logo

Professional Skills Development

7 Pages2157 Words223 Views
   

Added on  2019-10-30

Professional Skills Development

   Added on 2019-10-30

ShareRelated Documents
Running head: PORTFOLIOProfessional Skills Development[Portfolio]Name of the student:Name of the university:Author note:
Professional Skills Development_1
1PORTFOLIO1) Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Gametheory meets network security and privacy.ACM Computing Surveys (CSUR),45(3), 25.Authors have expressed their deep concerns on the use of technology such as using internet inmost transactions. Authors have not neglected the importance of internet and technology.This is because internet and technology has facilitated many works that is beyondimagination with the manual type or working. However, their primary concerns are with thedisadvantages, which the internet or specifically the different technology has. Surprisingly,using the latest and updated version of software has redefined the competition in the market.Furthermore, those companies are more competitive that has advanced version of technologyin use in their operational practices. The culture is now difficult to overturn towards thetraditional format of operational style. However, it is advisable that firms have highprotection capacity while using such software. This is because of many reasons such assoftware developer’s access to the “code region” where they can make unwanted changes.Such changes might be unauthorised as well. Additionally, some other challenges are alsothere such as spreading malwares to the system with the use of such technologies andsoftware. There is a threat of entrance of malware materials in the system through suchsoftware. Such malware might hamper the performance of the system. An elevated exposureto such threat might even corrupt the device, which would be a huge loss for the company, asit would lose its important data. It is then very important that company must have somecounter solution against the probable threat that might come underway with the use of suchsoftware. 2) Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-basedforensic analysis for collaborative network security management system.Tsinghuascience and technology,18(1), 40-50.These authors have also agreed on a fact that the use of internet has reached to a differentlevel in nowadays. This has reached to a higher level with the advent of various internetrelated business activities such as the use e-commerce for enhancing the sales and revenues.The use of e-commerce has further the standard of customer service. The use of e-commercehas facilitated the standard of customer service. Additionally, it has also produced manychallenges to the firms. One of such challenges is related with the payment security, whichhas worsened the situation in nowadays. The challenge is even bigger to those firms as theydo not have any counter solution against the identified threats. In such circumstances, it is
Professional Skills Development_2
2PORTFOLIOnecessary for the firms that either they approach the third party service providers or theycould purchase the software. The benefits of technology have come at the verge of securityrelated threats. Payment related issues could also hamper the customer service standard of thespecific companies. Additionally, malicious particles can also enter the computer system,which might also corrupt the while device. This would be a loss of company’s importantprivate data. This would also hamper the performance of system. Authors have not ignoredthe importance of software and technology; however, they have also not denied that it isdisadvantageous in many cases. Such disadvantages might lead to extra expenses, whichwould reduce the revenues. Nevertheless, it is necessary for companies that it maintains anelevated graph of revenues. 3) He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network securityusing the Tree-Rule firewall.Future generation computer systems,30, 116-126.These authors have argued that even the security related software finds thing difficult toprotect the system from the hackers or data security hackers. The authors have producedsome supportive evidences as well. They have said that normal antivirus is not sufficient,which is why it becomes difficult to prevent the system from such professional hackers orfrom the malicious particles. In such case, companies sense the requirement to purchase andinstall the firewall security application on the system in order to protect the system from anymalicious attacks. This is effective also as it has many security related aspects, which alsoinclude but are not limited to such as protecting email from phishing. Major maliciousparticles are left in the form of fishing that gets accumulated with the emails and hampers thesystem. It may also damage the system, which would be a loss of an entire system as well ascompany’s important data. Firewall security is expensive as well. Despite the benefits that ithas, it also fails in complicated cases. This is why new firewall security is being produced,which is Tree-Rule firewall. It has already been tested on the Linux platform. The authorshave found this as more effective than the normal firewall security. It also improves the speedof the process, which is better than its earlier version. It is very easy to use as well. It can beeasily configured into the system. It is highly effective in larger network such as the cloudnetwork. 4) Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with bigdata in cloud computing.International Journal of Network Security & ItsApplications,6(3), 45.a
Professional Skills Development_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT20249 Cloud Computing Based Forensic Analysis
|6
|1603
|65

E-PORTFOLIO
|13
|2928
|64

Case Study on Connectivity and Security Issues
|8
|1431
|42

Risk Management Assignment | Risk Mitigation Plan
|17
|3437
|38

Mobile Device Security NAME OF THE STUDENT NAME OF THE
|9
|476
|39

Secure Web Server: Types of Attacks and Security Measures
|6
|730
|219