Wednesday, May 6, 2020
Annoted Bibliography for Professional Development- myassignmenthelp
Question: Write about theAnnoted Bibliography for Professional Development. Answer: 1) Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., Hubaux, J. P. (2013). Game theory meets network security and privacy.ACM Computing Surveys (CSUR),45(3), 25. Authors have expressed their deep thoughts on the existing scenario of security and privacy, which is being brought into danger because of the advent of numerous technologies and computer applications. The increasing demand of contemporary business have attracted many software-developing companies to bring newest and updated version of different software in the market. An evident transition from manual works to computerised works has been observed in many companies in particular the multinational companies. In order to be competitive such companies look for various new opportunities in the form of software. Different multinational companies for an example use Enterprise Resource planning (ERP) system to increase their efficiency level in various important works such as sales and accounting related works. ERP provide multitasking capabilities to such companies; however, it also has some security related threats, which the authors have felt with all most computer application nowadays. Software developer can easily access to soft coded region where they can make unwanted changes, which may also be a fatal for the organisational performance. 2) Chen, Z., Han, F., Cao, J., Jiang, X., Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system.Tsinghua science and technology,18(1), 40-50. The use of internet has increased to a new level in nowadays. The advent of e-commerce has enhanced the use of internet to a next level. However, security related issues have now also become common with such advents. The use of e-commerce for various business purposes has enhanced the business success and the standard of customer service. However, on the other hand, it has also become a threatening platform for security related facts. Many customers do not even know that their important information might land into corrupted hands. Different malicious software is being prepared either to corrupt the data stored in the system or to collect the data of customers without giving any prior intimation to the customer. Software developing companies now have enhanced work demands, which include finding solution for the identified threat. Such software developing companies have now developed cloud based security system, which would collect necessary data on the suspicious threat by auctioning remotely from other end. Suspicious threats can now easily be traced with comparatively faster speed. 3) He, X., Chomsiri, T., Nanda, P., Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall.Future generation computer systems,30, 116-126. The firewall security used in the cloud security system was inefficient in mitigating the effect of threats on a large network. This is because of such reason the developing companies have now produced Tree-Rule firewall, which would be comparatively more secured than the existing firewall system. The latest firewall security has been tested by applying this on the Linux platform. The arrangement was tested on a regular network. The test has shown the validity of the new software. The newly launched platform offered enhanced security and the same has offered an improved functional speed than its predecessor. Additionally, it is easy to be created as well. This can be easily configured within the system without much hassle. Such speciality is more valid at some larger network such as the cloud network. 4) Inukollu, V. N., Arsi, S., Ravuri, S. R. (2014). Security issues associated with big data in cloud computing.International Journal of Network Security Its Applications,6(3), 45. Authors have argued that cloud computing is associated with many other issues and challenges as well. One of such issues is related with the Big Data, which is now largely used by different SMEs, multinational companies and industries. With the help of Big Data, different kinds of companies have enhanced their competitive skills at a larger speed. These software applications have now become a huge resource to enhance the competitiveness. To address this issue, software-developing companies have now become involved in developing solutions at rapid speed. This has also produced competition in between different companies that develops the different software. Big Data tool has a very important role in the output performance of cloud computing. With the help of Big Data, Cloud Computing provides solutions for security, data protection and related infrastructure. Nevertheless, cloud computing with the help of big data has constructed the probability to create promising feature in science. 5) Kumar, V., Jain, A., Barwal, P. N. (2014). Wireless sensor networks: security issues, challenges and solutions.International Journal of Information and Computation Technology (IJICT),4(8), 859-868. According to the authors, wireless sensor networks (WSN) are a promising technology. The emerging prospect for the technology has also brought researcher under ample of pressure for bringing solutions to the challenges that are certain with WSN. It also has wireless communication technology, which is a more threat to the application. One of the basic functions of WSN is to collect data from the physical world. WSN can work in any environment in particular such environment where wire connection is not possible. However, in such cases, the security related threats would also be at high stake. These are often used to sense the information of the targeted physical platform. Moreover, it is a battery-operated device, which has in it a sensor. It is loaded with many features such as communication mechanism and data processing. However, the authors have argued that it comes with many challenges as well. Such challenges would require an extensive work from the research team. References Ahmed, M., Hossain, M. A. (2014). Cloud computing and security issues in the cloud.International Journal of Network Security Its Applications,6(1), 25. Chen, Z., Han, F., Cao, J., Jiang, X., Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system.Tsinghua science and technology,18(1), 40-50. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing.Journal of Internet Services and Applications,4(1), 5. He, X., Chomsiri, T., Nanda, P., Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall.Future generation computer systems,30, 116-126. Inukollu, V. N., Arsi, S., Ravuri, S. R. (2014). Security issues associated with big data in cloud computing.International Journal of Network Security Its Applications,6(3), 45. Kumar, V., Jain, A., Barwal, P. N. (2014). Wireless sensor networks: security issues, challenges and solutions.International Journal of Information and Computation Technology (IJICT),4(8), 859-868. Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., Hubaux, J. P. (2013). Game theory meets network security and privacy.ACM Computing Surveys (CSUR),45(3), 25. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing.The Journal of Supercomputing,63(2), 561-592. Perlman, R., Kaufman, C. and Speciner, M., (2016).Network security: private communication in a public world. Pearson Education India. Rhodes-Ousley, M., (2013).Information security the complete reference. McGraw Hill Professional. Shin, S., Wang, H., Gu, G. (2015). A first step toward network security virtualization: from concept to prototype.IEEE Transactions on Information Forensics and Security,10(10), 2236-2249. Stallings, W., Tahiliani, M. P. (2014).Cryptography and network security: principles and practice(Vol. 6). London: Pearson.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.