ITC571 - Literature Review: Automated Secure Monitoring System

Verified

Added on  2024/05/16

|76
|8401
|176
Literature Review
AI Summary
This literature review examines automated secure monitoring systems, focusing on their application within the context of a CSU library. It analyzes various approaches, including two-factor authentication, cloud computing, and searchable encryption with authorization. The review assesses the goals, processes, advantages, and disadvantages of each solution, highlighting key components, impact factors, and potential improvements. Specific technologies like AES encryption and cloud services (IaaS, PaaS, SaaS) are discussed, along with their implications for data security and access control. The review concludes by critically evaluating the effectiveness of these solutions in securing the CSU library environment and identifies areas for future research and development. Desklib provides access to this and other solved assignments for students.
Loading PDF…
[object Object]