Wednesday, December 11, 2019

Survey of Information Security System †Free Samples to Students

Question: Discuss about the Survey of Information Security System. Answer: Introduction: In this article Rahman and Choo (2015) discusses about the ways of handling incidence arising from lack of security for the availability of the assets in the organization. The writer of the article are from information security department of University f South Australia and University of Tun Hussein Onn Malaysia. The survey was done by analyzing the literature of existing reports about the incidence handling with the help of cloud computing. They further proposed the writers conducted a cloud incident handling model and an open research. Cloud computing management is one of the most recent technologies used to secure the information within the organization. Thus, it is reliable to depend on the research conducted and it is also relevant as it is one of the most demanding topics. The main limitation of the research was that it did not considered any experimentation about the real world usage of cloud computing. Jing et. al. (2014) has evaluated in their article about the increasing use of Internet in all the activities of the world from household task to professional task. The writers of the article are professors in different university of China and Kuwait. The paper used literature to analyze the problem of security arising from the internet usage and offered a descriptive framework about the security issues. Internet is highly used by everybody in todays world and it is essential for any organization to analyze the threat arising from the usage of this technology. Thus, carrying out a research in this field is advantageous and demanding in the fast expanding environment. The main limitation put forward in this article is that it failed to carry out a primary survey to analyze the thinking about the security of Internet of Things (IoT). Dumais et al (2016) in his article has discussed about the importance of information technology system used in the organizations and the privacy it gives to the data stored through this system. The writers of the article are professors of various Universities. The emergence of the technology of data collection has been discussed in this book with a focus on the agencies management and methods that offer such protection. It has discussed about the use of E-commerce and Electronic money in the business environment that has facilitated their mode of work. E-commerce is growing its coverage at a faster rate and thus it requires a good information security system.The major limitation seen in this book that it did not focus on the usage of internet method in various household activities. Only the usage of internet in the commercial world is discussed both national and international. Li et. al. (2015) has also discussed about Internet of Things (IoT) as it is has been considered as a internet that will be used in future and includes a lot of communication things. The writers of the article are faculty of engineering and information technology in different Universities. The survey was conducted by focusing on the various emerging techniques in which IoT can be implemented. The IoT technology will be very helpful in future as it offers a lot of potential in the future. Thus, carrying out research in this segment s beneficial and the paper is reliable for further research. Te major limitation of the research is that it has just presented literature review about the topic and there is no primary survey conducted for the research to know the believe of professional about this new growing technology. Shameli-Sendi et. al. (2016) has analyzed the risk offered by information security system on the data of the organization. It has viewed that the security of such system should be increased in order to offer a much-secured environment to valuable assets. The researchers of this article are faculty of information security department and technology department of various universities. The research was conducted through secondary research by analyzing the papers offered on the topic from 1995 to 2014. The research conducted is important as organizations in todays world are expanding considerably and it is necessary that they have a secured information security system. Thus, it proves that this system is reputable and it will be of high value if researched further. However, the research paper can be used to carry out further research on this ground after 2014 in business management environment. References: Ab Rahman, N. H., Choo, K. K. R. (2015). A survey of information security incident handling in the cloud.Computers Security,49, 45-69. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., Qiu, D. (2014). Security of the internet of things: Perspectives and challenges.Wireless Networks,20(8), 2481-2501. Dumais, S., Cutrell, E., Cadiz, J. J., Jancke, G., Sarin, R., Robbins, D. C. (2016, January). Stuff I've seen: a system for personal information retrieval and re-use. InACM SIGIR Forum(Vol. 49, No. 2, pp. 28-35). ACM Li, S., Da Xu, L., Zhao, S. (2015). The internet of things: a survey.Information Systems Frontiers,17(2), 243-259 https://www.istp.ethz.ch/content/dam/ethz/special-interest/gess/cis/international-relations-dam/Teaching/bridging/Shancang%202014.pdf Shameli-Sendi, A., Aghababaei-Barzegar, R., Cheriet, M. (2016). Taxonomy of information security risk assessment (ISRA).Computers Security,57, 14-30

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.