logo

Professional Skills in Information Communication Technology

4 Pages1090 Words38 Views
   

Added on  2020-02-19

Professional Skills in Information Communication Technology

   Added on 2020-02-19

ShareRelated Documents
Running Head: PROFESSIONAL SKILLS IN INFORMATION COMMUNICATIONTECHNOLOGY 1Professional Skills in Information Communication TechnologyNameDate
Professional Skills in Information Communication Technology_1
PROFESSIONAL SKILLS IN INFORMATION COMMUNICATION TECHNOLOGY 2Gil, S., Kott, A., & Barabási, A.-L. (May 16, 2015). A genetic epidemiology approach to cyber-security. Scientific Reports, 4, 1.)The researchers evaluated the kind of security risks for computers and the factors that determine the probability that the computer security could be compromised; the authors aimed at understanding the factors that determine the probability that a computer node within the network is compromised (1). The authors, being professionals in various institutions of higher learning and research, undertake a a primary research approach using a case study to identify and validate different types of threats in a typical university IT network (2). The researchers established that the probability a computer node within a network is comprised is largely dependent on the set of reachable services that are running on the host (computer). The authors found that several attacks take advantage of specific network services vulnerabilities to bypass authentication requirements and gain access to the system. Further, it was established that some malware can scan for services autonomously to identify possible targets or open ports actively after infecting a network. (3). The proposed novel approach to identify and then quantify individual computers susceptibility to cyber threats with respect to the network services being run on these computers can help organizations map their threats and manage risks (4). The main drawback of the research is that by being a case study, it cannot be easily replicated and so the findings may not be universally applicable (5)Jouini, M., Rabai, L. B. A., & Aissa, A. B. (January 01, 2014). Classification of SecurityThreats in Information Systems. Procedia Computer Science, 32, 489-496.The research reviews and classifies the security threats for information systems, premised on the fact that as more organizations use data and information in information systems, there are significant threats to these systems (1). The authors are eminent professionals in their various ICT fields, including software engineering, network engineering, and security and are senior members offaculty in various institutions of higher learning (2). Using analytical methods; the authors sought to develop a new model of classifying identified security threats broadly into internal and external threats. The classification is based on the threat sources and their impacts (3). The authors develop anew model that classifies most information security system threats as either internal or external, which can be human, environmental, and technological threats. The threats can either be malicious or non-malicious (4). The drawback is that it reviews existing literature, despite developing a new model and does not provide effective solutions (5)Zissis, D., & Lekkas, D. (March 01, 2012). Addressing cloud computing security issues. FutureGeneration Computer Systems, 28, 3, 583-592.
Professional Skills in Information Communication Technology_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Overview of the State-of-the-Art of Cloud Computing Cyber-Security | Presentation
|13
|900
|44

Cyber Security Assignment PDF
|9
|2867
|2114

Identifying and Responding to Incidents in the Cloud Environment
|6
|874
|367

Cyber Security: Attacks and Mitigation Techniques
|11
|2291
|301

Cyber Security And Risk Management
|11
|2332
|89

(Doc) Intrusion Detection System
|10
|2535
|219