security issues in Networks

I have written here what is the objective of the paper and 7 annotated sources should use most of them however can switch some off

security issues in Networks

Don't use plagiarized sources. Get Your Custom Essay on
security issues in Networks
Get an essay WRITTEN FOR YOU, Plagiarism free, and by an EXPERT!
Order Essay

The huge impact that communication Services will have on all populations for centuries. It is also useful for a new user to the wireless communication systems. systems to understand the enormous impact people are making in developing modern communications systems

In this paper I will be taking about management issue related the security issues of the system .The company responsibility to train the employee systems security essential to make employee trained to take proper punctuation to make their security issues as secure as possible .technical issues on the Confidentiality, Integrity, Spoofing. Training the employees to take proper procedures as secure as possible.

Annotated Bibliography for security issues in networks

Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200-222.

The article details the concepts of resource pooling and distributive environment in cloud computing. Additionally, it explains the survey on the cloud computing prevalent issues. The related processes are integrated with pertinent security issues and some of the solutions. Progressively, it suggests a three-tier security architecture and better security management.

I chose the article since it is peer reviewed and edited by trusted authors. More so, the content of the article is much synchronized to the management issues in the cloud computing and networking; which is my area of research.

Ashibani, Y., & Mahmoud, Q. H. (2017). Cyber physical systems security: Analysis, challenges and solutions. Computers & Security, 68, 81-97.

The article expounds on the cyber physical systems and new threats of cyber-attacks. The communication, network and computational elements are presented through analysis of layer of risk assessment, CPS architecture and techniques of securing CPS. The research supports its arguments with data on the security problems on the global scale.

I chose the article because it has an element of how physical infrastructure and physical networks connect through the networks. The cyber physical security encounters a major challenge of security threats. More so, the article is peer reviewed.

Ani, U. D., He, H., & Tiwari, A. (2019). Human factor security: evaluating the cybersecurity capacity of the industrial workforce. Journal of Systems and Information Technology.

The current competitive environment in businesses attract more cybercrimes. Human factor contributes to the success of securing the networks and the data within the organization. Knowledge and skills capabilities are essential in creating an enhances cyber security preparedness. The human factor, accountabilities and proficiencies play an important role in securing the system of networks.

I chose the article because it is linked to the need of training employees in the process of enhancing cloud computing security. The paper has also been peer reviewed.

Jimenez, J. I., & Jahankhani, H. Bring Your Own Device: GDPR Compliant or Headache? The Human Aspect in Security and Privacy.

The articles describe the importance of general data protection Regulation (GDPR) in a Bring Your Own Device (BYOD) work environment. the multi-layer of information Governance framework is important to build a secure space for whole the workers to maintain data privacy and protection of personal devices during operation.

The article is important in directing my research on the need and components which are needed to train the personnel on data protection and security issues within the work environment in BYOD policiies.

Balozian, P., Leidner, D., & Warkentin, M. (2019). Managers’ and employees’ differing responses to security approaches. Journal of Computer Information Systems, 59(3), 197-210.

The article emphasizes the need of internet security Policy (ISP) in achieving best security results in an organization. The ISP on a lower and higher level encourages the employees while guiding on the decision-making process within the organization. The employees have liberty to make decisions on the policy guidelines and training.

The choice of the article is congruent with the aim of research paper on enhancing security through a multilevel approach. The multilevel employees have a chance to participate in the cyber security issues, response and compliance.

Hu, H., & Wang, G. (2018). Revisiting Email spoofing attacks. arXiv preprint arXiv:1801.00853.

The article details the occurrences of spoofing in a email platform. The E-mail providers have a responsibility of detecting spoofing but in most cases after detection they can still allow the emails in to enter the inbox. The phishing process lacks a warning on the incoming security attacks. The lack of visual security cues worsens the security assurance within the organization.

The article is important in the research since it outlines the need to educate employees on approaching emails with caution. Phishing is a predominant method for cyber crimes since it can go undetected. The employees require policies and training on handling emails.

Ghaffari, F., Gharaee, H., & Arabsorkhi, A. (2019, April). Cloud Security Issues Based on People, Process and Technology Model: A Survey. In 2019 5th International Conference on Web Research (ICWR) (pp. 196-202). IEEE.

The paper comprehensively identifies some of the security challenges in cloud computing. Cloud computing security relies on the interaction of processes, technology and people. The article explores the processes, technology and people as a means of achieving efficient, cost effective and feasible security solutions. The knowledge on the interaction of the three elements improves the managers and security sectors to solve the security issues effectively.

The article is relevant to my research since it gives the three-dimensional approaches on security issues. Enhanced knowledge creates a platform for perfect security issues handling. References

Ani, U. D., He, H., & Tiwari, A. (2019). Human factor security: evaluating the cybersecurity capacity of the industrial workforce. Journal of Systems and Information Technology.

Ashibani, Y., & Mahmoud, Q. H. (2017). Cyber physical systems security: Analysis, challenges and solutions. Computers & Security, 68, 81-97.

Balozian, P., Leidner, D., & Warkentin, M. (2019). Managers’ and employees’ differing responses to security approaches. Journal of Computer Information Systems, 59(3), 197-210

Ghaffari, F., Gharaee, H., & Arabsorkhi, A. (2019, April). Cloud Security Issues Based on People, Process and Technology Model: A Survey. In 2019 5th International Conference on Web Research (ICWR) (pp. 196-202). IEEE

Hu, H., & Wang, G. (2018). Revisiting Email spoofing attacks. arXiv preprint arXiv:1801.00853.

Jimenez, J. I., & Jahankhani, H. Bring Your Own Device: GDPR Compliant or Headache? The Human Aspect in Security and Privacy.

Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Applications, 75, 200-222.

iWriteHomework
Order NOW for a 10% Discount
Pages (550 words)
Approximate price: -

Why Us?

Top Quality and Well-Researched Papers

All ourbpapers are written from scratch. In fact, Clients who ask for paraphrasing services are highly discouraged. We have writers ready to craft any paper from scratch and deliver quality ahead of time.

Professional and Experienced Academic Writers

Our writers keeps you posted on your papers progress - providing you with paper outline/draft. You are also at liberty to communicate directly with your writer.

Free Unlimited Revisions

If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.

Prompt Delivery and 100% Money-Back-Guarantee

All papers are always delivered on time, in many cases quite ahead of time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.

Original & Confidential

We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.

24/7 Customer Support

Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.

Try it now!

Calculate the price of your order

Total price:
$0.00

How it works?

Follow these simple steps to get your paper done

Place your order

Fill in the order form and provide all details of your assignment.

Proceed with the payment

Choose the payment system that suits you most.

Receive the final file

Once your paper is ready, we will email it to you.

Our Services

No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.

Essays

Essay Writing Service

No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.

Admissions

Admission Essays & Business Writing Help

An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.

Reviews

Editing Support

Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.

Reviews

Revision Support

If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.