Title of article: Enterprise Information Systems Security: A Case Study in the Banking Sector
Industrial system have been preferring reducing their operational expenses. Therefore, they need proper systems for providing stability, fault tolerance and flexibility. BANK systems have been helping in providing such facilities to organizations. However, there has been challenges in the cloud based BANK system, has been discussed in the paper.
Methods and Data Used:
The paper has used qualitative approach in order to collect data and information related to the BANK systems. Data has been collected from secondary data sources including online articles and journals. The secondary approach has helped in maintaining a keen approach to various data from different journals related to the bank systems.
Results and Conclusion:
After analysing the data, various information about the mitigation strategies have been addressed in the report. The advent if the IoT cloud computing has been discussed in the report. The use of the cloud computing in the devices has been described for the beneficial use of cloud computing.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this paper:
This paper has been helping in analysing a system for helping organization. BANK systems has been helping providing health care solutions and enabling doctors to work more efficiently. Standard protocols related to bank systems have been analysed in this paper. The paper has not able to provide proper solutions to the bank security over cloud (Sajid, Abbas and Saleem 2016). The future research work might focus on file integrity monitoring process to secure data over BANK in cloud environment. The use of security policies has been maintained in order to secure network security.
This paper discussed the enterprise information security within the selected case study (Banking sector). It discusses the ongoing security threats and the strategies those could be adopted for enhancing the security in much more efficient and effective way. The paper was selected because proper data collection has been done in this paper and the analysis of data has been done properly.
Title of article: Disaster at a University: A Case Study in Information Security
Information technology has been increasing in the online business market. This has been creating several opportunities for businesses. However, with several opportunities, various risks and threats have been combined with it. Information security has been the most growing security issues in the IT field. This paper has done significant researches in various data security issues in the IT field. This paper has discussed abut several managerial actives for ensuring IT data management issues in the business.
This paper has done secondary approach towards review of existing literature on management role in IT industry. Data has been collected from several online journals and databases. Recent journals after 2012 have been taken for collecting data and information related to IT security issues. Non-academic papers have been rejected for reliability and validity purposes.
Results and Conclusion:
After analysing data, various organization activates have been identified for ensuring security of data and Information. Installation of firewalls and VPN have been common approach for the companies for ensuring security of data. An effective information security governance policy have been implemented in several organization for ensuring security f data and information.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this paper:
The paper has been able to research about various aspects of security issues in the IT management of data. Proper review of existing literature has been done. The secondary approach of the data collection has been able to find sensible data and information regarding IT data management issues. However, there have been some weaknesses including some keyword are used that may lead to some literature untouched (Soomro, Shah and Ahmed 2016). No alternative search protocol have been used. The paper has been published in English language only that might limits the knowledge of readers of other lingual activities. The future work of the researchers might get easy with the study of this paper as illustration of each security points have been provided.
This paper has been used as there has been an illustrated details about all the security concerns in IT data management issues. This paper has been able to identify al security concerns in the IT data management issues and so it is relevant to the selected topic. This paper has been also able to properly analyse data and provide proper solutions to data security issues those could be utilized for enhancing the securities.
Title of article: Managing Security Requirements in Practice: A Case Study
Smart grid has been a technological innovation that help in improving reliability, efficiency, economics and sustainability of electricity services. However, there have been several challenges in the smart grid including managing smart meters, power assets and managing huge amount of data. This paper has helped in building a hierarchical framework for securing data and information over the cloud.
The research has used secondary methods for data collection process. Data has been collected from secondary sources including online journals, articles and government database. . Recent journals after 2012 have been taken for collecting data and information related to smart grid security issues. Non-academic papers have been rejected for reliability and validity purposes.
Results and Conclusion:
This paper has described about critical issues in the smart grid cloud computing. The use of the cloud computing in the smart grid has been described. The researcher has not able to mention the security solutions in the paper in a practical way. The use of cryptography in the context has not been properly described in the report.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this paper:
This paper has described about the benefits of the smart grid. The IT management in the smart grid has been analysed properly. The logical component of the smart grid process has been described in the paper ( Baek et al. 2015). The information flow in the smart grid systems has been explained. The paper has not able to minimize the security issues identified in the paper. The encryption policy in the smart grid concept in cloud environment has been discussed in the paper that might help in minimizing security challenges in the smart grid.
This paper has been able to discuss about the security challenges in the smart grid system in cloud computing. This paper has able to properly analyse data and provide proper solutions to data security issues. The security solution for the smart grid concept has been properly mentioned in the paper. A proper data analysis has been provided in the paper.
Title of article: Information Security Curriculum Creation: A Case Study
The Internet of Things (IoT) devices have been becoming popular in various domains including e-health, e-commerce and e-Home. The deployment if IoT devices have been increased in practical with several security issues and attacks on it. Various security changes have been found in the IoT devices. This paper has discussed about IoT challenges and provided strategies and solution to mitigate these security issues.
The paper has used secondary approach for analysing and collecting data and information. Data has been collected from various online resources including online journals, articles and books related to IoT devices security challenges. Research journals have been taken from 2012 to 2018 published year that help in collecting current data.
Results and Conclusion:
This paper has addressed various security changes in the IoT devices and emphasized on what can be done to mitigate these challenges. A security architecture has been proposed for mitigating security challenges in the IoT devices. Handing of IoT Big data has been discussed in the paper.
The Strength and Weakness, or issues and opportunities that you have discovered by studying this paper:
This paper has able to identify different types of attacks in the IoT devices including device property attacks, Adversary location attacks, Access level attacks, Host based attacks and protocol based attacks. These attacks have been properly analysed. This work has focused on overall security architecture as a solution to these issues in the IoT security (Hossain, Fotouhi and Hasan 2015). This paper lacked in the implementation of solutions of these attacks. The IoT security analysis has been provided in the research paper. The future research can be done for enhancing these solution provided in this research.
This paper has focused on the core competency of the security issues in the IoT devices. The security issues have been properly analysed. The researcher has been able to convey the solution required for management of security issues in the IoT devices.
References
Soomro, Z.A., Shah, M.H. and Ahmed, J., 2016. Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), pp.215-225.
Sajid, A., Abbas, H. and Saleem, K., 2016. Cloud-assisted IoT-based BANK systems security: A review of the state of the art and future challenges. IEEE Access, 4, pp.1375-1384.
Baek, J., Vu, Q.H., Liu, J.K., Huang, X. and Xiang, Y., 2015. A secure cloud computing based framework for big data information management of smart grid. IEEE transactions on cloud computing, 3(2), pp.233-244.
Hossain, M.M., Fotouhi, M. and Hasan, R., 2015, June. Towards an analysis of security issues, challenges, and open problems in the internet of things. In Services (SERVICES), 2015 IEEE World Congress on (pp. 21-28). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download