Data Security Risk Assessment Report

Verified

Added on  2019/09/16

|2
|318
|378
Report
AI Summary
This report analyzes two research papers focusing on data security and infrastructure protection. The first paper emphasizes the importance of smart environments for effective service delivery, highlighting the need for context-aware applications to address organizational challenges. The second paper examines the dynamics of coupled and individual infrastructures, emphasizing the need for a comprehensive approach to measuring security risks and identifying vulnerabilities in cyber infrastructure. The report concludes by suggesting that organizations should carefully consider investment options and policy consequences before implementing security measures to effectively protect their infrastructure.
Document Page
Dey, A. & Abowd, G. Cite a Website - Cite This For Me. Smartech.gatech.edu. Retrieved from
https://smartech.gatech.edu/bitstream/handle/1853/3406/99-39.pdf?sequence=1&isAllowed=y
The first paper represents the necessity of smart environment. It concludes that smart
environment is required to provide effective services to occupants
(https://smartech.gatech.edu/bitstream/handle/1853/3406/99-39.pdf?sequence=1&isAllowed=y).
Generally, it can be said that it is necessary for every organization to identify their context and
determine what actions need to take to satisfy the identified context. It can be said that goal of
the smart environment not only supports the activities but also enhance the abilities of occupants
in performing different organizational tasks. Context is defined as information that is required to
utilize a particular situation of an entity. Furthermore, it can be said that the most important
problem faced by every organization is building and executing effective context-aware
applications. If the organization wants to resolve such problem, they can build applications on
the basis of ad-hoc manner.
Bush, B., Dauelsberg, L., & Powell, D. (2005). Critical Infrastructure Protection Decision
Support System (CIP/DSS) Project Overview. Retrieved from
http://www.systemdynamics.org/conferences/2005/proceed/papers/LECLA332.pdf
The second paper represents the dynamics of couple separate infrastructure and
individual infrastructure as per their interdependencies
(http://www.systemdynamics.org/conferences/2005/proceed/papers/LECLA332.pdf) . On the
other hand, it also defines the future and current cyber or physical threat environment. It can be
said that organization requires a comprehensive approach to measuring security risks and detect
available vulnerabilities in its cyber infrastructure. Furthermore, it can be suggested that the
organizations should understand the investment options and consequences of policies before
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
taking any decision regarding security system environment. This may be helpful in providing
proper infrastructure security by avoiding all available vulnerabilities.
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]