logo

Standards, Ethics and Compliance: Article

6 Pages1264 Words64 Views
   

Added on  2020-03-28

Standards, Ethics and Compliance: Article

   Added on 2020-03-28

ShareRelated Documents
Running head: STANDARDS, ETHICS AND COMPLIANCEStandards, ethics and complianceName of the studentName of the universityAuthor note
Standards, Ethics and Compliance: Article_1
1STANDARDS, ETHICS AND COMPLIANCEReference 1: Manshaei et al. (2013)This article discussed about the implementation of different theories and concepts on thenetwork security. According to the author, in the current business scenario, determination of theissues in the network security is much complicated than ever. This is due to the reason that,information technologies are being used in every aspects of the current of the current scenario.Thus, identification of the origination of the issue in the network gets difficult. Thus, accordingto the author, it is necessary that various effective concepts and theories should be implementedin order to determine the network security effectively. This article discussed about the gametheory. According to this article, game theory will help to effectively and accurately determinethe overview of the security and privacy in a particular network. In the article, game theoretic approaches are being involved along with various otheraspects. The research work is being further divided in to various applications based on thesecurity and privacy problems. Afterwards, six categories are being initiated, which includessecurity of the physical and MAC layers, security of self organizing networks, anonymity andprivacy, intrusion detection system, cryptography and economics of network security. Thisarticle concludes that, effective implementation of the game theory will help to determine thenetwork security more effectively. Reference 2: Ren, Wang and Wang (2012)This article states the disadvantages of the cloud computing in determining the networksecurity systems. According to the authors, cloud computing offers huge opportunities for thebusiness organizations. This is due to the reason that, in the case of the cloud computing, morenumbers of data can be stored in the system and in a more secured manner. Thus, it helps in
Standards, Ethics and Compliance: Article_2
2STANDARDS, ETHICS AND COMPLIANCEeffectively determining and classifying the complex data management systems. In addition, theinitiation of the cloud computing also helps in reducing the huge cost or investment beinginvolved in maintaining the network security systems. Another key advantage of cloudcomputing being identified in this article is the flexibility. Cloud computing enables the user inmodifying the utility according to the requirement of the organizations. However, there are various challenges of cloud computing are also being stated in thisarticle. According to the author, apart from the advantages being possessed by the cloudcomputing, there are challenges such as lack of confidentiality and integrity may be faced by theorganizations. This is due to the reason that, in the case of the cloud computing, all theinformation is being uploaded in the online portal, which may cause breach of security. Reference 3: Daya (2013)This article has given a holistic approach of network security system. This articlediscussed about the evolution of the network security from the time of emergence of internet tothe present time. According to the author, emergence of the internet is the key enhancing factorfor the network security systems. This is due to the reason that, in the present business scenario,the majority of the network systems are being regulated online. Thus, the contemporary approachof the network system is much more effective as well as efficient for the business organizations.this article also discussed the importance about the intranet also along with the initiation of theinternet. According to the author, intranet for the internal communication system in the businessorganizations also helps in effectively manages the network system. The more will be theeffectiveness in the usage of the internet and other networking tools, the more will be theeffectiveness of the network system.
Standards, Ethics and Compliance: Article_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT20249 Cloud Computing Based Forensic Analysis
|6
|1603
|65

Cloud Computing Adoption Framework: A Security Framework for Business Clouds
|8
|1744
|83

Article on Network Security
|6
|1219
|38

Cloud Computing Security and Privacy
|7
|1639
|217

Advantages and Disadvantages of Cloud Computing for Businesses
|10
|1777
|149

Security, privacy and trust in cloud computing: A comparative
|5
|2306
|205