Annotated Bibliography: Key Topics in Information Security

Verified

Added on  2020/02/24

|8
|2183
|268
Annotated Bibliography
AI Summary
This annotated bibliography provides a comprehensive overview of key research papers and articles in the field of information security. The bibliography covers a wide range of topics, including cyber attacks, risk management, cloud computing, big data's impact on security, and the importance of security policies. Each entry summarizes the main arguments, methodologies, and findings of the referenced work, providing insights into the evolving landscape of information security. The included references discuss various aspects of information technology organizations, from the cyber attack on Saudi Aramco to the security in cloud computing. Several papers focus on cyber attack detection strategies, cyber situational awareness, and the transformation from information security to cybersecurity. Other topics include encryption, employee adherence to security policies, and the use of cloud computing and big data to enhance security. The bibliography offers a valuable resource for anyone seeking to understand the current state of information security research and its practical implications.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: ANNOTATED BIBLIOGRAPHY FOR INFORMATION SECURITY
ANNOTATED BIBLIOGRAPHY FOR INFORMATION SECURITY
Name of the student
Name of the university
Author note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ANNOTATED BIBLIOGRAPHY FOR INFORMATION SECURITY
Reference 1: Bronk, C., & Tikk-Ringas, E. (2013). The cyber attack on Saudi Aramco. Survival,
55(2), 81-96.
In this book, Bronk and Tikk-Ringas have discussed about the several security issues for
the information technology organizations. The author has created this book on the basis of
several researches on the information security of different organizations. Author has done the
research on risk analysis and the possible threats for an organization. The main reasons behind
the risks are also given in the book and the ways for overcoming the risk factors are also
discussed in details. Risks are classified in different sections with respect to the occurrence and
those can be internal or external risks. Sometimes the risks are also increasing continuously as
they are created deliberately to make the organizations computing system more vulnerable. This
work is very useful on risk management for several information technology organizations. The
limitations of the small organizations on installing the software are also discussed as those are in
terms of huge cost and expenditure.
Reference 2: Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on
attack detection. Computers in Human Behavior, 48, 51-61.
In this book, Ben-Asher and Gonzalez have discussed about the security issues related to
the information technology. The authors have found the information regarding the topic on the
basis of several research works and practical cases in which organization have faced different
cyber attacks. As the role of information technology is becoming more important in case of
providing services to the people, the number of cyber attacks is also increasing with respect to
time. There are many examples of cyber attacks in the organizations. The main cyber attacks are
generated by the hackers. Several viruses and malware are also responsible for creating several
Document Page
2ANNOTATED BIBLIOGRAPHY FOR INFORMATION SECURITY
cyber threats to the computer and network system. Due to several attacks of the viruses the
public information can be really in danger. Also the main disadvantages regarding the cyber
attack are given in terms of making the system more vulnerable. The acknowledgement about the
risk factors will help to understand the possible harms of the information technology system.
Reference 3: Raiyn, J. (2014). A survey of cyber attack detection strategies. International
Journal of Security and Its Applications, 8(1), 247-256.
In this book, Raiyn has written about several strategies which are successfully used to
detect the cyber attack in the organizations dealing with cyber security. The author has written
the book on the basis of his research work based on several case studies and the regulations and
standards given by several international organizations and governments. The organizations
should follow the regulations and the standards which are discussed in the book to overcome all
the possible risk factors and threats. With the advancement of internet and information
technology the amount of online services are increasing day by day. To maintain the security of
the organization and public information in case of several transactions, the regulations should be
followed carefully. It is also seen that the organizations have been benefited in increasing the
customer satisfaction and reliability by implementing the standards, regulations discussed in the
book and these are more effective against cyber attacks.
Reference 4: Franke, U., & Brynielsson, J. (2014). Cyber situational awareness–a systematic
review of the literature. Computers & Security, 46, 18-31.
In this book, Franke and Brynielsson have demonstrated about the various cyber
situational awareness programs which can be designed and applied in case of maintaining the
security of the organization. Author has got the idea about it by doing many researches on the
Document Page
3ANNOTATED BIBLIOGRAPHY FOR INFORMATION SECURITY
practical cases related to the cyber security of the systems and also the reasons for the attacks.
Many cyber security issues are foun d due to the attacks on the network system of the computing
system.The main advantage of making the system more advanced in network system is that the
organizations can be sure about the security of their system. Viruses and malwares are shared
and distributed in the network system very easily so that the system can become malicious. There
are many network systems which can be utilized to increase the security of the system and those
are IPV4 and IPV6 network protocols. There are also many records of the network systems
which are found to be more advanced in terms of security for the computer system used in
several organizations.
Reference 5: Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber
security. computers & security, 38, 97-102.
In this book, Von Solms and Van Niekerk have discussed about the transformation and
the expansion of the cyber security system from the information security system. Author has
collected the information from various case studies and also different research works related to
the cyber security. In case of information technology several techniques are usqed like
encryption. In modern days the hackers are not only making target to the information but also to
the servers and organizational database. Hackers are also attacking common people’s computers
to get more resources from them. Different protocols and standards are maintained in order to
make the security system more advanced for the reliability. SSL technology is used for the
security of the computer system. It helps to oppose the security issues related to the software as
well as physical parts of the computer system from the attack of malicious software. In recent
days the cyber security has created a lot of features which were not present in case of
information security.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ANNOTATED BIBLIOGRAPHY FOR INFORMATION SECURITY
Reference 6: Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., & Waters, B. (2016).
Candidate indistinguishability obfuscation and functional encryption for all circuits. SIAM
Journal on Computing, 45(3), 882-929.
In this book, Daemaen and Rijmen have discussed about the encryption technology on
the basis of the security aspects of the organizations dealing with a large amount of information.
The authors have created this book by doing studies on various research works and also from
many practical cases. To increase the security in the computer system it is very important to
make sure about the security of the data as it is of very confidential nature. Encryption is a
method by which the information is converted into codes which cannot be read by the unwanted
people who cannot decrypt the codes without the permission from the encoder of the
information. Encryption was previously used in war to transfer data in a coded language. The
main advantage of making the system more advanced about the security is to make all the
information well encrypted. It is seen in many cases that several data loss have been reported due
to the advancement of the encryption technology.
Reference 7: Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing:
Opportunities and challenges. Information Sciences, 305, 357-383.
In this book, Rittinghouse and Ransome have discussed about the security aspects related
to the cloud computing of an organization dealing with information technology. Authors have
found the information from several research works and practical case studies. The main
advantage of cloud computing is that the huge processing power of the cloud is shared among
various computers of the organizations and also the main advantage of implementing the cloud
computing is that it can make the system more advanced in decision making and data analysis. It
Document Page
5ANNOTATED BIBLIOGRAPHY FOR INFORMATION SECURITY
is seen that in many computing system the application of the cloud computers are being done to
overcome the security related issues related to the organizations. Due to the use of the cloud,
computing software is more advanced in tacking the malware and the virus in the main
computing system. The main effect of the security aspects related to the cloud computing can be
utilized in a greater margin.
Reference 8: Siponen, M., Mahmood, M. A., & Pahnila, S. (2014). Employees’ adherence to
information security policies: An exploratory field study. Information & management, 51(2),
217-224.
In this book, Andress has discussed about the security policies in an organization which
are responsible for the internal information security of the organisation. The author has created
this book on the basis of several researches on the information security of different
organizations. Author has done the research on risk analysis and the possible threats for an
organization. The main reasons behind the risks are also given in the book and the ways for
overcoming the risk factors are also discussed in details. In many cases it is seen that the
organizations have faced a lot of cases where the employees have deliberately created a lot of
issues regarding the information security of the organization. There are also many cases have
been found in which people have violated the laws related to the organizational security for their
own interests and also they have created real threats to the organization. As a result the
organizations have created many new regulations which are important for the betterment of the
organizational security.
Reference 9: Bera, S., Misra, S., & Rodrigues, J. J. (2015). Cloud computing applications for
smart grid: A survey. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1477-1494.
Document Page
6ANNOTATED BIBLIOGRAPHY FOR INFORMATION SECURITY
In this article, Almorsy, Grundy and Muller have discussed about the security features
provided by the cloud platform for increasing the security of the organizations and also its
implementations in new technologies like smart grids. Authors have found the information from
several research works and practical case studies. The main advantage of cloud computing is that
the huge processing power of the cloud is shared among various computers of the organizations
and also the main advantage of implementing the cloud computing is that it can make the system
more advanced in decision making and data analysis. It is seen that in many computing system
the application of the cloud computers are being done to overcome the security related issues
related to the organizations. Due to the use of the cloud, computing software is more advanced in
tacking the malware and the virus in the main computing system. Cloud computing provides a
centralized processing unit and for this reason organizations do not need to rely upon other
sources which can create threats to their computer system.
Reference 10: Kshetri, N. (2014). Big data׳ s impact on privacy, security and consumer welfare.
Telecommunications Policy, 38(11), 1134-1145.
In this article, Ksheri has discussed about the security of the organizations on the
basis of the application of big data. The author has collected the information from various
research works and from several case studies. The big data analysis is important for the
advancement of the security system. Organizations which deal with a large amount of
information need the analytical help of big data so that the security of the organization is
maintained. Big data also uses various approaches like statistical and analytical approaches so
that the data can be used with more compact and faster response. For dealing with the increasing
requirements from customers big data helps a lot to ensure the effectiveness of the functioning of
the information. The main reasons behind the risks are also given in the book and the ways for
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7ANNOTATED BIBLIOGRAPHY FOR INFORMATION SECURITY
overcoming the risk factors are also discussed in details. Risks are classified in different sections
with respect to the occurrence and those can be internal or external risks. Sometimes the risks are
also increasing continuously as they are created deliberately to make the organizations
computing system more vulnerable. This work is very useful on risk management for several
information technology organizations. Big data takes an important role in risk management also
by several analytical methods.
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]