Professional Skills for ICT: Network Security Analysis Report

Verified

Added on  2020/02/24

|9
|2089
|35
Report
AI Summary
This report provides an analysis of various network security issues and potential solutions, drawing on a selection of academic articles. The report explores key challenges such as botnet attacks, cloud computing security, and vulnerabilities in wireless sensor networks. It examines the use of technologies like Unified Threat Management (UTM), Tree-Rule firewalls, and cryptography to enhance security. The report also addresses security concerns related to big data management and network virtualization. The sources used include articles from journals like the Journal of Internet Services and Applications, International Journal of Network Security & Its Applications, and IEEE Transactions on Information Forensics and Security. The report highlights the importance of robust security measures in the face of evolving threats and the need for proactive strategies to protect data and systems. The report also covers topics such as cloud computing, big data security, network virtualization, and wireless sensor networks, drawing from secondary sources to offer a comprehensive overview of the current landscape of network security.
Document Page
Running head: PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
Professional Skills for Information and Communication Technology
Student’s name:
Name of the university:
Author’s note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
1.
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic
analysis for collaborative network security management system. Tsinghua science and
technology, 18(1), 40-50.
In this article, Zhen Chen, Fuye Han, Junwei Cao, Xin Jiang and Shuo Chen stated about
network security problem that causes major security concern. Most of the network security
breaches occur due to the phishing, spam, worms. The authors explained that new botnet attacks
can further degrade the security network. This article provides a solution based on Unified
Threat Management (UTM) as it connects the protocol and exchange network events. Key
themes of this article are cloud computing, computer forensic, overlay network and botnet. This
article has been taken the information through secondary sources. This article is relevant to the
case study as it discusses network security system and the article has been written by famous
writers and published by IEEE.
2.
Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud.
International Journal of Network Security & Its Applications, 6(1), 25.
Authors explained in this article about network security and infrastructural concept of
cloud computing. Global companies are taking help of cloud computing in network security and
it completely depends on network architecture. Numerous cloud based services are provided by
cloud and this article is perfect for case study as it states that security system is not robust and
one can make it consistent and secure. Moreover, this article is relevant as it is related to
computing concept of cloud computing. The authors collected the data from credible secondary
Document Page
2
PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
sources. Key themes of this article are cloud services, network security and computer network
and distributed computing. This article has been written by famous senior lecturer and
consultants Monjur Ahmed and Mohammad Ashraf Hossain.
3.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory meets
network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
This study provides a comprehensive and structured overview of network security and
privacy of computer networking. Most importantly, this article primarily focuses on game
theory. This article is a kind of exploratory article that tests some security and privacy issues
through game theory. This article is relevant to the case study as it deals with network security
and solutions towards it. Authors summarise the results of the tests and this article has taken the
information from secondary sources. The article explains the terms like algorithms, design,
security and economics. The authors are well known in their field of teaching and distinct
universities from Australia, Switzerland and USA.
4.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of
security issues for cloud computing. Journal of Internet Services and Applications, 4(1),
5.
This article has been published by reputed Springer publication and authors are Keiko
Hashizume and others. The key themes of this article are cloud computing, security, SPI (SaaS,
PaaS, Iaas) model, threats in network and countermeasures for those. This article is relevant for
Document Page
3
PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
the case study as cloud computing is one of the emergent technologies that could help in network
security. The authors took help from secondary sources. This article can be reliable as it provides
information on network security of Service Oriented Architecture, host application, data levels
and network.
5.
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using the
Tree-Rule firewall. Future generation computer systems, 30, 116-126.
This article is based on the subject of electrical engineering and computer science;
however, mathematical ideas have been specified. This article has been published by the famous
University of Twente. Most importantly, the authors used Listed-Rule firewalls. Various benefits
of cloud networks and network security have been specified in this task. Tree-Rule firewalls
provide network security and it is proved by mathematical solutions. This article is relevant for
the case study as it deals with network security and authors have taken ideas from secondary
sources. Distinct differences have been made between Listed-Rule firewall and Tree-Rule
firewall.
6.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
In this article, authors averred the concept of cloud computing in network security issues
with flexible infrastructure investment. This article has been published by University of London
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
Institutional Repository. The authors used the key themes like network protocol, vulnerabilities
of cloud computing as it stores the data. The authors demanded that 91% of the European large
organisation start using cloud storage for network security. This article is relevant as it states
about computing resources and security issues. In case of network security, this article provides
the solution of virtualization, privacy system and cloud computing. This article is reliable as the
authors used the data through credible secondary sources.
7.
Kumar, S. N. (2015). Review on Network Security and Cryptography. International Transaction
of Electrical and Computer Engineers System, 3(1), 1-11.
This research article is about data security process used by various transactions through
digital media. The electronic transaction process is used by e-commerce, organisational
transaction and social networks. The author discusses the process cyber-criminals are used in
data theft. The cryptography is controlled by network administrator and the process of data
security does not only consist of the end system. This article is reliable as it is e-version of the
article and the author uses various sources of secondary information. This article is relevant as it
deals with network security with a broad range of cryptographic algorithms. The author uses
networking application with various figures showing process of using.
8.
Shin, S., Wang, H., & Gu, G. (2015). A first step toward network security virtualization: from
concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10),
2236-2249.
Document Page
5
PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
This article starts with a notion that network security is getting more vulnerable as
security devices are being hacked. The authors used prototype system in order to provide
network security design called NetSecVisor. Network Security Virtualization (NSV) is the core
concept of this article. This article is relevant as this one deals with network security and its
countermeasures and networking. Key themes of this article are security response functions and
prototype concept to gather results. This article is reliable as it uses vast sources of secondary
information and has been published by IEEE.
9.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in
cloud computing. International Journal of Network Security & Its Applications, 6(3), 45.
This article is about recent issues in security management as it deals with big data and
cloud computing. Moreover, authors stated the security issues that are associated with big data
management, a giant storage of data. Data breach recently occurs in big data management. Most
significantly, this article states solutions to the network security. The concept of Map Reduce,
Hadoop Distributed File Systems has been discussed. This article is relevant to the case study as
it deals with network security solutions. This article is reliable as the authors are lecturers in
Texas University and the journal has been published by IJSNA.
10.
Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security issues,
challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
Document Page
6
PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
The concept that has been discussed in this article is different as it talks about wireless
network and security breaches of these. The authors stated that Wireless Sensor Network (WSN)
is not secure from data theft. This article also talks about security solution using various
applications. This article is relevant to the case study as it deals with a security application that
could be useful in security issues in WSN. The authors took the ideas from secondary sources
and they used descriptive design technique. Moreover, this article is reliable as the authors are
reputed and have been published by International Research Publication House.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
Reference List
Ahmed, M., & Hossain, M. A. (2014). Cloud computing and security issues in the cloud.
International Journal of Network Security & Its Applications, 6(1), 25.
Chen, Z., Han, F., Cao, J., Jiang, X., & Chen, S. (2013). Cloud computing-based forensic
analysis for collaborative network security management system. Tsinghua science and
technology, 18(1), 40-50.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of
security issues for cloud computing. Journal of Internet Services and Applications, 4(1),
5.
He, X., Chomsiri, T., Nanda, P., & Tan, Z. (2014). Improving cloud network security using the
Tree-Rule firewall. Future generation computer systems, 30, 116-126.
Inukollu, V. N., Arsi, S., & Ravuri, S. R. (2014). Security issues associated with big data in
cloud computing. International Journal of Network Security & Its Applications, 6(3), 45.
Kumar, S. N. (2015). Review on Network Security and Cryptography. International Transaction
of Electrical and Computer Engineers System, 3(1), 1-11.
Kumar, V., Jain, A., & Barwal, P. N. (2014). Wireless sensor networks: security issues,
challenges and solutions. International Journal of Information and Computation
Technology (IJICT), 4(8), 859-868.
Manshaei, M. H., Zhu, Q., Alpcan, T., Bacşar, T., & Hubaux, J. P. (2013). Game theory meets
network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25.
Document Page
8
PROFESSIONAL SKILLS FOR INFORMATION AND COMMUNICATION
TECHNOLOGY
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security
issues and solutions at different layers of Cloud computing. The Journal of
Supercomputing, 63(2), 561-592.
Shin, S., Wang, H., & Gu, G. (2015). A first step toward network security virtualization: from
concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10),
2236-2249.
chevron_up_icon
1 out of 9
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]