Professional Skills Development Portfolio
VerifiedAdded on 2019/10/30
|7
|2157
|223
Portfolio
AI Summary
This portfolio presents a collection of research papers analyzing various aspects of data security within cloud computing and big data environments. The student examines the vulnerabilities and challenges associated with internet-based transactions, e-commerce, and the use of advanced technologies like Big Data and Wireless Sensor Networks. The analysis includes discussions on the limitations of traditional security measures like antivirus software and the need for more robust solutions such as firewalls (including the Tree-Rule firewall) and enhanced security protocols. The portfolio highlights the trade-offs between the benefits of technological advancements and the increased security risks they introduce, emphasizing the importance of continuous investment in updated security measures to maintain competitiveness in the market. The references cited demonstrate a thorough exploration of relevant literature on the subject.

Running head: PORTFOLIO
Professional Skills Development
[Portfolio]
Name of the student:
Name of the university:
Author note:
Professional Skills Development
[Portfolio]
Name of the student:
Name of the university:
Author note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1PORTFOLIO
1) Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game
theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Authors have expressed their deep concerns on the use of technology such as using internet in
most transactions. Authors have not neglected the importance of internet and technology.
This is because internet and technology has facilitated many works that is beyond
imagination with the manual type or working. However, their primary concerns are with the
disadvantages, which the internet or specifically the different technology has. Surprisingly,
using the latest and updated version of software has redefined the competition in the market.
Furthermore, those companies are more competitive that has advanced version of technology
in use in their operational practices. The culture is now difficult to overturn towards the
traditional format of operational style. However, it is advisable that firms have high
protection capacity while using such software. This is because of many reasons such as
software developer’s access to the “code region” where they can make unwanted changes.
Such changes might be unauthorised as well. Additionally, some other challenges are also
there such as spreading malwares to the system with the use of such technologies and
software. There is a threat of entrance of malware materials in the system through such
software. Such malware might hamper the performance of the system. An elevated exposure
to such threat might even corrupt the device, which would be a huge loss for the company, as
it would lose its important data. It is then very important that company must have some
counter solution against the probable threat that might come underway with the use of such
software.
2) Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based
forensic analysis for collaborative network security management system. Tsinghua
science and technology, 18(1), 40-50.
These authors have also agreed on a fact that the use of internet has reached to a different
level in nowadays. This has reached to a higher level with the advent of various internet
related business activities such as the use e-commerce for enhancing the sales and revenues.
The use of e-commerce has further the standard of customer service. The use of e-commerce
has facilitated the standard of customer service. Additionally, it has also produced many
challenges to the firms. One of such challenges is related with the payment security, which
has worsened the situation in nowadays. The challenge is even bigger to those firms as they
do not have any counter solution against the identified threats. In such circumstances, it is
1) Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game
theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Authors have expressed their deep concerns on the use of technology such as using internet in
most transactions. Authors have not neglected the importance of internet and technology.
This is because internet and technology has facilitated many works that is beyond
imagination with the manual type or working. However, their primary concerns are with the
disadvantages, which the internet or specifically the different technology has. Surprisingly,
using the latest and updated version of software has redefined the competition in the market.
Furthermore, those companies are more competitive that has advanced version of technology
in use in their operational practices. The culture is now difficult to overturn towards the
traditional format of operational style. However, it is advisable that firms have high
protection capacity while using such software. This is because of many reasons such as
software developer’s access to the “code region” where they can make unwanted changes.
Such changes might be unauthorised as well. Additionally, some other challenges are also
there such as spreading malwares to the system with the use of such technologies and
software. There is a threat of entrance of malware materials in the system through such
software. Such malware might hamper the performance of the system. An elevated exposure
to such threat might even corrupt the device, which would be a huge loss for the company, as
it would lose its important data. It is then very important that company must have some
counter solution against the probable threat that might come underway with the use of such
software.
2) Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based
forensic analysis for collaborative network security management system. Tsinghua
science and technology, 18(1), 40-50.
These authors have also agreed on a fact that the use of internet has reached to a different
level in nowadays. This has reached to a higher level with the advent of various internet
related business activities such as the use e-commerce for enhancing the sales and revenues.
The use of e-commerce has further the standard of customer service. The use of e-commerce
has facilitated the standard of customer service. Additionally, it has also produced many
challenges to the firms. One of such challenges is related with the payment security, which
has worsened the situation in nowadays. The challenge is even bigger to those firms as they
do not have any counter solution against the identified threats. In such circumstances, it is

2PORTFOLIO
necessary for the firms that either they approach the third party service providers or they
could purchase the software. The benefits of technology have come at the verge of security
related threats. Payment related issues could also hamper the customer service standard of the
specific companies. Additionally, malicious particles can also enter the computer system,
which might also corrupt the while device. This would be a loss of company’s important
private data. This would also hamper the performance of system. Authors have not ignored
the importance of software and technology; however, they have also not denied that it is
disadvantageous in many cases. Such disadvantages might lead to extra expenses, which
would reduce the revenues. Nevertheless, it is necessary for companies that it maintains an
elevated graph of revenues.
3) He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security
using the Tree-Rule firewall. Future generation computer systems, 30, 116-126.
These authors have argued that even the security related software finds thing difficult to
protect the system from the hackers or data security hackers. The authors have produced
some supportive evidences as well. They have said that normal antivirus is not sufficient,
which is why it becomes difficult to prevent the system from such professional hackers or
from the malicious particles. In such case, companies sense the requirement to purchase and
install the firewall security application on the system in order to protect the system from any
malicious attacks. This is effective also as it has many security related aspects, which also
include but are not limited to such as protecting email from phishing. Major malicious
particles are left in the form of fishing that gets accumulated with the emails and hampers the
system. It may also damage the system, which would be a loss of an entire system as well as
company’s important data. Firewall security is expensive as well. Despite the benefits that it
has, it also fails in complicated cases. This is why new firewall security is being produced,
which is Tree-Rule firewall. It has already been tested on the Linux platform. The authors
have found this as more effective than the normal firewall security. It also improves the speed
of the process, which is better than its earlier version. It is very easy to use as well. It can be
easily configured into the system. It is highly effective in larger network such as the cloud
network.
4) Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big
data in cloud computing. International Journal of Network Security & Its
Applications, 6(3), 45.a
necessary for the firms that either they approach the third party service providers or they
could purchase the software. The benefits of technology have come at the verge of security
related threats. Payment related issues could also hamper the customer service standard of the
specific companies. Additionally, malicious particles can also enter the computer system,
which might also corrupt the while device. This would be a loss of company’s important
private data. This would also hamper the performance of system. Authors have not ignored
the importance of software and technology; however, they have also not denied that it is
disadvantageous in many cases. Such disadvantages might lead to extra expenses, which
would reduce the revenues. Nevertheless, it is necessary for companies that it maintains an
elevated graph of revenues.
3) He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security
using the Tree-Rule firewall. Future generation computer systems, 30, 116-126.
These authors have argued that even the security related software finds thing difficult to
protect the system from the hackers or data security hackers. The authors have produced
some supportive evidences as well. They have said that normal antivirus is not sufficient,
which is why it becomes difficult to prevent the system from such professional hackers or
from the malicious particles. In such case, companies sense the requirement to purchase and
install the firewall security application on the system in order to protect the system from any
malicious attacks. This is effective also as it has many security related aspects, which also
include but are not limited to such as protecting email from phishing. Major malicious
particles are left in the form of fishing that gets accumulated with the emails and hampers the
system. It may also damage the system, which would be a loss of an entire system as well as
company’s important data. Firewall security is expensive as well. Despite the benefits that it
has, it also fails in complicated cases. This is why new firewall security is being produced,
which is Tree-Rule firewall. It has already been tested on the Linux platform. The authors
have found this as more effective than the normal firewall security. It also improves the speed
of the process, which is better than its earlier version. It is very easy to use as well. It can be
easily configured into the system. It is highly effective in larger network such as the cloud
network.
4) Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big
data in cloud computing. International Journal of Network Security & Its
Applications, 6(3), 45.a
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3PORTFOLIO
These authors have taken a different route by stating the importance of Big Data. According
to the authors, Big Data is now much in practice, which is serving the purpose of different
organisations across the globe. These authors have gone towards a different direction with
one of the benefits of the science and the technology. They have gone differently and
supported the importance of different software in the betterment of business performance.
Indeed, they have believed that different software and their different applications have
brought prosperity to many. One of such application is Big Data, which enhances the
efficiency of the cloud based data management. The output performance of cloud computing
depends on the efficiency of the Big Data application. These authors have viewed Big Data
and many other like this as a good resource to penetrate deep into the market and gain more
competitive advantage. According to the authors, the desire to have a superior data
management and to deliver an utmost performance, every single organisation has their
varying faiths on the different available software. The selection of the different software
depends highly on the investments needed to purchase the required software. For example,
multinational companies use Enterprise Resource Planning (ERP) for enhancing their
customer service standard, improving their sales tracking, bettering the coordination with the
sales staffs, responding to the customer’s requirement in real time and preventing the stock
from unnecessary wastages. However, using ERP is an unaffordable choice for many SMEs.
They rely on a customised solution to enhance the customer service standard and improve the
other services.
5) Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security
issues, challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
These authors have followed the same path by stating the importance of technology solutions
in order to attain an enhanced competitiveness. These authors have discussed about the
Wireless Sensor Networks (WSN), which is according to the authors is a seamless option to
improve the performance. A wireless sensor network is useful for such environment where
wired networks cannot be established. In a forest for example, wired networks are
impossible; however, a wireless network is very much possible. In other case where there is
required a dense set up of wired networks, it would consume a huge amount to the
installation. However, if wireless nodes are applied in those area, this would be much safer
and less expensive. However, it has some limitations as well. It has limited battery capacity,
which makes this challenging to recharge the battery especially in the areas that are far away
These authors have taken a different route by stating the importance of Big Data. According
to the authors, Big Data is now much in practice, which is serving the purpose of different
organisations across the globe. These authors have gone towards a different direction with
one of the benefits of the science and the technology. They have gone differently and
supported the importance of different software in the betterment of business performance.
Indeed, they have believed that different software and their different applications have
brought prosperity to many. One of such application is Big Data, which enhances the
efficiency of the cloud based data management. The output performance of cloud computing
depends on the efficiency of the Big Data application. These authors have viewed Big Data
and many other like this as a good resource to penetrate deep into the market and gain more
competitive advantage. According to the authors, the desire to have a superior data
management and to deliver an utmost performance, every single organisation has their
varying faiths on the different available software. The selection of the different software
depends highly on the investments needed to purchase the required software. For example,
multinational companies use Enterprise Resource Planning (ERP) for enhancing their
customer service standard, improving their sales tracking, bettering the coordination with the
sales staffs, responding to the customer’s requirement in real time and preventing the stock
from unnecessary wastages. However, using ERP is an unaffordable choice for many SMEs.
They rely on a customised solution to enhance the customer service standard and improve the
other services.
5) Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security
issues, challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
These authors have followed the same path by stating the importance of technology solutions
in order to attain an enhanced competitiveness. These authors have discussed about the
Wireless Sensor Networks (WSN), which is according to the authors is a seamless option to
improve the performance. A wireless sensor network is useful for such environment where
wired networks cannot be established. In a forest for example, wired networks are
impossible; however, a wireless network is very much possible. In other case where there is
required a dense set up of wired networks, it would consume a huge amount to the
installation. However, if wireless nodes are applied in those area, this would be much safer
and less expensive. However, it has some limitations as well. It has limited battery capacity,
which makes this challenging to recharge the battery especially in the areas that are far away
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4PORTFOLIO
from the cities. However, it is understood as the backbone to the technology known as
“Internet of Things”. These authors have supported the inventions of different technologies in
order to attain maximise competition, which according to the author’s views is necessary to
stay healthy in the competition. However, they have not denied the importance of threats and
challenges that are common with such technology. It is necessary for the company that it
continuously updates their services and invests a little high in purchasing a better product. In
other words, they need to be compatible with the different software application. They require
to be compatible with the different security related threats such as phishing.
from the cities. However, it is understood as the backbone to the technology known as
“Internet of Things”. These authors have supported the inventions of different technologies in
order to attain maximise competition, which according to the author’s views is necessary to
stay healthy in the competition. However, they have not denied the importance of threats and
challenges that are common with such technology. It is necessary for the company that it
continuously updates their services and invests a little high in purchasing a better product. In
other words, they need to be compatible with the different software application. They require
to be compatible with the different security related threats such as phishing.

5PORTFOLIO
References
Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Applications, 6(1), 25.
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic
analysis for collaborative network security management system. Tsinghua science and
technology, 18(1), 40-50.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of Internet Services and
Applications, 4(1), 5.
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using
the Tree-Rule firewall. Future generation computer systems, 30, 116-126.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in
cloud computing. International Journal of Network Security & Its Applications, 6(3),
45.
Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security issues,
challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory
meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
Perlman, R., Kaufman, C. and Speciner, M., (2016). Network security: private
communication in a public world. Pearson Education India.
Rhodes-Ousley, M., (2013). Information security the complete reference. McGraw Hill
Professional.
References
Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the
cloud. International Journal of Network Security & Its Applications, 6(1), 25.
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic
analysis for collaborative network security management system. Tsinghua science and
technology, 18(1), 40-50.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An
analysis of security issues for cloud computing. Journal of Internet Services and
Applications, 4(1), 5.
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using
the Tree-Rule firewall. Future generation computer systems, 30, 116-126.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in
cloud computing. International Journal of Network Security & Its Applications, 6(3),
45.
Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security issues,
challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory
meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
Perlman, R., Kaufman, C. and Speciner, M., (2016). Network security: private
communication in a public world. Pearson Education India.
Rhodes-Ousley, M., (2013). Information security the complete reference. McGraw Hill
Professional.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6PORTFOLIO
Shin, S., Wang, H., & Gu, G. (2015). A first step toward network security virtualization: from
concept to prototype. IEEE Transactions on Information Forensics and
Security, 10(10), 2236-2249.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and
practice (Vol. 6). London: Pearson.
Shin, S., Wang, H., & Gu, G. (2015). A first step toward network security virtualization: from
concept to prototype. IEEE Transactions on Information Forensics and
Security, 10(10), 2236-2249.
Stallings, W., & Tahiliani, M. P. (2014). Cryptography and network security: principles and
practice (Vol. 6). London: Pearson.
1 out of 7
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.