge about challenges of cyber security along with tools and techniques to overcome the challenges in an appropriate manner. Along with this, I learned about some factors that can be caused by the cyber challenge such as phishing, malware, botnet, social engineering, keyloggers, and virus. Along with this, I also gained my knowledge about some factors like lack of leadership in the working place, teamwork issue, lack of awareness and education, and lack of regulation issues. Another factor is rapidly enhancement in the utilization of technology, lack of control, and enhancement in the numbers of internet users. Additionally, it can also be said I also gained my knowledge about the impact of these factors on the performance of an organization. Along with this, it can be said that the cybersecurity can secure the confidential data of an organization in long-term (Scully, 2014). In addition to this, I created my knowledge about the primary objectives of the project. I created my awareness about research question that includes primary and secondary research question. Moreover, I increased my consciousness about the research methodology in depth. The research methodology can be supportive to provide an appropriate technique for completing the research issues in an effective way. At the same time, it can also be said that there are two kinds of research methods that are considered in the research design. These are qualitative and quantitative research that will be also effective to collect the data systematically (Cherdantseva, et. al., 2016). In addition, I also understood that qualitative research is used to collect the theoretical data about the research issues. It will also support to obtain the reliable outcome in less time and cost. It can be said that quantitative research is used to present the numeric data in a systematic manner. Further, the quantitative research is significant to obtain the reliable result (Gunes, et. al., 2014). At the same time, I also learned that the mixed research can support to mitigate the disadvantages of both methods named qualitative and quantitative method. In addition, I also gained my understanding about the reliability and validity of the research. I understood that ethical research could be effective to obtain the favorable outcome in the specified time. In addition to this, it can be said that some significant factors such as applicability, conformability, consistency, transferability, and credibility of the research can affect the reliability and validity of the research (Kumar, et. al., 2014). In addition, I also gained my knowledge about the research approaches that can be significant the research. Moreover, it can be evaluated that there are two kinds of research approac hes such as inductive and deductive approaches. Both inductive and deductive approaches could be essential in the research (Mendel, 2017). I learned that the inductive approach is used to build theory regarding the research issue. Further, the inductive approach is used by the researcher at the time of subjective research. Additionally, the deductive approach is used to prove and reject the research hypothesis in an appropriate manner. Beside this, it can be evaluated that the exploratory design method will be significant in the research wherein two kinds of methods were included like primary and secondary data collection method (Cavelty, and Mauer, 2016). In addition to this, it can be said I also gained my knowledge about the data collection method that will be significant to collect the data in an appropriate manner. There are two kinds of methods such as primary and secondary data collection method. The primary data collection method relies on the new data that will be collected by using some significant factors such as observation, questionnaire, and interview method (Jajodia, et. al., 2015). Moreover, I have pointed that the primary data collection method can be supportive to obtain a reliable result. In opposition to this, I also learned about the secondary data collection method can also be significant to get information about the research dilemma. I learned that there are different kinds of sources that support to collect the data in an effective manner like a journal, academic journal, online and offline sources, books, magazines, and annual report and company websites. Along with this, the depth understanding about research can be effective for me to increase my knowledge as well as support to improve my personal and professional life. Along with this, I also created my consciousness about the evaluation of collected data in an appropriate manner. At the same time, secondary data analysis can include case study, and literature review to evaluate the collected data and obtain the reliable result. In opposition to this, the primary data analysis involve statistical tool to measure the collected data in an effective manner (Patrick, and Fields, 2017). I also created my understanding about the sampling method and sample size. I created my death understanding about convenient sampling method that will be significant in the research. In addition to this, it can be said that the research limitation can also be significant to complete the research in an effective manner. The research limitation can be a barrier to accomplish the research issue in an appropriate manner (Jajodia, et. al., 2015). Moreover, I also increased my knowledge about some significant factors that can influence the research like lack of utilization of personal data in the research, lack of appropriate resources, limited time, and lack of cost. In addition to this, it can also be said that knowledge about research can support to improve my professional life in long-term. In addition to this, it can also be said that I learned about time schedule that supports to complete any act in the specified time. Along with this, it can also be evaluated that the time management skills can support to improve my personal life in long-run. References Cavelty, M. D., and Mauer, V. (2016)Power and security in the information age: Investigating the role of the state in cyberspace. UK: Routledge. Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., and Stoddart, K. (2016) A review of cybersecurity risk assessment methods for SCADA systems,computers and security,56, pp. 1-27. Elmaghraby, A. S., and Losavio, M. M. (2014) Cybersecurity challenges in Smart Cities: Safety, security, and privacy,Journal of advanced research,5(4), pp. 491-497. Gunes, V., Peter, S., Givargis, T., and Vahid, F. (2014) A survey of concepts, applications, and challenges in cyber-physical systems,TIIS,8(12), pp. 4242-4268. Jajodia, S., Shakarian, P., Subrahmanian, V. S., Swarup, V., and Wang, C. (Eds.). (2015).Cyber Warfare: Building the Scientific Foundation(Vol. 56). Berlin: Springer. Kumar, V. A., Pandey, K. K., and Punia, D. K. (2014) Cybersecurity threats in the power sector: Need for a domain-specific regulatory framework in India,Energy Policy,65, pp. 126-133. Mendel, J. (2017) Smart Grid Cyber Security Challenges: Overview and Classification,e-mentor, 1 (68), pp. 55-66. Patrick, H., and Fields, Z. (2017) A Need for Cyber Security Creativity,Collective Creativity for Responsible and Sustainable Business Practice, pp. 42-61. Scully, T. (2014) The cybersecurity threat stops in the boardroom,Journal of business continuity and emergency planning,7(2), pp. 138-148. Yang, S. C., and Wen, B. (2017) Toward a cybersecurity curriculum model for undergraduate business schools: A survey of AACSB-accredited institutions in the United States,Journal of Education for Business,92(1), pp. 1-8.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.