The Department of Administrative Service (DAS) is known to cater multiple services to the Australian State Government, the services catered by them are the payroll management, payroll procurement, HR and contractor management (Haynes & Giblin, 2014). Now DAS is worried about the security and privacy of the organisation and also the workers of the organisation and the customers or the users associated with it.
The report will thus highlight the existing risks and threats and the vulnerabilities prevalent within in house of the HR database. The risks and the vulnerabilities of the employees, employees’ data risks will be evaluated in this report as well. That is why seeing the potential risks DAS has decided to move to the cloud, the threats and risks associated moving to the cloud has been showcased and the possible solutions to control those risks have been detailed in the report. Amazon AWS and another cloud vendor Sore’s impact will be highlighted to illustrate the cloud computing elaborately.
Consideration of the data and information that DAS holds on its employees in the current HR system
Establishment of the existing threats and risks to the security of that data and information contained in the in-house HR database
The risks and the threats residing within the HR database are as follows-
Deployment failures:The database may fail due to some faulty issues and due to the software developers make wrong configuration and wrong coding. The database can be under disruption at the time of execution as well (Shostack, 2014). At the time of development of the database software the database remains untested by the developers so some faulty issues and bugs stay inside the database, the attackers taking advantage of the bug can exploit the database.
Database security flaws:The security vulnerabilities stay within the database and these vulnerabilities can be disastrous to the organisation (Rhodes-Ousley, 2013). The malware attacks create havoc and the whole system and the database can be under threat. the intruders can gain access to the system through these loopholes and can exploit the entire database and the system at will. The organisations can suffer a lot due to this attack.
Data leaks:Database is considered as the backend of the development, the business organisations’ financial data as well as the sensitive data of the employees and the customers and the clients in the database. Therefore, the business organisations if want to protect their database from any kind of mishaps they must ensure that their network is strong as well as secure enough, if the network is not secured then it may happen the hackers can take advantage of the network and can exploit the database as a whole.
The misuse of the database:The data in the database gets misused by several means, due to mishandling of the employees and the mishandling of the clients or the customers. The employees sometimes install plugins into their system, thus the applications installed within the system becomes bulky and at the same time buggy, these plugins may prove vulgar they can steal all the necessary information, hidden files within the system, as well as they, can steal cookies from the browser (Chockalingam et al., 2017). Thus the casualties of the employees can cost the company too much. Even the casualties from the customers can cause security and privacy breach the passwords stored in the database can be stolen from the database of the customers.
Hopscotch approach:The hacktivists can steal the personal files and the data from someone’s personal account simply without using any bank card and the bank card information, the intruders are always in search of the vulnerabilities.
SQL injection:The variables do not get tested at the time of testing and the front end database does not get the desired security with the firewall and thus the system and the database both are vulnerable to SQL injection (Albakri et al., 2014).
Key management:The database developers and the database administrators keep the important keys in their database on the hard drive of the computer system (Chockalingam et al., 2017). If the computer gets connected to the insecure network the intruders will attack the computer system and will make the entire system vulnerable.
Database inconsistency:The database developers, as well as the database administrators,must be careful about the data breaches all the time if any kind of mishaps occur they must be ready to face the risks and the threats and based on that they should make best decision to root out the threats occur within.
Virus and worms: The virus and worms are two dangerous threats that HR database can face. A worm basically spreads via hackers once, then the worms replicate by itself and this can cause disruption and risk, these worms can slow down the server and the system and can cause havoc (Pawlick & Zhu, 2017). The virus is another malicious activity carried out by the hackers. The virus robs the important files of the HR database, the financial data and the clients’ data. Therefore, the virus attack is responsible for data loss, data theft and the HR database can cause malfunction due to this, the system will stop, the production along with that can cause disruption, the workforce will have to sit idly, the organisation by this disruption can lose the reputation (Deng et al., 2017).
Trojan horse:Trojan horse is the attack that occurs when any file downloaded from no trusted source or no trusted source (Yao et al., 2017). These files can cause disruption and steal away all the vital information of the database and the system of the HR organisation. The employees of the organisation can access any site which is not verified and not trustworthy. The defence mechanisms must be ready to deliver the quality security service that can make the entire system vulnerable. The employees of the organisation if access the vulnerable software the virus will spread across the system and the database will suffer (Diovu & Agee, 2017).
Denial of Service attack:The Denial of Service attack is another serious attack that the HR database can suffer from (Garcia-Alfaro & Perez, 2017). The vulnerable attack from the hackers can make things worse, it basically shut down the computer system and the computer database, this attack generally sabotages the owner’s computer and disallows the owners of the server and the computer system to not use the computer system. The hackers can access the private information of the HR database, the clients’ details, their account details, the hackers can leak the information for personal interest. Also,the attack can cause permanent damage to the system and the files (Wu, Song & Moon, 2017). The data loss can be a huge loss for the HR database. There are other forms of Denial of Service attack. In this scenario, one master computer takes control of a certain group of computers and these group of computers are responsible to spread the malicious activities across the HR database and the HR system (Biancotti, 2017). This can shut down the server of the HR database completely. The zombie computers if attack the HR system, bombardment can occur and this bombardment happens due to transactions of corrupted and malicious data flow.
Problems of logging out:The clients in casualty often forgetto log out of the system. The clients’ network is not highly secured, thus taking advantage of the insecure network, the hackers can gain entry to the system causing huge disruption to the organisation as a whole (Hawkins, 2017). The data leaks are possible in this way the HR database can be under threats the data of the database can be stolen. The clients, as well as the employees of the company, have to face the harassments due to the heavy attack. The reputation can be seriously challenged due to this.
Passwords:The clients often choose the weak passwords for their system and thus creates an opportunityfor the hackers. In this, the personal data of the clients’ data can be breached and the organisation will have to take the maximum responsibility for this (Xiao et al., 2017). With the help of brute force method, the vulnerabilities residing within get exposed. Thus the clients must be steady while setting a password for the system.
Phishing attack:The phishing attack is conducted by the hackers to hack the personal accounts. The hackers develop a look-alikewebsite of the DAS by copying the HTML code of the genuine site and can cheat the clients (Chowdhury, 2017). The clients by entering the credentials can get deceit and by getting the details of the clients the hackers can hack the accounts of the HR database.
The risks and threats to the employee data after migration to a SaaS application
The potential risks associated with HR database are-
If the enterprise wants to keep back up of the data to the cloud and want to shift to the cloud, then the vital information handling or the sensitive information handling can be tough as they have to obey the compliance of the cloud vendors, so they can get restriction from the cloud vendor (Feng, Wang & Li, 2014).
The enterprise if earning good should not choose the option to move to the cloud as that can create disruptions, the cloud computing needs high maintenance, higher availability and higher scalability (Safa et al., 2015).
The enterprise will not be able to get access to the data of the cloud database as the cloud vendors will deploy everything and the cloud vendor will take the entire charge of the data of the database of the enterprise.
Moreover, they have to opt a strong secured network server as that can provide fast internet service as well as the security by which they can run their applications, due to this, they have to bear the heavy expenses.
The enterprise will have to pay the cloud vendor on a monthly basis or yearly basis for security and the maintenance of the data and the database (de Gusmão et al., 2016).
There remain data theft risks as somehow due to the intruders’ attack the security of the database can get breached. That can lead to virus and worm attack.
The SaaS applications are available due to server down or network unavailability. The entire business operations will suffer also the clients could not be able to communicate with the clients all throughout day and night 24×7 (Maitra & Madan, 2017). That will reduce the productivity and thus the enterprise can face severe loss due to this attack.
The organisations must have a disaster plan ready with them as that can help them to gain access to the data in case they want to conduct the business operations offline (Shameli-Sendi, Aghababaei-Barzegar & Cheriet, 2016). The organisation may have to conduct the business operations when they get into trouble like the occurrence of security breaches and the server down or the network unavailability.
They have to follow the rules and the policies set up the cloud vendors so the organisation will not have total control over their database. They will also have to pursue the policies correlated with security set up by the cloud vendors; some alterations in the policies may not be approved and encouraged by the cloud vendors.
Assess the resulting severity of risk and threat to employee data
The workers’ information can get hacked and the organisation’s risks related to security are involved are illustrated in details-
Theft: Data theft by physical means as well due to the intruders’ attack. The intruders can gain entry into the system due to the insecure network. The internal employees who have some grudge against the enterprise in order to take revenge can steal the vital information of the database.
Neglect: Due to the negligence of the clients and the employees the aforesaid organisation can get into trouble. The employees store the important files on their laptop or smartphones, now if the smartphone gets lost then there that sensitive information can be accessed by the intruders, thus the sensitive information of the organisation can get into the wrong hands (Kirti et al., 2017). Again, the full format of the smartphone can be the reason for permanent data loss as well. Again if the laptop gets malfunctioned, then if the technician can gain access to the sensitive information and thus the data can be breached and again if the laptop gets lost or permanently gets damaged then the data will be lost, also the intruders can delete those important files and also can hack the passwords of the account of the system.
Loss: As discussed earlier, the loss of devices can be the risks and threat of the organisation. The hacktivists can enter the system and the steal the personal information from the database and the system thus the HR database can become vulnerable. The hacktivists can get the desired username and password and can enter their account (Cherdantseva et al., 2016). In this way, both the clients and the organisations can suffer the huge monetary loss, as well as the reputation of the company, can be under the threat. The organisation can even lose the competitive edge due to the pitfalls.
Consideration of the privacy of the data for those employees who will move to a SaaS application
Establishment of the existing threats and risks to the privacy of that data and information contained in the in-house HR database
Security threats and the privacy risks involved
Privacy breaches:Due to the leaks of the private data and the information, the clients and the employees can get embarrassed. Thus there is a chance of security breaches in the HR database.
Problems related to anonymity:The HR database if not programmed in a way such that it can uniquely identify the clients of the organisation, then there can be data duplication of the clients thus can violate the atomicity or the anonymity of the clients as well as the employees of the company (Landucci et al., 2017).
Issues related to data masking:Data masking is the technique which resembles the organisation’s original data; this technique is adopted by the employees of the organisations’ safe from the security breaches. However, this technique is not fruitful all the time and the intruders can still gain access to the system (Younis, Malaiya, & Ray, 2014).
The risks and threats to the privacy of the employee data after migration to a SaaS application
After shifting the business applications to the cloud to the SaaS applications, the privacy concerns that pertain are-
Unethical action:The SaaS applications can be utilised to find out the details of the employees, the SaaS applications have the capability to keep track of the clients as well as the employees, the clients’ every move can be saved and thus any intruders having the clients’ data can destroy his or her life, the SaaS implications may not be illegal but it may take lives of clients. This can be disastrous to the employees of the organisation as well.
Inaccurate SaaS applications:Since the cloud technology is in beta mode, due to this reason the cloud database, as well as the cloud applications, has not been tested to the fullest that is the reason why the cloud database of HR may hold the data which is not correct and this can create confusion (Modi et al., 2013). Due to the wrong implication of the data models or use of any faulty algorithm can result in shocking results, the employees can take the wrong decision thus the employees and the clients can suffer due to this.
Discrimination:The organisation has all the data so they can discriminate among the workers of the organisation. Since data is available all the time, anyone from the organisation can seek the opportunity to misuse the data and they can use that data to fulfil their selfish needs.
No legal protections:Since cloud computing is relatively new, the laws, policy and the regulations have not been made, so everybody can illegally utilise the sensitive data to fulfil their needs (Erdogan et al., 2015).
e-discovery concerns:The enterprises also create documents for their projects and that involves the data mining procedures so, it may happen that the employees and clients’ personal data can get breached in some way or other causing a threat to the organisation.
The severe risk involved is the disclosure of personally sensitive information and the sensitive information to the public. Thus authenticity is the need of the hour. The privacy of their clients can take away one’s life. The hackers, the intruders can get access to the HR database and can make the entire database and system vulnerable to attack. The HR database contains the sensitive information of both the employees and the clients; again it contains the financial data of the organisation. Since everything will be conducted online the cloud database, SaaS applications must be considered and should well take care of (Best et al., 2017). Also, they should take the help from the third-party cloud vendor, as the cloud vendors have the best solutions to defend the malware attack and the best architectural design to shape the entire enterprise.
The threats and risks to the digital identities of Government employees from the move to SaaS applications
The vulnerabilities, as well as threats correlateded with digital identities while shifting to the cloud database, has been highlighted in the report.
The workers currently working in the company can get threatened if DAS moves to cloud and starts using cloud applications. Authenticity is one of the methodologies by which the workers and the clients can gain access to the company. The hackers basically attack the network which is not strongly secured. The clients’ sensitive information and the organisations’ data can get breached due to the insecure network and the lack of firewall setup. A secured firewall can secure the network effectively. The cloud network security provided by the cloud vendor is capable to provide the secured network with advanced features (Shuaibu et al., 2015). Again the cloud securities provided by the cloud vendors are beneficial to root out the Denial of Service attack. The Denial of Service attack can shut down the server computer and blocks all the business activities.
The eavesdropping is another threat which causes disruption and it involves the access over the network illegally and can record the conversation of the clients and the employees of the network. The official conversation gets leaked due to the intruders attack the system.
There is another attack named masquerade which can be equally disastrous. The hackers by taking the name and fake identity of the organisation’s employees and communicate with the clients (Bermudez, 2013). In this way, the sensitive information of the employees gets robbed due to the attack of the hackers. This is another way the HR database can get into trouble.
The files if gets exchanged over the insecure network insecure SaaS applications, then the hackers can steal the personal files and can modify those files according to their will and selfish needs (Almorsy, Grundy & Müller, 2016). The workers’ identity can get breached and the files can hijack due to the loopholes created due to the attack of the intruders.
By the ransomware attack, the intruders also attack one’s system can shut down the computer even disallow the original owner to get back the SaaS applications.
The website intrusion is the hijacking of one’s account and exploitation of the sensitive information.
The integrity, availability and the confidentiality can get threatened and these are the risks and the vulnerabilities if they try to shift their business activities to cloud technology and use the cloud applications (Rong, Nguyen & Jaatun, 2013).
Consideration of the operational solution and location(s) of the two SaaS providers for HR and Contractor management
The two most popular providers of SaaS that can enhance the organisations’ digital security-related threats are Amazon AWS and Shore.com.
Sore.com is a German-based SAS provider which offers the certain advantages and it is quite popular in Germany and neighbouring countries (Ryan, 2013). The organisation offers security measures to check and control the risks associated with cloud platform and the cloud vendor-
SaaS is capable to cater the platform where the enterprise does not have to worry about the management of the applications and the updates of the applications (Kshetri, 2013). The cloud vendor will take the effort to secure the system and for this reason, the employees can stay safe and secure. The clients can also enjoy the secured service.
SaaS improves execution of cloud applications and in this way, the employees can get the fast cloud service and effective cloud service from the cloud vendor.
The SaaS applications can be processed anywhere anytime from any device.
The security design for the SaaS associates those elements which can be shared among the clients among the stakeholders and Store has policies regarding the SaaS model.
Shore caters the CRM facilities and by this approach, the employees of the organisation, as well as the workers of the organisation, can get the benefits to the fullest. Via shore, the workers’ data can be tracked, as well as the clients’ data can be tracked. Since, Shore has taken the responsibility to provide the employees with a whole lot of benefits so they do not have to consider the security of their enterprise, they do not have to consider the security of the employees of the enterprise, and also they do not have to consider the security and privacy of the clients in their company (Rong, Nguyen & Jaatun, 2013). Since Shore has some advanced features installed within the cloud database and the enterprise they do not have to worry about maintaining and the database and the system. The organisation will have all the data at their fingertips and can access the data with much ease (Almorsy, Grundy & Müller, 2016). Moreover, the organisation can get the benefits to access the database on the go, can access the database anywhere anytime at any place from any digital device.
Amazon AWS is the US-based SaaS provider which has numerous benefits to offer and they are-
Infrastructure capabilities- Amazon has the necessary network firewalls assimilated with the Amazon PVC, it also has the firewalls connected with the web applications and thus creates more scopes for Amazon and this assist in getting access to the cloud arena of the cloud vendor (Bermudez et al., 2013). Amazon AWS thus offers private connected service and the dedicated service from anywhere.
DDoS attack-Amazon AWS has a unique strategy to defend the DDoS attack, the Amazon AWS service has the potential to check the threats and the risks correlated with the DDoS attack. Amazon is also known to provide the following aspects like auto-scaling, Amazon Cloud Front and Amazon 53, that can help to check the negative impact of this aforesaid attack.
Data Encryption-SQL Server RDS, EBS, Redshift RDS, S3 caters the data encryption methodologies by which the employee’s data and the client’s data can be protected, it is nearly impossible for the attackers to gain access to a network and to gain access to a system (Bermudez et al., 2013). Thus the software provided by Amazon can help in securing the database.
Advanced management tools- AWS config, Amazon Inspector are the AWS resources that can assist o get the desired result and this can assist in managing and the controlling the system and the database, the advanced management tools from Amazon is capable to handle the resources well in a secured manner (Bermudez et al., 2013).
Amazon Policies-Amazon is popular to cater the policies and the services like AWS Directory Services, AWS Multi-Factor Authentication, AWS Identity and Access Management (IAM) assists in defining the regulations and the policies via which the advantages of the software can be gained so that both the employees and the clients can enjoy hassle-free service.
DAS can be largely benefitted from the IaaS cloud services, so they should adopt the IaaS cloud services besides the SaaS cloud platform services (Feng, Wang & Li, 2014). IaaS security framework can prove fruitful to the enterprise to employ security features in the enterprise. IaaS is known to cater the best hardware solutions, best software solutions, updated operating system, updated application software, updated antivirus program. Thus DAS can enjoy the secured hassle-free cloud services from the cloud vendors. Amazon AWS is popular among all the cloud vendors available in the market, they have the best architecture in their business. Therefore, the employees can get the enhanced solutions by which they can conduct the business procedures in agile effective manner. Moreover, the security aspects can add a feather to the business. The outdated software, the outdated operating system, the outdated hardware can prove disastrous to the company, there can be a huge risk of security and data breaches. Thus IaaS infrastructure can provide security solutions to all security breaches that can occur due to the mentioned outdated resources. Amazon AWS can provide them with the advanced resources, advanced hardware, advanced software and the advanced operating software and advanced security patches (Band et al., 2015). This can also help them to get the competitive edge which they want to get. Adopting Amazon AWS they can stay ahead of all others.
Conclusion
It can be concluded from the above discourse that the DAS can get advantages adopting the cloud technology and adopting the cloud architecture of Shore and Amazon AWS. DAS employees and the clients can enjoy well secured hassle-free cloud services, they can even get benefits from the IaaS architecture along with the SaaS applications, all these aspects have been highlighted in the report. DAS has planned to shift their business to the cloud and that will surely embellish the business operations and the security of the company. Everything has been explained in details in the report. The threats and the risks about the database have been explained in the report, again the adopting the cloud services initially they can face risks and they will have to deal with it. All the cloud base risks have been showcased in the report elaborately.
References
Albakri, S. H., Shanmugam, B., Samy, G. N., Idris, N. B., & Ahmed, A. (2014). Security risk assessment framework for cloud computing environments. Security and Communication Networks, 7(11), 2114-2124.
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Band, I., Engelsman, W., Feltus, B. C., Paredes, S. G., & Diligens, D. (2015). Modeling Enterprise Risk Management and Security with the ArchiMate®.
Bermudez, I., Traverso, S., Mellia, M., & Munafo, M. (2013, April). Exploring the cloud from passive measurements: The Amazon AWS case. In INFOCOM, 2013 Proceedings IEEE (pp. 230-234). IEEE.
Best, D. M., Bhatia, J., Peterson, E. S., & Breaux, T. D. (2017, April). Improved cyber threat indicator sharing by scoring privacy risk. In Technologies for Homeland Security (HST), 2017 IEEE International Symposium on (pp. 1-5). IEEE.
Biancotti, C. (2017). Cyber attacks: preliminary evidence from the Bank of Italy’s business surveys.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H., & Stoddart, K. (2016). A review of cyber security risk assessment methods for SCADA systems. computers & security, 56, 1-27.
Chockalingam, S., Hadziosmanovic, D., Pieters, W., Teixeira, A., & van Gelder, P. (2017). Integrated Safety and Security Risk Assessment Methods: Key Characteristics and Applications. arXiv preprint arXiv:1707.02140.
Chowdhury, A. (2017, February). Cyber attacks in mechatronics systems based on Internet of Things. In Mechatronics (ICM), 2017 IEEE International Conference on (pp. 476-481). IEEE.
de Gusmão, A. P. H., e Silva, L. C., Silva, M. M., Poleto, T., & Costa, A. P. C. S. (2016). Information security risk analysis model using fuzzy decision theory. International Journal of Information Management, 36(1), 25-34.
Deng, S., Zhou, A. H., Yue, D., Hu, B., & Zhu, L. P. (2017). Distributed intrusion detection based on hybrid gene expression programming and cloud computing in a cyber physical power system. IET Control Theory & Applications.
Diovu, R. C., & Agee, J. T. (2017, June). A cloud-based openflow firewall for mitigation against DDoS attacks in smart grid AMI networks. In PowerAfrica, 2017 IEEE PES (pp. 28-33). IEEE.
Erdogan, G., Seehusen, F., Stølen, K., Hofstad, J., & Aagedal, J. Ø. (2015). Assessing the usefulness of testing for validating and correcting security risk models based on two industrial case studies. International Journal of Secure Software Engineering (IJSSE), 6(2), 90-112.
Feng, N., Wang, H. J., & Li, M. (2014). A security risk analysis model for information systems: Causal relationships of risk factors and vulnerability propagation analysis. Information sciences, 256, 57-73.
Garcia-Alfaro, J., & Perez, G. M. (2017). Introduction to the Special Section on Critical Systems Modelling and Security.
Hawkins, N. (2017). Why communication is vital during a cyber-attack. Network Security, 2017(3), 12-14.
Haynes, M. R., & Giblin, M. J. (2014). Homeland security risk and preparedness in police agencies: The insignificance of actual risk factors. Police Quarterly, 17(1), 30-53.
Kirti, G., Gupta, R., Biswas, K., & Turlapati, R. R. S. (2017). Washington, DC: U.S. Patent and Trademark Office.
Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution. Telecommunications Policy, 37(4), 372-386.
Landucci, G., Argenti, F., Cozzani, V., & Reniers, G. (2017). Assessment of attack likelihood to support security risk assessment studies for chemical facilities. Process Safety and Environmental Protection.
Maitra, S., & Madan, S. (2017). Intelligent Cyber Security Solutions through High Performance Computing and Data Sciences: An Integrated Approach. IITM Journal of Management and IT, 8(1), 3-9.
Modi, C., Patel, D., Borisaniya, B., Patel, A., & Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592.
Pawlick, J., & Zhu, Q. (2017). Strategic trust in cloud-enabled cyber-physical systems with an application to glucose control. IEEE Transactions on Information Forensics and Security, 12(12), 2906-2919.
Rhodes-Ousley, M. (2013). Information security the complete reference. McGraw Hill Professional.
Rong, C., Nguyen, S. T., & Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing. Computers & Electrical Engineering, 39(1), 47-54.
Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), 2263-2268.
Safa, N. S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N. A., & Herawan, T. (2015). Information security conscious care behaviour formation in organizations. Computers & Security, 53, 65-78.
Shameli-Sendi, A., Aghababaei-Barzegar, R., & Cheriet, M. (2016). Taxonomy of information security risk assessment (ISRA). Computers & Security, 57, 14-30.
Shostack, A. (2014). Threat modeling: Designing for security. John Wiley & Sons.
Shuaibu, B. M., Norwawi, N. M., Selamat, M. H., & Al-Alwani, A. (2015). Systematic review of web application security development model. Artificial Intelligence Review, 43(2), 259-276.
Szwed, P., & Skrzy?ski, P. (2014). A new lightweight method for security risk assessment based on fuzzy cognitive maps. International Journal of Applied Mathematics and Computer Science, 24(1), 213-225.
Vereinfachen Sie Ihr Geschäftsleben mit Shore!. (2017). Shore.com. Retrieved 2 September 2017, from https://www.shore.com/de/
Wu, M., Song, Z., & Moon, Y. B. (2017). Detecting cyber-physical attacks in CyberManufacturing systems with machine learning methods. Journal of Intelligent Manufacturing, 1-13.
Xiao, L., Xu, D., Xie, C., Mandayam, N. B., & Poor, H. V. (2017). Cloud storage defense against advanced persistent threats: A prospect theoretic study. IEEE Journal on Selected Areas in Communications, 35(3), 534-544.
Yao, J., Venkitasubramaniam, P., Kishore, S., Snyder, L. V., & Blum, R. S. (2017, March). Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks. In Information Sciences and Systems (CISS), 2017 51st Annual Conference on (pp. 1-6). IEEE.
Younis, A. A., Malaiya, Y. K., & Ray, I. (2014, January). Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability. In High-Assurance Systems Engineering (HASE), 2014 IEEE 15th International Symposium on (pp. 1-8). IEEE.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download