logo

An Automated Secure Monitoring System for CSU

   

Added on  2024-05-16

76 Pages8401 Words176 Views
 | 
 | 
 | 
Literature Review (Secondary Research) Template
Student Name & CSU ID
Project Topic Title An automated secure monitoring system for CSU
1
An Automated Secure Monitoring System for CSU_1

Version 1.0 _ Week 1
1
Reference in APA format Gualdoni.J, KurtzIlva.A, Megan.M, Rizvi.W. (2017). Secure Online Transaction Algorithm: Securing
Online Transaction Using Two-Factor Authentication. Procedia Computer Science. Volume 114,
2017, Pages 93-99
URL of the Reference Authors Names and Emails
and Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/
article/pii/S1877050917318100 Joseph Gualdoni, Andrew KurtzIlva,
Myzyri Megan, Wheeler Syed Rizvi
Level of journal = Q2
Two-Factor Authentication Secure Online Transaction
Algorithm (SOTA)AES Encryption
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/
... etc )
The Goal (Purpose) of this Solution &
What is the Problem that needs to be
solved
What are the components of it?
Authentication in CSU library.
Problem:
This is the best tools that provide the
security to the CSU library. There are
some of the problems in the authentication,
sometimes there are errors in the
connection. If the developer forgot the
password, then it is different to regain the
password.
Goal:
There are a variety of the components of the
authentication to secure the CSU library. Some of the
components are authentication, encryption tec. With the
help of these tools, it is easy to manage the security.
2
An Automated Secure Monitoring System for CSU_2

The main goal of this to secure the
communication into the CSU library. This
is the password protected tools that provide
access to only specific users.
The Process (Mechanism) of this Work; Means How the Problem has Solved & Advantage & Disadvantage of Each Step in This Process
Process Steps Advantage Disadvantage (Limitation)
1 Setup the systems in CSU library. Improves the connectivity in the Library. Costing of set up is high.
2 Setup the connection to the internet services. Helps to maintain the data in the library. NA
3 Setup the password-protected system for the
employees.
Helps to protect the system from unwanted
access.
Takes more time to configure.
4 Set up the authentication. Protect the system from hackers. NA
5 NA
Major Impact Factors in this Work
Dependent Variable Independent Variable
Authentications Network components.
Internet services Devices (wired or wireless)
3
An Automated Secure Monitoring System for CSU_3

Password protected Users
Input and Output A feature of This Solution Contribution & The Value of This Work
Input Output
This is the tool that
provides the
security in the CSU
library. The input
for this to set up the
password-protected
system into the CSU
library then verifies
all the process of the
authentication.
The main output
from this to protect
the CSU library
system from the
unwanted access.
The main feature of this to protect the CSU
library from the unwanted access and this can
be done using the automation of the
technology. To improve the technology, there
is need to use the new technology.
Authentication is the best way to protect the
access of the user.
The contribution comes take place by research
on the different topics of security and find out
the best method to provides the security to the
CSU library. After going through a lot of
journals, the outcomes in the term of
authentication to secure the CSU library.
1. what is the method could have been
better?
2. what in the author analyses were
missed?
3. was there a technique that could have been
used or a question that could have been
asked, that the researchers did not use or
ask?
Refers to the authentication, then this is also
a good method to provides the security to the
CSU library. But refers to the other methods,
then this can be more modifies and apply
some of the more tools to become more
automated.
Refers to the current journal then the author
provides all the information about the
authentication. But he misses out some of the
details about the other tools that will improve
the automation into the authentication.
Refers to the questions.
What are other tools who helps to improve the
security?
If the authentication fails, how to overcomes?
If the password and login details forgot and the
system got located who to recover the data and
4
An Automated Secure Monitoring System for CSU_4

information?
4. were the conclusion justified and How? Analyse This Work By Critical Thinking The Tools That Assessed this Work
Here comes the conclusion of the topic. This
is the automated technique that helps the
CSU library to secure the environment. This
is the good method to provides the security,
but it also has some of the corns that are it
required more time to configure.
This is the best tool, that helps to improve the
security into the CSU library, but the problem
arises that it took more time to configure. But
refers to the library system then it is the best
tool to protect the library.
This is the best tool that protects the library
system and provides the security to the CSU
library. But it can be more useful and secure if
there are some of the more tools are used along
with the authentication.
Diagram/Flowchart
5
An Automated Secure Monitoring System for CSU_5

Figure 1: Secondary authentication attack
6
An Automated Secure Monitoring System for CSU_6

2
Reference in APA format Huanga.C, Lub.C Kwang.K Raymond.C (2017). Secure and flexible cloud-assisted association rule
mining over horizontally partitioned databases. Journal of Computer and System Sciences. Volume
89, November 2017, Pages 51-63
URL of the Reference Authors Names and Emails
and Level of Journal (Q1, Q2, …Qn)
Keywords in this Reference
https://www-sciencedirect-
com.ezproxy.csu.edu.au/science/
article/pii/S0022000016301337
ChengHuanga RongxingLub Kim-Kwang
Raymond Choocd
Level of the journal: Q1
Big data mining Cloud privacy-preserving Association
rule mining Resilience against collusion attacks
The Name of the Current Solution
(Technique/ Method/ Scheme/
Algorithm/ Model/ Tool/ Framework/
... etc )
The Goal (Purpose) of this Solution &
What is the Problem that needs to be
solved
What are the components of it?
Implementing the cloud computing Problem:
This is the tool that is used store all the
details of the CSU library. But the problem
is that it required high cost as compared to
the other tools.
Goal:
The main goal is to protect the system
from the unwanted access and for this,
there is need to use the cloud computing,
There are various components are used in this cloud
computing system some of them are online severed, net
connections etc. these all are needing to set the cloud
computing system into the CSU library.
There are some of the other components are IaaS, PaaS,
SaaS.
7
An Automated Secure Monitoring System for CSU_7

this is the tool that secures the all the data
over the online server.
The Process (Mechanism) of this Work; Means How the Problem has Solved & Advantage & Disadvantage of Each Step in This Process
Process Steps Advantage Disadvantage (Limitation)
1 Need to set up all the system into the CSU
library.
This will able to manage the workflow in
the CSU library.
NA
2 After that need to set up the connectivity. This helps to improve the connectivity. This will increase the chances of
external threads.
3 There is need to take the subscription from
the server.
This will help to manage the workflow on
an online server.
Costing is high.
4 Add the authentication to the cloud server. With the help of this, the online server
becomes secure.
NA
5 Send all the data to the cloud server. With the help of this, all the data comes
from the online server and become easy to
access and become secure.
NA
Major Impact Factors in this Work
Dependent Variable Independent Variable
Sever Connectivity
8
An Automated Secure Monitoring System for CSU_8

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents