logo

Annotated Bibliography On Network And Information Security Technologies

8 Pages1781 Words39 Views
   

Added on  2020-02-19

Annotated Bibliography On Network And Information Security Technologies

   Added on 2020-02-19

ShareRelated Documents
Running head: ANNOTATED BIBLIOGRAPHYAnnotated Bibliography on Network and information security technologiesName of the Student:Name of the University:
Annotated Bibliography On Network And Information Security Technologies_1
1ANNOTATED BIBLIOGRAPHYAnnotation 1: “Ab Rahman, N. H., & Choo, K. K. R. (2015). A survey of information security incidenthandling in the cloud.Computers & Security,49, 45-69.”In this article, Ab Rahman and Choo (2015) discussed the information security incidenthandling strategies in order to mitigate the risks regarding availability, confidentiality as well asintegrity of the organizational assets. The aim of this article is to contribute to knowledge gaps tohandle of incidents within cloud environment. The standards and guidelines are used to reviewexisting academic incident handling model. Four phases are discussed to handle the informationsecurity incidents handling such as preparation phase, in which the organizations are minimizingimpacts of security incidents. Detection and analysis phase detects the unusual events andreports. After the incidents are detected, an efficient response is undertaken. Proactive degree isso little that immediate activities are taken position. Suppression as well as recovery is therequired actions to be taken as incident responses. Post incident is a phase that contributes tofinal phase after the incidents are resolving. The information and internet users are facing oneand more security breaches. The breaches are unauthorized access to the information ofcustomers such as stealing of personal details and financial records of online login details. Usingthe triple R framework, the selected article is reviewed based on its relevance, reliability andreputable. The main limitation of this article is that a collaborative cloud incident managementplatform is not discussed to share information among various stakeholders, make easy real-timeincident handling as well as replies to the malicious cyber actions within synchronized time.
Annotated Bibliography On Network And Information Security Technologies_2
2ANNOTATED BIBLIOGRAPHYAnnotation 2:“Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of things:Perspectives and challenges.Wireless Networks,20(8), 2481-2501.”In this article, Jing et al., (2014) analyzed that internet of things (IoT) plays a keysignificant role and its security is important. IoT is to be building on basis of internet, andtherefore the security problems are also show up into IoT. This particular article providesrelevant information on security harms of each layer and tries to locate out innovative problemsas well as results. It was found that at last this paper investigates the security issues among IoTas well as traditional network, and discussed of opening security issues among IoT.Standardization of the awareness of data processing for potential IoT is greatly preferred.Hackers, malicious software and also viruses into communiqué channel can disturb the data andinformation truthfulness. Expansion of IoT technology can directly threat the overall IoT system.Protection over data and security is one of the key applications challenges for the IoT. Three ofthe IoT layers are analyzed with its key security problems of each layer. The future direction ofthis paper is to revise lightweight solutions for IoT system such as access confirmation anddirect. The limitation is lot of discussion is not there on network control technologies.
Annotated Bibliography On Network And Information Security Technologies_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
COIT20249 Rahman and Choo- Annotated Bibliography
|5
|1048
|35

Annotated Bibliography on IoT
|6
|1249
|29

Security of Internet of Things - Issues, Vulnerabilities and Measures
|12
|555
|406

Cybersecurity Framework for Aviation Industry
|6
|860
|112

Using Block Chain Technology in IoT .
|6
|1301
|175

Security Issues in Cloud Computing- Document
|7
|1373
|77