Cybersecurity Research Portfolio - Security Analysis Report

Verified

Added on  2020/06/05

|4
|1098
|141
Report
AI Summary
This report provides an analysis of several research papers focused on cybersecurity. The papers cover various aspects including white-box cryptography, which addresses security concerns in software applications, particularly when dealing with potential adversaries. Another paper examines privacy-preserving multi-keyword ranked search over encrypted cloud data, highlighting the importance of cloud security features. The research also delves into the security of the Internet of Things (IoT), identifying challenges and perspectives in this evolving field. Additionally, the report explores the distinction between information security and cybersecurity, emphasizing the broader scope of the latter. Finally, it examines the application of game theory in network security and privacy, demonstrating its effectiveness in addressing security problems across different categories, including cryptography and intrusion detection systems. This portfolio offers a comprehensive overview of current research and its implications for future security measures.
Document Page
Item4—Portfolio
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Beunardeau, M., Connolly, A., Géraud, R., & Naccache, D. (2016). White-Box
Cryptography: Security in an Insecure Environment. IEEE Security & Privacy. 14(5). 88-
92.
The research is focused on implementation of public cryptographic that works when key
secret is stored in secured environment. However, there are issued identified in when adversaries
penetrate the environment. In this context, white-box cryptography (WBC) is an effective layer
of protection at software level. As per the research conducted by these authors, it can be stated
that there are different set of changes that has taken place in relation with technology. Themes
that are covered includes WBC, communication activities and software applications.
Organizations or businesses interact with the help of application or web browsers on host
services or mobile devices. This has highly boosted up the growth and contributed effectively in
connecting with customers and enable the environment to get connected to each other. In this
context, for security protection, highly exposed environments employ WBC. Further, this
research shows that end users are directly exposed to application software host in business. WBC
is used in order to reduce the rate of hacks and it is an attempt to stay one step ahead of attackers.
Consideration are made for both traditional and latest techniques of WBC. It is essential to have
proper information about the different type of security that enable to protect valuable data.
Cao, N. & et.al., (2014). Privacy-preserving multi-keyword ranked search over encrypted
cloud data. IEEE Transactions on parallel and distributed systems. 25(1). 222-233.
The present research is based on the privacy and security features provided into cloud
data. Through the help of this journal, the security features of cloud service is focused. The local
data storage options are not able to manage large amount of data, along with this advance
encryption and description techniques are cannot be implemented on them. It is creating
problems related to the data security. On the other hand with the help of cloud computing access
of the data can be monitored. It helps in maintaining the effectiveness of data and reduces the
chances of data breach. It consists of high tech security features due to which security form
multi-keywords can be provided. It reduces the possibilities of third party data breach activities.
Along with this it also improves the searching experience of an individual by providing effective
ranking to the keys. It represents that cloud security is able to provide better data security
compare to other platforms.
1
Document Page
Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., & Qiu, D. (2014). Security of the internet of
things: Perspectives and challenges. Wireless Networks. 20(8). 2481-2501.
The selected research aims at determining the security to internet and the challenges and
perspective or individuals. In accordance with the research conducted by these authors, it is
being identified that (IoT) Internet of Things is an important aspect that is helpful enough to have
traditional equipment like RFID and WSNs. In spite of having all the potentials there are many
challenges that are faced by organizations. In this context, there are three different layers which
are application, transportation and perception layer. For each of the layer there are certain set of
issues. As part of result, it is identified that all the security related service providers working
within the firm and they should have proper understanding of all the changes. Accordingly
proper steps should be taken to over come them. In addition to this, there is relationship
discussed between traditional networking and IoT. This shows that both are highly effective to
protect
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security. 38. 97-102.
Research aims at identifying the cyber security in order to reduce the rate of problems. As
per the findings made by these authors, it can be stated that there are two terms that are used in
this area and they are not changeable. These are information security and cyber security. The
paper argues that these two terms are different but these are not analogous. Among these two
terms, cyber security goes beyond boundaries of traditional information security . In this context,
it not only provide protection for information resources and also considers other assets. On the
other hand, information security is related with the human factor which determines the human
roles in process of security. These has ethical implication for the society as a whole. Both these
are highly helpful to make sure that business information is properly maintained and these no
type of challenges that are faced by them.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory
meets network security and privacy. ACM Computing Surveys (CSUR). 45(3). 25.
2
Document Page
Research focus on determining the importance of game theory in order to meet network
privacy and security. As per the research conducted by these authors, focus is made on privacy
and security in communication and computer networks which make use of game theoretic
approach. Themes in this research include game theoretic approaches, network security, and
security problems. There are six different type of categories in which the research is presented.
In this context, it includes cryptography, economics of network security, privacy and anonymity,
intrusion detection systems, security of physical and MAC layers and security of self organizing
networks. In this research there are identification of security problems in all these six categories.
To provide proper security top organization and individuals, game theoretic methods are used.
These are highly beneficial for the business and protection information. Focus is make in which
enhanced understanding is made for applying game theoretic methods for network security.
3
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]