Your contribution can guide someone’s learning journey. Share your
documents today.
Team member 1: Article1:Alshammari,B.(2017).EnterpriseArchitectureSecurityAssessment Framework (EASAF).JCS,13(10), 558-571. Design security principles such as the security metrics, securing the weakest link and least privilege principle must be incorporated in security systems to detect the networking vulnerabilities in a commercial establishment.Security Architecture Development Method (SADM) is very much important regarding the creation of a security. The architectural layers required in the framework can be understood with the help of the method. Thus, the paper was very much useful as it provided a detailed description of the usefulness of a framework which can be very much useful to deal with the threat coming from network security threats. Article 2:Li, S., Tryfonas, T., & Li, H. (2016). The Internet of Things: a security point of view.Internet Research,26(2), 337-359. IoT devices are increasingly used across numerous industries and complex projects all ver the world. The challenges of IoT can be addressed in the first place with the help of the ES. The four layer framework of IoT can be very much useful to manage the sensing layer, network layer, and application layer. The importance of setting new technical standards can be understood from this journal as well. Multi layered architecture is very much significant to deal with the security issues of the IoT devices. Security design of the IoT devices must be selected in such a manner so that each fundamental unit of the IoT devices are secured from the diverse categories of threats.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1SECURITY OF ENTERPRISE SYSTEMS Article3:Tabatabaei,M.,&Harris,J.K.(2019).AMODELGRADUATE ENTERPRISE SECURITY COURSE.Issues in Information Systems,20(3). The business procedures of a corporporate environment can be enhanced in the first place with the help of the ES. These ES are very much significant for the business growth of the organization and address the complications and issues faced by the organizations such as dealing with the bulk volume of data. The journal was very much useful to identify how ES helps in dealing with the changes in a business or deal with threats like ransomware. At the same, time the journal reflected how ES can provide a business competitive edge over the other similar organizations. Risk management procedure is very much important for the incorporation of an ES. Team member 2: Article 1: Luburić, N., Sladić, G., Milosavljević, B., & Kaplar, A. (2018). Demonstrating Enterprise System Security Using an Asset-Centric Security Assurance Framework. In 8th International Conference on Information Society and Technology(p. 16). Securities of the ES have to be maintained in the first place so that the effectives of the system can be enjoyed by the end users. This journal helped in understanding that Internet of Toys can be very significant to enhance the cognitive ability of the ESs. Security of the components of the architectural model of IoToys has to be secured in order to deal with the security issues. The future IoToys framework of this journal involves different categories of people in different stages unlike the previous models and this framework can be very much useful to deal with the cloud security issues.
2SECURITY OF ENTERPRISE SYSTEMS Article 2: Appelbaum, D., Kogan, A., Vasarhelyi, M., & Yan, Z. (2017). Impact of business analyticsand enterprise systems on managerial accounting.International Journal of Accounting Information Systems,25, 29-44. There are diverse categories of management accounting challenges which have a direct impact on the business such as the management of the recording and reporting of the financial information, management of the diverse categories of cost such as the labor costs and operational costs. The introduction of business analytics and ES can be very much useful to deal with these challenges. Thus, it can be said that security of ES has to be prioritized so that these systems help to enhance the net profitability of the business. The data security weakness of an organization can also be reduced or managed in the first place with the help of the ESs. Article 3: Pendleton, M., Garcia-Lebron, R., Cho, J. H., & Xu, S. (2016). A survey on systems security metrics.ACM Computing Surveys (CSUR),49(4), 1-35. The scales of metrics which must be considered for the selection of a framework are nominal set, ordinal set, interval set, ratio analysis, and inherent uncertainity. The attack defense interactions have to be focused while selecting the security metrics such as the situation metrics, defense metrics, attack metrics and vulnerability metrics. The susceptibility assignment which has to be considered while improving the security of an ES are malware susceptibility and phishing susceptibility. The vulnerability metrics which can be considered in the creation of a framework securing are historical vulnerability metric, future exploited vulnerability matric and tend to be exploited metric.