QA: After spending some time in a new country Australia, I have been able to complete my degree in statistics major. I have been working in a reputed company so that I can handle my expenses in Australia. Based on the degree and the skills, I am able to find that my achievements and the qualifications are insufficient to take me to the next higher level in my career and achieve a better quality with the income perspectives. Hence, I need to focus on some IT related qualifications and work on exploring career options. Thereby, I decided to focus on cyber security. With this, I have been working on the previous degree of statistics and expertise and figuring out how I can increase my income and qualifications through cyber security. I, then decided, to work for my Bachelor degree for moving on to a higher level of education and knowledge. To be honest, I have been able to analyze the units which are for summer semester and analyze about how it is possible to be working on the issues that are escalated in the recent times, in IT industry. The effective possibility and good news is that I have been able to synchronize with the needs of IT industry and it gives me an opportunity to work on cyber security. The learning and thinking of the issues gives me an opportunity to explore about myself and think about the concerns. After studying about the unit, I have been able to feel that I am on a right track to achieve a better qualification for which I left my homeland for.
QB:
There is a major difference in the background of the people like the skills, gender, age and the religion. I have seen that I am older than my other team members. My ethnicity and religion is different from them. But what really matters for me is to act respectfully with everyone who are different from us and behave properly with them. With IT perspectives, ICT professionals generally have to comply to the ethics of work that includes the procedures which are slandered (Buczak & Guven, 2016). Hence, one need to leave their personal aggression or enmity and work in a professional manner. From the first day, we were asked to discuss on the topics so that it is enough to concentrate on certain ideas and prepare them accordingly. The group work has helped me in encouraging towards developing critical thinking skills, and the people also have a opportunity to learn from and then teach each other (Gupta, Agrawal,. and Yamaguchi, 2016) . The facilitation is about the greater transfer of the previous knowledge and enhancement of certain social skills with interactions. One can work as an individual where the people from diversified backgrounds are able to share experiences and skills to participate in unique ways . The enhancement of the achievements to work as an individual where the people are from the diversified backgrounds. The industry is able to focus on the different group work skill sets where I have seen that people are engaged in group dynamics and knowledge, which is mainly to familiarize oneself for a better skill set.
The next step has been to find an interviewee who could handle the arrangements with the other co-workers. In this time, I have been able to come up with the interviews but there were certain different problems and procedures for the same. My group members have been able to work effectively and interview on different practices for a better flow of practices other than the team performance which is completely satisfactory. Being in a group, I realized that one becomes more organized as we are able to put up our points and discuss about the different topics at a broader level. It not only helps in better development, but a coordination is also maintained which is important for the good management practice. The explanatory power is about understanding and allowing to manage and manipulate the processes with teamwork that helps in managing the group dynamics to the practical benefits (Liu et al., 2015). There are distinctive roles and behaviors which helps in understanding about how to improve on the team output and work on cognitively abilities with dependency on technical competency. The globalization has been increasing in scale and complexity with organizational behavior focusing on combination of skill sets that are important for the growth of strategies and working experiences. I believe that the management of the group dynamics is important for the management, because I could easily understand that even a wrong information can lead to disruption of organizational output.
Q1. What are your most memorable moments of PIIT, and why?
Being a person who has the first positive memory and who has been able to discover that there is no exam for this unit, gives me an immense happiness. The fear of examination has always given me a setback (Gordon et al., 2015). The second is about the arrangement of sliding a night before the presentation and I have been able to improvise the topics without any sort of practices done before. The best factor is that the feedback from the tutor that the presentation was given right on time gives me confidence and eagerness to work more. There were certain ups and downs in the project, but the members of the team could easily handle and deal with the issues which came on their way. The presentation was done in an effective manner, as we had coordination, even though we had no rehearsals for the same. This was such a big mistake but a big achievement as well for us.
Q2: What are some of the key professional roles and responsibilities for a modern ICT Professional? How might these affect you in your future work?
The primary factors for IT security includes global acknowledgement where the needs are for increased IT security. The focus is on how one can work on controlling the threats that occurs in the field of technology. The IT security strategies are based on protecting the networks and the infrastructure which includes the network security officers. There is a need to protect against the different cyber threats which are evolving (Fielder et al., 2016). The responsibilities that are important are based on the necessity and identity where the eligibility is for the access and setting the rules and regulations. There is a need to develop and design the security devices which ensures about client safety or the internal products. The management of information and security measures are done in the networked system, where the operations are done at a regular inspection of system for proper updates on security. The conducts are for the auditing process where the security and safety measures needs to be customized as per the rules and necessity. According to me, it will help in maintaining standard information security procedures and policies. In order to find a secured way for implementing the technology, there is a need to reduce the risks which are relevant to information systems. They are mainly to ensure about network protection, infrastructure and computer systems (Cherdantseva et al., 2016). In our work, the IT security need to have a proper management and the skills to ensure effective coordination within the teams. For this, one needs to communication about the security issues properly.
It will directly affect my work as we have to be technically competent enough for improving our skills by learning new and advanced technologies every now and then.
The discussion is on the professionalism concept which is referred as important for handling the transferable skills or the enterprise skills. The thinking is about the ethical sensitivity and interpersonal communication skills that helps in working over the career development with team work and collaboration. It is important for my team to focus on bringing the changes in the project for the program that will lead to capturing achievements. It will then lead to encouraging the development of critical thinking skills (Beaumont, 2018). The industry places a major value on the group work, where one can perform at a diversified level and participate in the unique manner. The group dynamics for me helps in defining interaction, goals and interdependence, with structure and cohesion. According to Kurt Lewin, group dynamics is about how the individual is able to work on the social contexts. The research that we are focusing on explains a good theory and focus on understanding the phenomenon of issues related to cybercrime. The major significance is about the individual behavior which can be explained in the terms of group impact.
The individual behavior, for me, is explained in terms of group impact where the organizational behavior is about understanding the group cohesion and work on handling the conflicts as well. The group will require to work on structured factors before checking out the outputs. The group development is important for the improvement and developing over the time (Batest, Tian, Butler & Moyer, 2015). It includes the distinct stages in development with explaining about the practical benefits.
My project team members have been really communicative, and they are trying to work on cyber security and work effectively with others. Over the time, I have learnt that each person is intelligent in his aspect and are able to grasp the new technology very fast. They have been able to efficient work with a broader range of people and I have also been experienced from my previous working firms (Yip, 2015). The communication skills have been effective for me to focus on active listening skills with the ability to ask relevant questions. The leadership-based communication has been effectively able to help us in handling negotiations and higher conflict level management. It is seen that there are discrepancies in thoughts, but being an elder in the team, I am able to handle the conflicts with critical analysis and persuasive skills as everyone respect my thoughts and opinions. The communication becomes more important if it is interactive and I have seen that my group members always come up and clarify their doubts with each other so that they are able to work with clarity. The language is about providing the potential for meaning with effectively communicating through co-actions (Knowles et al., 2015).
The cybersecurity is important for understanding about the different incident response policies and law enforcement that helps in improving the stability of the goal information structure. The information security is concerned about protecting the forms of data which are coming from accessing the unauthorized standards with maximized confidentiality and integrity of business data. The cyber security comprises of the technologies, processes and the controls for protecting the system from attacks where the target is about the unsecured devices that works on the vulnerable technology (Tsikrika et al., 2017). Some of the major issues in the cyber security were 2018 Attacks, where Aadhaar of 12-digit unique identifier was assigned to Indian people and the records were breached on January 3rd. Here, the data included the name, address, photo and the phone number. The payment of 300 Rs to the sellers also yielded the access to the software through which anyone had the access for printing the ID card for the Aadhar number.
The threats and the attacks are mainly seen in the financial, education and the transport sector. A major problem arises in the interpersonal relations as well. For resolving the problems of cybercrime, there is a need to focus on reducing the crimes with advancement of technologies with purpose of security the systems. The government needs to take an initiative to ensure about whether the crimes are reduced or not.
The final topic is about the ICT and professionalism which is done by our senior lecture. She has been a presenter who was full of energy and have been interactive as well. She has taught us the actual meaning of ethics and ICT sustainability in the organization. Although she has been very charming, but her words were clear enough to make us understand about how the students could consult with her for the future working contracts and other related concerns (Cavelty, 2014). She has been one of them to answer about the subscribing of students and then comparing with audience number. Hence, to sum up, the content of the lecture included the presentation related to ICT professionalism to understand about the relevant body of language. The concepts are related to competent practices which helps in delivering the values for the stakeholders. The professional development, for me, helps in focusing on improving the competency with personal performance and career progression opportunities. It helps in encompassing the technical and non-technical aspects. Hence, it was easy for me to work on different concepts of product quality and services with my group members. My teachers have been able to help me in competence mapping benefits which are recognized through working on different perspectives which are defined in terms of competences and proficiencies. The Code of Ethics and Conduct helps in building my team individuals reputation within the profession.
References
Bates, A.M., Tian, D., Butler, K.R. and Moyer, T., 2015, August. Trustworthy Whole-System Provenance for the Linux Kernel. In USENIX Security Symposium (pp. 319-334).
Beaumont, P., 2018. Cybersecurity Risks and Automated Maritime Container Terminals in the Age of 4IR. In Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution (pp. 497-516). IGI Global.
Buczak, A.L. and Guven, E., 2016. A survey of data mining and machine learning methods for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2), pp.1153-1176.
Cavelty, M.D., 2014. Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities. Science and engineering ethics, 20(3), pp.701-715.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K., 2016. A review of cyber security risk assessment methods for SCADA systems. Computers & security, 56, pp.1-27.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
Gordon, L.A., Loeb, M.P., Lucyshyn, W. and Zhou, L., 2015. Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model. Journal of Information Security, 6(1), p.24.
Gupta, B., Agrawal, D.P. and Yamaguchi, S. eds., 2016. Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, 9, pp.52-80.
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M. and Liu, M., 2015, August. Cloudy with a Chance of Breach: Forecasting Cyber Security Incidents. In USENIX Security Symposium (pp. 1009-1024).
Tsikrika, T., Akhgar, B., Katos, V., Vrochidis, S., Burnap, P. and Williams, M.L., 2017, February. 1st international workshop on search and mining terrorist online content & advances in data science for cyber security and risk on the web. In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining (pp. 823-824). ACM.
Yip, N.S.M.S., 2015. The Effect of Cyber Supply Chain Security Towards Lean and Agile Supply Chain Performance in Healthcare Industry: The Mediating Effect of Organizational Capabilities (Doctoral dissertation, Universiti Sains Malaysia).
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download