Friday, December 6, 2019

Professional Skills for Information for UTM - myassignmenthelp

Question: Discuss about theProfessional Skills for Information for UTM. Answer: Chen, Z., Han, F., Cao, J., Jiang, X., Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), 40-50. In this article, Zhen Chen, Fuye Han, Junwei Cao, Xin Jiang and Shuo Chen stated about network security problem that causes major security concern. Most of the network security breaches occur due to the phishing, spam, worms. The authors explained that new botnet attacks can further degrade the security network. This article provides a solution based on Unified Threat Management (UTM) as it connects the protocol and exchange network events. Key themes of this article are cloud computing, computer forensic, overlay network and botnet. This article has been taken the information through secondary sources. This article is relevant to the case study as it discusses network security system and the article has been written by famous writers and published by IEEE. Ahmed, M., Hossain, M. A. (2014). Cloud computing and security issues in the cloud. International Journal of Network Security Its Applications, 6(1), 25. Authors explained in this article about network security and infrastructural concept of cloud computing. Global companies are taking help of cloud computing in network security and it completely depends on network architecture. Numerous cloud based services are provided by cloud and this article is perfect for case study as it states that security system is not robust and one can make it consistent and secure. Moreover, this article is relevant as it is related to computing concept of cloud computing. The authors collected the data from credible secondary sources. Key themes of this article are cloud services, network security and computer network and distributed computing. This article has been written by famous senior lecturer and consultants Monjur Ahmed and Mohammad Ashraf Hossain. Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25. This study provides a comprehensive and structured overview of network security and privacy of computer networking. Most importantly, this article primarily focuses on game theory. This article is a kind of exploratory article that tests some security and privacy issues through game theory. This article is relevant to the case study as it deals with network security and solutions towards it. Authors summarise the results of the tests and this article has taken the information from secondary sources. The article explains the terms like algorithms, design, security and economics. The authors are well known in their field of teaching and distinct universities from Australia, Switzerland and USA. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5. This article has been published by reputed Springer publication and authors are Keiko Hashizume and others. The key themes of this article are cloud computing, security, SPI (SaaS, PaaS, Iaas) model, threats in network and countermeasures for those. This article is relevant for the case study as cloud computing is one of the emergent technologies that could help in network security. The authors took help from secondary sources. This article can be reliable as it provides information on network security of Service Oriented Architecture, host application, data levels and network. He, X., Chomsiri, T., Nanda, P., Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall. Future generation computer systems, 30, 116-126. This article is based on the subject of electrical engineering and computer science; however, mathematical ideas have been specified. This article has been published by the famous University of Twente. Most importantly, the authors used Listed-Rule firewalls. Various benefits of cloud networks and network security have been specified in this task. Tree-Rule firewalls provide network security and it is proved by mathematical solutions. This article is relevant for the case study as it deals with network security and authors have taken ideas from secondary sources. Distinct differences have been made between Listed-Rule firewall and Tree-Rule firewall. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592. In this article, authors averred the concept of cloud computing in network security issues with flexible infrastructure investment. This article has been published by University of London Institutional Repository. The authors used the key themes like network protocol, vulnerabilities of cloud computing as it stores the data. The authors demanded that 91% of the European large organisation start using cloud storage for network security. This article is relevant as it states about computing resources and security issues. In case of network security, this article provides the solution of virtualization, privacy system and cloud computing. This article is reliable as the authors used the data through credible secondary sources. Kumar, S. N. (2015). Review on Network Security and Cryptography. International Transaction of Electrical and Computer Engineers System, 3(1), 1-11. This research article is about data security process used by various transactions through digital media. The electronic transaction process is used by e-commerce, organisational transaction and social networks. The author discusses the process cyber-criminals are used in data theft. The cryptography is controlled by network administrator and the process of data security does not only consist of the end system. This article is reliable as it is e-version of the article and the author uses various sources of secondary information. This article is relevant as it deals with network security with a broad range of cryptographic algorithms. The author uses networking application with various figures showing process of using. Shin, S., Wang, H., Gu, G. (2015). A first step toward network security virtualization: from concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10), 2236-2249. This article starts with a notion that network security is getting more vulnerable as security devices are being hacked. The authors used prototype system in order to provide network security design called NetSecVisor. Network Security Virtualization (NSV) is the core concept of this article. This article is relevant as this one deals with network security and its countermeasures and networking. Key themes of this article are security response functions and prototype concept to gather results. This article is reliable as it uses vast sources of secondary information and has been published by IEEE.. Inukollu, V. N., Arsi, S., Ravuri, S. R. (2014). Security issues associated with big data in cloud computing. International Journal of Network Security Its Applications, 6(3), 45. This article is about recent issues in security management as it deals with big data and cloud computing. Moreover, authors stated the security issues that are associated with big data management, a giant storage of data. Data breach recently occurs in big data management. Most significantly, this article states solutions to the network security. The concept of Map Reduce, Hadoop Distributed File Systems has been discussed. This article is relevant to the case study as it deals with network security solutions. This article is reliable as the authors are lecturers in Texas University and the journal has been published by IJSNA. Kumar, V., Jain, A., Barwal, P. N. (2014). Wireless sensor networks: security issues, challenges and solutions. International Journal of Information and Computation Technology (IJICT), 4(8), 859-868. The concept that has been discussed in this article is different as it talks about wireless network and security breaches of these. The authors stated that Wireless Sensor Network (WSN) is not secure from data theft. This article also talks about security solution using various applications. This article is relevant to the case study as it deals with a security application that could be useful in security issues in WSN. The authors took the ideas from secondary sources and they used descriptive design technique. Moreover, this article is reliable as the authors are reputed and have been published by International Research Publication House. Reference List Ahmed, M., Hossain, M. A. (2014). Cloud computing and security issues in the cloud. International Journal of Network Security Its Applications, 6(1), 25. Chen, Z., Han, F., Cao, J., Jiang, X., Chen, S. (2013). Cloud computing-based forensic analysis for collaborative network security management system. Tsinghua science and technology, 18(1), 40-50. Hashizume, K., Rosado, D. G., Fernndez-Medina, E., Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), 5. He, X., Chomsiri, T., Nanda, P., Tan, Z. (2014). Improving cloud network security using the Tree-Rule firewall. Future generation computer systems, 30, 116-126. Inukollu, V. N., Arsi, S., Ravuri, S. R. (2014). Security issues associated with big data in cloud computing. International Journal of Network Security Its Applications, 6(3), 45. Kumar, S. N. (2015). Review on Network Security and Cryptography. International Transaction of Electrical and Computer Engineers System, 3(1), 1-11. Kumar, V., Jain, A., Barwal, P. N. (2014). Wireless sensor networks: security issues, challenges and solutions. International Journal of Information and Computation Technology (IJICT), 4(8), 859-868. Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., Hubaux, J. P. (2013). Game theory meets network security and privacy. ACM Computing Surveys (CSUR), 45(3), 25. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing. The Journal of Supercomputing, 63(2), 561-592. Shin, S., Wang, H., Gu, G. (2015). A first step toward network security virtualization: from concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10), 2236-2249.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.