logo

COIT20249 Rahman and Choo- Annotated Bibliography

   

Added on  2020-02-19

5 Pages1048 Words35 Views
Running head: ANNOTATED BIBLIOGRAPHY Annotated BibliographyName of the StudentName of the UniversityAuthor note

1ANNOTATED BIBLIOGRAPHYReference 1 (Ref. 1)Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incident handlingin the cloud.Computers & Security,49, 45-69.In this article Rahman and Choo (2015) discusses about the ways of handling incidencearising from lack of security for the availability of the assets in the organization. The writer ofthe article are from information security department of University f South Australia andUniversity of Tun Hussein Onn Malaysia. The survey was done by analyzing the literature ofexisting reports about the incidence handling with the help of cloud computing. They furtherproposed the writers conducted a cloud incident handling model and an open research. Cloudcomputing is one of the most recent technologies used to secure the information within theorganization. Thus, it is reliable to depend on the research conducted and it is also relevant as itis one of the most demanding topics. The main limitation of the research was that it did notconsidered any experimentation about the real world usage of cloud computing. Reference 2 (Ref. 2)Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things:Perspectives and challenges.Wireless Networks,20(8), 2481-2501.Jing et. al. (2014) has evaluated in their article about the increasing use of Internet in allthe activities of the world from household task to professional task. The writers of the article areprofessors in different university of China and Kuwait. The paper used literature to analyze theproblem of security arising from the internet usage and offered a descriptive framework aboutthe security issues. Internet is highly used by everybody in today’s world and it is essential forany organization to analyze the threat arising from the usage of this technology. Thus, carrying

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Annotated Bibliography On Network And Information Security Technologies
|8
|1781
|39

Security Issues in Cloud Computing- Document
|7
|1373
|77

Professional Skills for Information and Communication Technology- Case Study
|9
|2089
|35

Annotated Bibliography on Cloud Computing in Healthcare
|14
|3998
|146

Article on Network Security
|6
|1219
|38

IOT in Farming to Manage Control and Execute Pesticide and Disease of Different Crops Article 2022
|16
|3664
|31