Tap to ChatGet instant assignment help

Use of gained knowledge in future IT professional practice

Use of gained knowledge in future IT professional practice


Reflection journal 1



This reflection journal aims to address the learning from the previous weeks while discussing relevant concepts and theories. It will also reflect the use of gained knowledge in future IT professional practice.

Learning from the previous weeks

Going through “Ethics in Information Technology” allowed me to explore different concepts about ethical practices associated with IT (Information Technology) in business organisations. Two Chapters in the subject were fascinating for me. These were “Chapter 3: Cyberattacks and Cybersecurity” and “Chapter 4: Privacy”. I have been close to computers for more than a decade now. I found them interesting, which helped decide my future career as I opted IT related courses to pursue my education. I had gained limited knowledge while growing up that computers can be hacked to steal user information. However, I always wondered the reasons for which the incidents so prevalent. At the same time, I wondered the ways such attacks could be prevented. Growing up, I thought ‘anti-virus’ was the biggest solution for this. However, that was not true as I came to know there are several other things like different security frameworks/programs, firewalls and much more. From the ‘Cyberattacks and Cybersecurity’ chapter, I learnt that, in a business organisation, computer incidents have become prevalent because the organisations are becoming more complex in their use of technology and technological devices. The organisations can be found allowing employees to access resources using personal devices. Also, the implementation of newer technology and software without testing for security threats exposes the systems and networks to security risks. Moreover, I was amazed to know the different types of exploits that are used for the cyberattacks, each with different functionality. These included viruses, trojan horse and ransomware, spams, and DDoS (Distributed denial-of-service) attacks, phishing, cyberterrorism and more.

I got to know that there are federal laws for prosecution in computer attacks like the Computer Fraud Abuse Act which defines computer frauds. Another key area which I explored in this chapter was the ‘CIA Security Triad’ which defines the effective security practices to follow in an organisation using the IT framework. The chapter of ‘Privacy’ seemed relatable to the other chapter as privacy was being exploited through the cyberattacks. Before, I had limited knowledge about the rights of privacy and the laws which aim to protect privacy. I got to learn about the Privacy Act 1988 and the IPC (Information and Privacy Commission NSW), both of which oversee privacy protection. It was also informational to view different privacy issues which could be present like cyberloafing and monitoring of employees’ devices at the workplace to the use of advanced devices to record public data.

Relevant concepts and theories

Bendovischi (2015) discussed the increase of cyber-crimes (the attacks and the damage to the victims) in the technology- and data-driven world. The researcher implies that the fight against the cyberattacks/cybercrimes needs more improvement. Lack of understanding of the different attacks, their characteristics and the level of impact they can have affects the strategies which can be used to handle security and privacy. The CIA security model provides the key pillars which are required to be ensured to promote information security. This model comprises information at its core which is surrounded by the aspects of availability, integrity and confidentiality. Here confidentiality translates to privacy, integrity defines the maintenance of accuracy, consistency and trustworthiness of the data, while availability is associated with ensuring upgrades and repairs to safeguard the data (Qadir and Quadri 2015). The organisations are using cloud computing and technology services more than ever, which have increased the threats to data security and data loss. This highlights the need for disaster recovery to ensure the continuity of business after the event of security threats and security disasters (Patel and Keerthana 2019). The organisations can choose different services and products to ensure data recovery at the earliest. However, this focuses on scenarios where attacks have occurred while the priority should be to prevent such attacks in the first place. Vijayarani and Sylviaa (2015) describe IDS as a software application used to monitor system activities and networks to identify malicious operations in the systems. Such technology should be used proactively to ensure the security of information. Cloud computing and technology services offer a great opportunity for advancing organisational performance. However, key security and privacy measures must be ensured (Awodele et al. 2017).

Use of the knowledge in the future as an IT professional

This learning was significantly useful in improving my understanding of cyber issues in IT. Cyberattacks violate ethics and pose a threat to the victims’ confidentiality. I plan to explore more areas associated with cybersecurity in future. I also plan to get myself involved in learning advanced programming and exploring security frameworks to detect threats at an organisational level. Moreover, the use of literature highlighted the lack of knowledge of such attacks by the public. To address this, I plan to promote cybersecurity issues and potential solutions which can be implemented at and individual level first. This will help in ensuring better security practices that will consequentially help to promote security at an organisational level.


Awodele, O., Ominike, A. A., Adebayo, A. O., and Tayo, O. O. 2017. Security and privacy issues in cloud computing. Communication on Applied Electronics (CAE), 7(3).

Bendovschi, A. 2015. Cyber-attacks – Trends, patterns and security countermeasures. Procedia Economics and Finance, 28.

Patel, J. S., and Keerthana, V. 2019. Disaster recovery in business continuity management. International Journal of Trend in Scientific Research and Development (IJTSRD), 3(4).

Qadir, S., and Quadri, S. M. K. 2016. Information availability: An insight into the most important attribute of information security. Journal of Information Security, 7(3).

Vijayarani, S., and Sylviaa, M. S. 2015. Intrusion detection system – A study. International Journal of Security, Privacy and Trust Management (IJSPTM), 4(1).

Students Speak About Our Use of gained knowledge in future IT professional practice

Oscar Saunders

I tried using many assignment writers from various affiliations, yet all of them were temperamental and they acted outlandishly. Numerous expert associations deluded me by passing on copied content. I was extremely stressed about who will do my assignment on psychology given by my teacher with several guidelines. And when I have encountered my assignment question I realized tha..


I viewed assignments as a reason for stress rather than a shortcut to earn top grades until I started seeking The Student Helpline to do my assignment. From the first encounter with these professionals, I experienced confidence and relief- things I never get usually when assigned to a topic. Just like it is mentioned on the website, they possess qualified write..


1What Makes You Better than Other Student Assigment Writing Services?

Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for 'lorem ipsum' will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).

2Who Are Your Writers?

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old.

3Can I Communicate with My Writer?

Yes, you can send an e-mail along with your assignment code and our coordinator will send your assignment to an assigned writer who will respond you back as soon as possible.

4How Do You Guarantee That You Will Follow My Instructions?

Our online expert writers follow your instructions while conducting the research and write your paper from scratch so that the completed assignment is 100% original and tailored to university’s requirements. All the resources used by the writers are duly referenced to avoid plagiarism.

5How Is the Price Calculated?

Our writers offer the right prices after thoroughly checking your requirements. We are aware of the financial situation of the students and are ready to work in their budget. We provide the highest quality of service at the lowest price possible.

Meet our Respectable Specialist

If writing tasks related to Physics are causing you trouble then here we have our expert all set to give you perfect guidance. Feel free to chat with him and discuss your problems anytime.

Higher Degree Holder

Expert in All Majors

Focus on your Success

Creative in Writing

David Will



Mr.Will is our leading Physics expert who has completed a Master's in Physics from Edinburgh University and acquired three years of experience as a high school physics teacher and two years as a research analyst. He is a savior to students who encounter difficulties with Physics-related scholarly writing as he posses great skills in drawing a guide to quick study and the best academic preparation for dissertation and thesis.

Need more details about Writing services?

High Quality Custom Content Writing Fast Service. #1 Copywriting Agency. Unlimited Revisions. SEO Friendly. 100% Original Content. Free Meta Details. Within 1 - 3 Days. Highlights: Live Chat Option Available, Delivering Creative Content Solutions.

Get It Done! Today

  • 1,212,718Orders

  • 4.9/5Rating

  • 5,063Experts


“My wound healing efficacy dissertation turned out just excellent with the extreme level of proficiency. I did not expect online writers to do such a scrupulous job. The content was precise, scientific, and thoughtful. Likewise, the sources were cited according to APA standards. I could not have been happier. I entrust my success to the dissertation professionals of Thestudenthelpline and recommend everyone for the same.” - Evelyn

Assignment writing-
"I never expected my first year to be that hard, and I panicked when I saw so many papers assigned to me. In spite of being a diligent student, I ordered this one assignment due to a lack of time to 'Thestudenthelpline'. I got my essay written according to almost all the instructions directed to the website. The writer did it well. Moreover, the price was not expensive either. I will use this service again if necessary." - Harper, a psychology freshman

Essay writing
"I ordered a 3-page essay on comparative analysis from Thestudenthelpline. Though the comparative analysis is not easy, it did not count as complex. The essay writers are very patient and open to customer views. Because of the cooperative writers, I was able to deliver my essay way before the deadline. The essay was structured with the proper sentence skills and had all the necessary sources, cited according to the rules. You can definitely place your order here if you need qualified assistance." - Aubrey



  • 21 Step Quality Check
  • 2000+ Ph.D Experts
  • Live Expert Sessions
  • Dedicated App
  • Earn while you Learn with us
  • Confidentiality Agreement
  • Money Back Guarantee
  • Customer Feedback

Just Pay for your Assignment

  • Turnitin Report

  • Proofreading and Editing

    $9.00Per Page
  • Consultation with Expert

    $35.00Per Hour
  • Live Session 1-on-1

    $40.00Per 30 min.
  • Quality Check

  • Total

  • Let's Start