Wednesday, December 11, 2019
Indistinguishability Obfuscation and Functional â⬠MyAssignmenthelp
Question: Discuss about the Indistinguishability Obfuscation and Functional. Answer: Introduction: In this book, Bronk and Tikk-Ringas have discussed about the several security issues for the information technology organizations. The author has created this book on the basis of several researches on the information security of different organizations. Author has done the research on risk analysis and the possible threats for an organization. The main reasons behind the risks are also given in the book and the ways for overcoming the risk factors are also discussed in details. Risks are classified in different sections with respect to the occurrence and those can be internal or external risks. Sometimes the risks are also increasing continuously as they are created deliberately to make the organizations computing system more vulnerable. This work is very useful on risk management for several information technology organizations. The limitations of the small organizations on installing the software are also discussed as those are in terms of huge cost and expenditure. In this book, Ben-Asher and Gonzalez have discussed about the security issues related to the information technology. The authors have found the information regarding the topic on the basis of several research works and practical cases in which organization have faced different cyber attacks. As the role of information technology is becoming more important in case of providing services to the people, the number of cyber attacks is also increasing with respect to time. There are many examples of cyber attacks in the organizations. The main cyber attacks are generated by the hackers. Several viruses and malware are also responsible for creating several cyber threats to the computer and network system. Due to several attacks of the viruses the public information can be really in danger. Also the main disadvantages regarding the cyber attack are given in terms of making the system more vulnerable. The acknowledgement about the risk factors will help to understand the possible harms of the information technology system. In this book, Raiyn has written about several strategies which are successfully used to detect the cyber attack in the organizations dealing with cyber security. The author has written the book on the basis of his research work based on several case studies and the regulations and standards given by several international organizations and governments. The organizations should follow the regulations and the standards which are discussed in the book to overcome all the possible risk factors and threats. With the advancement of internet and information technology the amount of online services are increasing day by day. To maintain the security of the organization and public information in case of several transactions, the regulations should be followed carefully. It is also seen that the organizations have been benefited in increasing the customer satisfaction and reliability by implementing the standards, regulations discussed in the book and these are more effective against cyber atta cks. In this book, Franke and Brynielsson have demonstrated about the various cyber situational awareness programs which can be designed and applied in case of maintaining the security of the organization. Author has got the idea about it by doing many researches on the practical cases related to the cyber security of the systems and also the reasons for the attacks. Many cyber security issues are foun d due to the attacks on the network system of the computing system.The main advantage of making the system more advanced in network system is that the organizations can be sure about the security of their system. Viruses and malwares are shared and distributed in the network system very easily so that the system can become malicious. There are many network systems which can be utilized to increase the security of the system and those are IPV4 and IPV6 network protocols. There are also many records of the network systems which are found to be more advanced in terms of security for the comput er system used in several organizations. In this book, Von Solms and Van Niekerk have discussed about the transformation and the expansion of the cyber security system from the information security system. Author has collected the information from various case studies and also different research works related to the cyber security. In case of information technology several techniques are usqed like encryption. In modern days the hackers are not only making target to the information but also to the servers and organizational database. Hackers are also attacking common peoples computers to get more resources from them. Different protocols and standards are maintained in order to make the security system more advanced for the reliability. SSL technology is used for the security of the computer system. It helps to oppose the security issues related to the software as well as physical parts of the computer system from the attack of malicious software. In recent days the cyber security has created a lot of features which were not present in case of information security. In this book, Daemaen and Rijmen have discussed about the encryption technology on the basis of the security aspects of the organizations dealing with a large amount of information. The authors have created this book by doing studies on various research works and also from many practical cases. To increase the security in the computer system it is very important to make sure about the security of the data as it is of very confidential nature. Encryption is a method by which the information is converted into codes which cannot be read by the unwanted people who cannot decrypt the codes without the permission from the encoder of the information. Encryption was previously used in war to transfer data in a coded language. The main advantage of making the system more advanced about the security is to make all the information well encrypted. It is seen in many cases that several data loss have been reported due to the advancement of the encryption technology. In this book, Rittinghouse and Ransome have discussed about the security aspects related to the cloud computing of an organization dealing with information technology. Authors have found the information from several research works and practical case studies. The main advantage of cloud computing is that the huge processing power of the cloud is shared among various computers of the organizations and also the main advantage of implementing the cloud computing is that it can make the system more advanced in decision making and data analysis. It is seen that in many computing system the application of the cloud computers are being done to overcome the security related issues related to the organizations. Due to the use of the cloud, computing software is more advanced in tacking the malware and the virus in the main computing system. The main effect of the security aspects related to the cloud computing can be utilized in a greater margin. In this book, Andress has discussed about the security policies in an organization which are responsible for the internal information security of the organisation. The author has created this book on the basis of several researches on the information security of different organizations. Author has done the research on risk analysis and the possible threats for an organization. The main reasons behind the risks are also given in the book and the ways for overcoming the risk factors are also discussed in details. In many cases it is seen that the organizations have faced a lot of cases where the employees have deliberately created a lot of issues regarding the information security of the organization. There are also many cases have been found in which people have violated the laws related to the organizational security for their own interests and also they have created real threats to the organization. As a result the organizations have created many new regulations which are important for the betterment of the organizational security. In this article, Almorsy, Grundy and Muller have discussed about the security features provided by the cloud platform for increasing the security of the organizations and also its implementations in new technologies like smart grids. Authors have found the information from several research works and practical case studies. The main advantage of cloud computing is that the huge processing power of the cloud is shared among various computers of the organizations and also the main advantage of implementing the cloud computing is that it can make the system more advanced in decision making and data analysis. It is seen that in many computing system the application of the cloud computers are being done to overcome the security related issues related to the organizations. Due to the use of the cloud, computing software is more advanced in tacking the malware and the virus in the main computing system. Cloud computing provides a centralized processing unit and for this reason organizations do not need to rely upon other sources which can create threats to their computer system. In this article, Ksheri has discussed about the security of the organizations on the basis of the application of big data. The author has collected the information from various research works and from several case studies. The big data analysis is important for the advancement of the security system. Organizations which deal with a large amount of information need the analytical help of big data so that the security of the organization is maintained. Big data also uses various approaches like statistical and analytical approaches so that the data can be used with more compact and faster response. For dealing with the increasing requirements from customers big data helps a lot to ensure the effectiveness of the functioning of the information. The main reasons behind the risks are also given in the book and the ways for overcoming the risk factors are also discussed in details. Risks are classified in different sections with respect to the occurrence and those can be internal or extern al risks. Sometimes the risks are also increasing continuously as they are created deliberately to make the organizations computing system more vulnerable. This work is very useful on risk management for several information technology organizations. Big data takes an important role in risk management also by several analytical methods. References: Bronk, C., Tikk-Ringas, E. (2013). The cyber attack on Saudi Aramco. Survival, 55(2), 81-96. Ben-Asher, N., Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51-61. Raiyn, J. (2014). A survey of cyber attack detection strategies. International Journal of Security and Its Applications, 8(1), 247-256. Franke, U., Brynielsson, J. (2014). Cyber situational awarenessa systematic review of the literature. Computers Security, 46, 18-31. Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security. computers security, 38, 97-102. Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B. (2016). Candidate indistinguishability obfuscation and functional encryption for all circuits. SIAM Journal on Computing, 45(3), 882-929. Ali, M., Khan, S. U., Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information Sciences, 305, 357-383. Siponen, M., Mahmood, M. A., Pahnila, S. (2014). Employees adherence to information security policies: An exploratory field study. Information management, 51(2), 217-224. Bera, S., Misra, S., Rodrigues, J. J. (2015). Cloud computing applications for smart grid: A survey. IEEE Transactions on Parallel and Distributed Systems, 26(5), 1477-1494. Kshetri, N. (2014). Big data? s impact on privacy, security and consumer welfare. Telecommunications Policy, 38(11), 1134-1145.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.