logo

Professional Skills for Information and Communication Technology- Case Study

9 Pages2089 Words35 Views
   

C Q University Australia

   

Added on  2020-02-24

Professional Skills for Information and Communication Technology- Case Study

   

C Q University Australia

   Added on 2020-02-24

ShareRelated Documents
Running head: PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGYProfessional Skills for Information and Communication TechnologyStudent’s name:Name of the university:Author’s note:
Professional Skills for Information and Communication Technology- Case Study_1
1PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGY1. Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensicanalysis for collaborative network security management system. Tsinghua science andtechnology, 18(1), 40-50.In this article, Zhen Chen, Fuye Han, Junwei Cao, Xin Jiang and Shuo Chen stated aboutnetwork security problem that causes major security concern. Most of the network securitybreaches occur due to the phishing, spam, worms. The authors explained that new botnet attackscan further degrade the security network. This article provides a solution based on UnifiedThreat Management (UTM) as it connects the protocol and exchange network events. Keythemes of this article are cloud computing, computer forensic, overlay network and botnet. Thisarticle has been taken the information through secondary sources. This article is relevant to thecase study as it discusses network security system and the article has been written by famouswriters and published by IEEE.2.Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud.InternationalJournal of Network Security & Its Applications, 6(1), 25.Authors explained in this article about network security and infrastructural concept ofcloud computing. Global companies are taking help of cloud computing in network security andit completely depends on network architecture. Numerous cloud based services are provided bycloud and this article is perfect for case study as it states that security system is not robust andone can make it consistent and secure. Moreover, this article is relevant as it is related tocomputing concept of cloud computing. The authors collected the data from credible secondary
Professional Skills for Information and Communication Technology- Case Study_2
2PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION TECHNOLOGYsources. Key themes of this article are cloud services, network security and computer networkand distributed computing. This article has been written by famous senior lecturer andconsultants Monjur Ahmed and Mohammad Ashraf Hossain. 3. Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory meetsnetwork security and privacy. ACM Computing Surveys (CSUR), 45(3), 25. This study provides a comprehensive and structured overview of network security andprivacy of computer networking. Most importantly, this article primarily focuses on gametheory. This article is a kind of exploratory article that tests some security and privacy issuesthrough game theory. This article is relevant to the case study as it deals with network securityand solutions towards it. Authors summarise the results of the tests and this article has taken theinformation from secondary sources. The article explains the terms like algorithms, design,security and economics. The authors are well known in their field of teaching and distinctuniversities from Australia, Switzerland and USA. 4. Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis ofsecurity issues for cloud computing. Journal of Internet Services and Applications, 4(1),5.This article has been published by reputed Springer publication and authors are KeikoHashizume and others. The key themes of this article are cloud computing, security, SPI (SaaS,PaaS, Iaas) model, threats in network and countermeasures for those. This article is relevant for
Professional Skills for Information and Communication Technology- Case Study_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT20249 Cloud Computing Based Forensic Analysis
|6
|1603
|65

Professional Skills Development
|7
|2157
|223

The Effect of Social Media on Shaping Teenagers of the Current Generation
|5
|827
|415