Annotated Bibliography for Network and Information Technology

Verified

Added on  2020/02/24

|6
|1219
|38
Annotated Bibliography
AI Summary
This annotated bibliography provides an overview of network and information technology security, drawing from several key articles. The bibliography begins by addressing the increasing security threats in the modern, internet-based world, emphasizing the growth of unethical practices like data theft and ransomware. It then delves into the nature of network security issues, highlighting the role of malware and hacking techniques. The authors also discuss the impact of these security breaches, including the theft of personal and organizational data, financial crises, and potential national security risks. The bibliography concludes with a discussion of potential solutions, such as the use of firewalls, antivirus software, and the need for organizations to revamp their IT models to reinforce cyber security options. The listed references provide a comprehensive view of the field.
Document Page
Running Head: NETWORK AND INFORMATION TECHNOLOGY
Annotated Bibliography
Name of the Student
Name of the University
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1NETWORK AND INFORMATION TECHNOLOGY
Annotated Bibliography
Article 1: Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security:
principles and practice (Vol. 6). London: Pearson.
According to this particular article, network security is an important part of modern
technology that is based on the internet and the virtual world. With the massive advancement of
modern computing and information technology, the security threats are also increasing day by
day. Hence, they have reiterated their concern regarding the situation of network security in the
current world. They expressed in their works that network security issues are the fastest growing
problems in the modern technology as the unethical users of the internet are using unethical
techniques to steal information from other organizations or entities. Sometimes, the information
is used as a medium for ransom.
Article 2: Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private
communication in a public world. Pearson Education India.
In this article, the authors have emphasized their works mainly on the nature of the
network security issues that are consistently threatening the world technology at the current time.
They said that the main security threat comes from the numerous malwares that are spread
throughout the internet in the forms of popups, website links, patch files and others by some
unethical users of the internet. These files have the capability to create malfunctions inside a
system or even destroy it in certain conditions. Although these files can be removed more or less
easily, there are massive threats as they go undetected most of the times while entering the
system.
Document Page
2NETWORK AND INFORMATION TECHNOLOGY
Article 3: Kahate, A. (2013). Cryptography and network security. Tata McGraw-Hill
Education.
The authors in their work emphasized on the subject of hacking that have become the
biggest threat to the online virtual world these days. Using strong hacking techniques, hackers
are able to access even the most secure information from different organizations and use them
for ransom or even sell them to the rival organizations in exchange of money. With the
development of technology, the technologies of the hackers are also advancing at an alarming
rate and as a result, they now have the power to take over the entire server of an organization,
even if it is for a few minutes. Within this small period of time, the hackers are able to extract the
secure pieces of information that are stored inside the server. Virtualization of the storage
systems has further attracted the attackers to steal the data and information. In exchange of
return, the hackers either claim large ransom or sell them to a rival organization.
Article 4: Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013).
Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
In this article, the authors have discussed about possible effects of these security issues
on the computing world. They have first raised the concern that the most basic level of effect is
the stealing of personal information of different persons for doing unethical works and
transactions with identity masking. However, they have expressed that the far reaching
consequences are even worse than this problem. Due to the hacking of the servers of different
private or government organizations, secure data and information are lost. While the business
and other similar data generates high sale or ransom values, the organization and eventually the
country faces economic crisis due to virtualization of the monetary unites. On the other hand,
Document Page
3NETWORK AND INFORMATION TECHNOLOGY
from government organizations, defense and security data can be stolen and might be sent to
rival countries by the hackers, resulting in the wars.
Article 5: Knapp, E. D., & Langill, J. T. (2014). Industrial Network Security: Securing
critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems.
Syngress.
The authors here have discussed about possible solutions for the network security issues.
They have advised the common and general users to use strong firewalls and antivirus security
softwares to protect the system. According to them, these will be more or less sufficient for home
connections. However, they also said that the large organizations need to revamp their existing
IT model and reinforce cyber security options before starting daily operations of business and
others.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4NETWORK AND INFORMATION TECHNOLOGY
References
Carter, K. M., Idika, N., & Streilein, W. W. (2014). Probabilistic threat propagation for network
security. IEEE Transactions on Information Forensics and Security, 9(9), 1394-1405.
Daya, B. (2013). Network security: History, importance, and future. University of Florida
Department of Electrical and Computer Engineering.
Durairajan, M. S., & Saravanan, R. (2014). Biometrics Based Key Generation using Diffie
Hellman Key Exchange for Enhanced Security Mechanism. International Journal of
ChemTech Research CODEN (USA): IJCRGG, 6(9), 4359-4365.
Gelenbe, E., Görbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., & Lyberopoulos,
G. (2013). NEMESYS: Enhanced network security for seamless service provisioning in
the smart mobile ecosystem. In Information Sciences and Systems 2013 (pp. 369-378).
Springer, Cham.
Kahate, A. (2013). Cryptography and network security. Tata McGraw-Hill Education.
Knapp, E. D., & Langill, J. T. (2014). Industrial Network Security: Securing critical
infrastructure networks for smart grid, SCADA, and other Industrial Control Systems.
Syngress.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory meets
network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication in a
public world. Pearson Education India.
Document Page
5NETWORK AND INFORMATION TECHNOLOGY
Shin, S., Wang, H., & Gu, G. (2015). A first step toward network security virtualization: from
concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10),
2236-2249.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and
practice (Vol. 6). London: Pearson.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]