Current Practice Analysis for IT Security Management: Case Studies
VerifiedAdded on 2023/06/07
|6
|2207
|360
AI Summary
This article provides annotated bibliographies of four case studies on IT security management from top publishers like Elsevier and IEEE. The studies cover topics such as enterprise information systems security, disaster management, SCADA systems, and smart grid security. The paper discusses the methods and data used, results, strengths, weaknesses, and opportunities for future research. The subject is IT security management and the course code is BCO6653.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Management of Information
Technology (BCO6653)-
Assignment 1
Current Practice Analysis for
IT Security management-Case Studies
Lecture Day:
Lecturer Name:
Tutor Name:
Group Code:
Full Name:
Student ID:
1
Technology (BCO6653)-
Assignment 1
Current Practice Analysis for
IT Security management-Case Studies
Lecture Day:
Lecturer Name:
Tutor Name:
Group Code:
Full Name:
Student ID:
1
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Annotated Bibliography #1
publishing company (Elsevier, Springer, Ieee, …): Elsevier
Journal Ranking (A*, A, B, C, D):
Date accessed: 8/31/2018
Title of article: Enterprise Information Systems Security: A Case Study in the Banking Sector
Authors: Peggy E. Chaudhry , Sohail S. Chaudhry , Kevin D. Clark , and Darryl S. Jones
Journal Title: Department of Management and Operations/International Business, Villanova
School of Business,
Volume: 4
Issue:
Year of publication: 2016
Page Numbers: 1375-1384
URL (if available): http://dl.ifip.org/db/conf/ifip8/confenis2012/ChaudhryCCJ12.pdf
Abstract
Data innovation has been expanding in the online business showcase. This has been making a few
open doors for organizations. Be that as it may, with a few chances, different dangers and dangers
have been joined with it. Data security has been the most developing security issues in the IT field.
This paper has done noteworthy examines in different information security issues in the IT field.
This paper has talked about adjoin a few administrative actives for guaranteeing IT information
administration issues in the business.
Methods and Data Used
This paper has done auxiliary approach towards survey of existing writing on administration part
in IT industry. Information has been gathered from a few online diaries and databases. Late diaries
after 2012 have been taken for gathering information and data identified with IT security issues.
Non-scholarly papers have been rejected for dependability and legitimacy purposes.
Results and Conclusion:
In the wake of examining information, different association enacts have been distinguished for
guaranteeing security of information and Information. Establishment of firewalls and VPN have
been basic approach for the organizations for guaranteeing security of information. A compelling
data security administration arrangement have been actualized in a few association for
guaranteeing security f information and data.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this
paper:
The paper has possessed the capacity to look into about different parts of security issues in the IT
administration of information. Legitimate audit of existing writing has been finished. The auxiliary
approach of the information gathering has possessed the capacity to discover sensible
information and data with respect to IT information administration issues. Notwithstanding, there
have been a few shortcomings including some watchword are utilized that may prompt some
writing immaculate (Soomro, Shah and Ahmed 2016). No elective inquiry convention have been
utilized. The paper has been distributed in English dialect just that may limits the learning of
perusers of other lingual exercises. The future work of the analysts may get simple with the
investigation of this paper as outline of every security focuses have been given.
Reasons for use :
This paper has been utilized as there has been a represented insights about al the security worries
2
publishing company (Elsevier, Springer, Ieee, …): Elsevier
Journal Ranking (A*, A, B, C, D):
Date accessed: 8/31/2018
Title of article: Enterprise Information Systems Security: A Case Study in the Banking Sector
Authors: Peggy E. Chaudhry , Sohail S. Chaudhry , Kevin D. Clark , and Darryl S. Jones
Journal Title: Department of Management and Operations/International Business, Villanova
School of Business,
Volume: 4
Issue:
Year of publication: 2016
Page Numbers: 1375-1384
URL (if available): http://dl.ifip.org/db/conf/ifip8/confenis2012/ChaudhryCCJ12.pdf
Abstract
Data innovation has been expanding in the online business showcase. This has been making a few
open doors for organizations. Be that as it may, with a few chances, different dangers and dangers
have been joined with it. Data security has been the most developing security issues in the IT field.
This paper has done noteworthy examines in different information security issues in the IT field.
This paper has talked about adjoin a few administrative actives for guaranteeing IT information
administration issues in the business.
Methods and Data Used
This paper has done auxiliary approach towards survey of existing writing on administration part
in IT industry. Information has been gathered from a few online diaries and databases. Late diaries
after 2012 have been taken for gathering information and data identified with IT security issues.
Non-scholarly papers have been rejected for dependability and legitimacy purposes.
Results and Conclusion:
In the wake of examining information, different association enacts have been distinguished for
guaranteeing security of information and Information. Establishment of firewalls and VPN have
been basic approach for the organizations for guaranteeing security of information. A compelling
data security administration arrangement have been actualized in a few association for
guaranteeing security f information and data.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this
paper:
The paper has possessed the capacity to look into about different parts of security issues in the IT
administration of information. Legitimate audit of existing writing has been finished. The auxiliary
approach of the information gathering has possessed the capacity to discover sensible
information and data with respect to IT information administration issues. Notwithstanding, there
have been a few shortcomings including some watchword are utilized that may prompt some
writing immaculate (Soomro, Shah and Ahmed 2016). No elective inquiry convention have been
utilized. The paper has been distributed in English dialect just that may limits the learning of
perusers of other lingual exercises. The future work of the analysts may get simple with the
investigation of this paper as outline of every security focuses have been given.
Reasons for use :
This paper has been utilized as there has been a represented insights about al the security worries
2
in IT information administration issues. This paper has possessed the capacity to recognize al
security worries in the IT information administration issues. This paper has ready to appropriately
break down information and give legitimate answers for information security issues.
Annotated Bibliography #2
publishing company (Elsevier, Springer, Ieee, …): IEEE
Journal Ranking (A*, A, B, C, D): A*
Date accessed: 8/31/2018
Title of article: Disaster at a University: A Case Study in Information Security
Authors: Ramakrishna Ayyagari and Jonathan Tyks
Journal Title: Journal of Information Technology Education
Volume: 11
Issue: 2
Year of publication: 2012
Page Numbers: 215-225
URL (if available):
https://pdfs.semanticscholar.org/2e74/2e0754841a53d98cefb3cc479e2141e1a2b5.pdf
Abstract
The Internet of Things (IoT) gadgets have been getting to be famous in different spaces including
e-wellbeing, web based business and e-Home. The sending if IoT gadgets have been expanded in
functional with a few security issues and assaults on it. Different security changes have been
found in the IoT gadgets. This paper has examined about IoT challenges and gave systems and
answer for alleviate these security issues.
Methods and Data Used:
The paper has utilized optional approach for dissecting and gathering information and data.
Information has been gathered from different online assets including on the web diaries, articles
and books identified with IoT gadgets security challenges. Research diaries have been taken from
2012 to 2018 distributed year that assistance in gathering flow information.
Results and Conclusion:
This paper has tended to different security changes in the IoT gadgets and underlined on what
should be possible to relieve these difficulties. A security design has been proposed for alleviating
security challenges in the IoT gadgets. Giving of IoT Big information has been examined in the
paper.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this
paper:
This paper has ready to recognize diverse sorts of assaults in the IoT gadgets including gadget
property assaults, Adversary area assaults, Access level assaults, Host based assaults and
convention based assaults. These assaults have been legitimately investigated. This work has
concentrated on by and large security design as an answer for these issues in the IoT security
(Hossain, Fotouhi and Hasan 2015). This paper needed in the usage of arrangements of these
assaults. The IoT security examination has been given in the exploration paper. The future
research should be possible for improving these arrangement gave in this examination.
Reasons for use (50 words):
This paper has concentrated on the center competency if the security issues in the IoT gadgets.
The security issues have been appropriately broke down. The specialist has possessed the capacity
to pass on the arrangement required for administration of security issues in the IoT gadgets.
3
security worries in the IT information administration issues. This paper has ready to appropriately
break down information and give legitimate answers for information security issues.
Annotated Bibliography #2
publishing company (Elsevier, Springer, Ieee, …): IEEE
Journal Ranking (A*, A, B, C, D): A*
Date accessed: 8/31/2018
Title of article: Disaster at a University: A Case Study in Information Security
Authors: Ramakrishna Ayyagari and Jonathan Tyks
Journal Title: Journal of Information Technology Education
Volume: 11
Issue: 2
Year of publication: 2012
Page Numbers: 215-225
URL (if available):
https://pdfs.semanticscholar.org/2e74/2e0754841a53d98cefb3cc479e2141e1a2b5.pdf
Abstract
The Internet of Things (IoT) gadgets have been getting to be famous in different spaces including
e-wellbeing, web based business and e-Home. The sending if IoT gadgets have been expanded in
functional with a few security issues and assaults on it. Different security changes have been
found in the IoT gadgets. This paper has examined about IoT challenges and gave systems and
answer for alleviate these security issues.
Methods and Data Used:
The paper has utilized optional approach for dissecting and gathering information and data.
Information has been gathered from different online assets including on the web diaries, articles
and books identified with IoT gadgets security challenges. Research diaries have been taken from
2012 to 2018 distributed year that assistance in gathering flow information.
Results and Conclusion:
This paper has tended to different security changes in the IoT gadgets and underlined on what
should be possible to relieve these difficulties. A security design has been proposed for alleviating
security challenges in the IoT gadgets. Giving of IoT Big information has been examined in the
paper.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this
paper:
This paper has ready to recognize diverse sorts of assaults in the IoT gadgets including gadget
property assaults, Adversary area assaults, Access level assaults, Host based assaults and
convention based assaults. These assaults have been legitimately investigated. This work has
concentrated on by and large security design as an answer for these issues in the IoT security
(Hossain, Fotouhi and Hasan 2015). This paper needed in the usage of arrangements of these
assaults. The IoT security examination has been given in the exploration paper. The future
research should be possible for improving these arrangement gave in this examination.
Reasons for use (50 words):
This paper has concentrated on the center competency if the security issues in the IoT gadgets.
The security issues have been appropriately broke down. The specialist has possessed the capacity
to pass on the arrangement required for administration of security issues in the IoT gadgets.
3
Annotated Bibliography #3
publishing company (Elsevier, Springer, Ieee, …): IEEE
Journal Ranking (A*, A, B, C, D): A*
Date accessed: 8/31/2018
Title of article: Managing Security Requirements in Practice: A Case Study
Authors: Vidya Lakshminarayanan, WenQian LiuÍ, Charles L Chen, Dewayne E Perry
Journal Title: IEEE transactions on cloud computing
Volume: 3
Issue: 2
Year of publication: 2015
Page Numbers: 233-244
URL (if available): http://users.ece.utexas.edu/~perry/work/papers/R2A-05-Security.pdf
Abstract
Mechanical framework have been leaning toward diminishing their operational costs. Along these
lines, they require appropriate frameworks for giving strength, adaptation to non-critical failure
and adaptability. SCADA frameworks have been helping in giving such offices to associations. In
any case, there has been challenges in the cloud based SCADA framework, has been talked about
in the paper.
Methods and Data Used:
The paper has utilized subjective approach so as to gather information and data identified with
the SCADA frameworks. Information has been gathered from auxiliary information sources
including on the web s and diaries. The auxiliary approach has helped in keeping up a sharp way to
deal with different information from various diaries identified with the SCADA frameworks.
Results and Conclusion:
In the wake of dissecting the information, different data about the alleviation techniques have
been tended to in the report. The coming if the IoT distributed computing has been examined in
the report. The utilization of the distributed computing in the gadgets has been portrayed for the
valuable utilization of distributed computing.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this
paper:
This paper has been helping in examining a framework for helping association. SCADA frameworks
has been helping giving human services arrangements and empowering specialists to work all the
more proficiently. Standard conventions identified with SCADA frameworks have been
investigated in this paper. The paper has not ready to give legitimate answers for the SCADA
security over cloud (Sajid, Abbas and Saleem 2016). The future research work may center around
record trustworthiness checking procedure to anchor information over SCADA in cloud condition.
The utilization of security arrangements has been kept up keeping in mind the end goal to anchor
organize security.
Reasons for use:
This paper has possessed the capacity to survey existing literary works on the SCADA frameworks
with cloud condition. The security issues in the SCADA frameworks have been basically evaluated
in the paper. A legitimate information gathering has been done I this paper. The investigation of
information has been done appropriately with legitimate proposal for future explores.
Annotated Bibliography #4
publishing company (Elsevier, Springer, Ieee, …): IEEE
Journal Ranking (A*, A, B, C, D):A
4
publishing company (Elsevier, Springer, Ieee, …): IEEE
Journal Ranking (A*, A, B, C, D): A*
Date accessed: 8/31/2018
Title of article: Managing Security Requirements in Practice: A Case Study
Authors: Vidya Lakshminarayanan, WenQian LiuÍ, Charles L Chen, Dewayne E Perry
Journal Title: IEEE transactions on cloud computing
Volume: 3
Issue: 2
Year of publication: 2015
Page Numbers: 233-244
URL (if available): http://users.ece.utexas.edu/~perry/work/papers/R2A-05-Security.pdf
Abstract
Mechanical framework have been leaning toward diminishing their operational costs. Along these
lines, they require appropriate frameworks for giving strength, adaptation to non-critical failure
and adaptability. SCADA frameworks have been helping in giving such offices to associations. In
any case, there has been challenges in the cloud based SCADA framework, has been talked about
in the paper.
Methods and Data Used:
The paper has utilized subjective approach so as to gather information and data identified with
the SCADA frameworks. Information has been gathered from auxiliary information sources
including on the web s and diaries. The auxiliary approach has helped in keeping up a sharp way to
deal with different information from various diaries identified with the SCADA frameworks.
Results and Conclusion:
In the wake of dissecting the information, different data about the alleviation techniques have
been tended to in the report. The coming if the IoT distributed computing has been examined in
the report. The utilization of the distributed computing in the gadgets has been portrayed for the
valuable utilization of distributed computing.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this
paper:
This paper has been helping in examining a framework for helping association. SCADA frameworks
has been helping giving human services arrangements and empowering specialists to work all the
more proficiently. Standard conventions identified with SCADA frameworks have been
investigated in this paper. The paper has not ready to give legitimate answers for the SCADA
security over cloud (Sajid, Abbas and Saleem 2016). The future research work may center around
record trustworthiness checking procedure to anchor information over SCADA in cloud condition.
The utilization of security arrangements has been kept up keeping in mind the end goal to anchor
organize security.
Reasons for use:
This paper has possessed the capacity to survey existing literary works on the SCADA frameworks
with cloud condition. The security issues in the SCADA frameworks have been basically evaluated
in the paper. A legitimate information gathering has been done I this paper. The investigation of
information has been done appropriately with legitimate proposal for future explores.
Annotated Bibliography #4
publishing company (Elsevier, Springer, Ieee, …): IEEE
Journal Ranking (A*, A, B, C, D):A
4
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Date accessed:8/31/2018
Title of article: Information Security Curriculum Creation: A Case Study
Authors: Bradley Bogolea and Kay Wijekumar
Journal Title: In Services (SERVICES), 2015 IEEE World Congress
Volume:
Issue:
Year of publication: 2015
Page Numbers: 21-28
URL (if available):
https://www.eicar.org/files/bogoleainformationsecuritycurriculumcreation.pdf
Abstract
Smart Grid has been a mechanical development that assistance in enhancing unwavering quality,
productivity, financial matters and manageability of power administrations. Be that as it may,
there have been a few difficulties in the keen lattice including overseeing savvy meters, control
resources and overseeing immense measure of information. This paper has helped in building a
various leveled structure for anchoring information and data over the cloud.
Methods and Data Used:
The exploration has utilized auxiliary strategies for information accumulation process. Information
has been gathered from optional sources including on the web diaries, articles and government
database. . Ongoing diaries after 2012 have been taken for gathering information and data
identified with keen network security issues. Non-scholarly papers have been rejected for
dependability and legitimacy purposes.
Results and Conclusion:
This paper has portrayed about basic issues in the savvy lattice distributed computing. The
utilization of the distributed computing in the Smart Grid has been portrayed. The analyst has not
ready to say the security arrangements in the paper for all intents and purposes. The utilization of
cryptography in the setting has not been legitimately portrayed in the report.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this
paper:
This paper has depicted about the advantages of the savvy network. The IT administration in the
keen lattice has been broke down appropriately. The legitimate segment of the savvy matrix
process has been depicted in the paper ( Baek et al. 2015). The data stream in the shrewd
framework frameworks has been clarified. The paper has not ready to limit the security issues
recognized in the paper. The encryption approach in the savvy matrix idea in cloud condition has
been talked about in the paper that may help in limiting security challenges in the keen lattice.
Reasons for use:
This paper has possessed the capacity to talk about the security challenges in the brilliant matrix
framework in distributed computing. This paper has ready to appropriately break down
information and give legitimate answers for information security issues. The security answer for
the brilliant framework idea has been legitimately said in the paper. A legitimate information
investigation has been given in the paper.
5
Title of article: Information Security Curriculum Creation: A Case Study
Authors: Bradley Bogolea and Kay Wijekumar
Journal Title: In Services (SERVICES), 2015 IEEE World Congress
Volume:
Issue:
Year of publication: 2015
Page Numbers: 21-28
URL (if available):
https://www.eicar.org/files/bogoleainformationsecuritycurriculumcreation.pdf
Abstract
Smart Grid has been a mechanical development that assistance in enhancing unwavering quality,
productivity, financial matters and manageability of power administrations. Be that as it may,
there have been a few difficulties in the keen lattice including overseeing savvy meters, control
resources and overseeing immense measure of information. This paper has helped in building a
various leveled structure for anchoring information and data over the cloud.
Methods and Data Used:
The exploration has utilized auxiliary strategies for information accumulation process. Information
has been gathered from optional sources including on the web diaries, articles and government
database. . Ongoing diaries after 2012 have been taken for gathering information and data
identified with keen network security issues. Non-scholarly papers have been rejected for
dependability and legitimacy purposes.
Results and Conclusion:
This paper has portrayed about basic issues in the savvy lattice distributed computing. The
utilization of the distributed computing in the Smart Grid has been portrayed. The analyst has not
ready to say the security arrangements in the paper for all intents and purposes. The utilization of
cryptography in the setting has not been legitimately portrayed in the report.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this
paper:
This paper has depicted about the advantages of the savvy network. The IT administration in the
keen lattice has been broke down appropriately. The legitimate segment of the savvy matrix
process has been depicted in the paper ( Baek et al. 2015). The data stream in the shrewd
framework frameworks has been clarified. The paper has not ready to limit the security issues
recognized in the paper. The encryption approach in the savvy matrix idea in cloud condition has
been talked about in the paper that may help in limiting security challenges in the keen lattice.
Reasons for use:
This paper has possessed the capacity to talk about the security challenges in the brilliant matrix
framework in distributed computing. This paper has ready to appropriately break down
information and give legitimate answers for information security issues. The security answer for
the brilliant framework idea has been legitimately said in the paper. A legitimate information
investigation has been given in the paper.
5
References
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, 36(2),
pp.215-225.
Sajid, A., Abbas, H. and Saleem, K., 2016. Cloud-assisted IoT-based SCADA systems security: A
review of the state of the art and future challenges. IEEE Access, 4, pp.1375-1384.
Baek, J., Vu, Q.H., Liu, J.K., Huang, X. and Xiang, Y., 2015. A secure cloud computing based
framework for big data information management of smart grid. IEEE transactions on cloud
computing, 3(2), pp.233-244.
Hossain, M.M., Fotouhi, M. and Hasan, R., 2015, June. Towards an analysis of security issues,
challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE World
Congress on (pp. 21-28). IEEE.
6
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more
holistic approach: A literature review. International Journal of Information Management, 36(2),
pp.215-225.
Sajid, A., Abbas, H. and Saleem, K., 2016. Cloud-assisted IoT-based SCADA systems security: A
review of the state of the art and future challenges. IEEE Access, 4, pp.1375-1384.
Baek, J., Vu, Q.H., Liu, J.K., Huang, X. and Xiang, Y., 2015. A secure cloud computing based
framework for big data information management of smart grid. IEEE transactions on cloud
computing, 3(2), pp.233-244.
Hossain, M.M., Fotouhi, M. and Hasan, R., 2015, June. Towards an analysis of security issues,
challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE World
Congress on (pp. 21-28). IEEE.
6
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.