.

Wednesday, May 6, 2020

Analysis of Cryptographic Algorithms †Free Samples to Students

Question: Discuss about the Analysis of Cryptographic Algorithms. Answer: Introduction: In this article, Ab Rahman and Choo (2015) discussed the information security incident handling strategies in order to mitigate the risks regarding availability, confidentiality as well as integrity of the organizational assets. The aim of this article is to contribute to knowledge gaps to handle of incidents within cloud environment. The standards and guidelines are used to review existing academic incident handling model. Four phases are discussed to handle the information security incidents handling such as preparation phase, in which the organizations are minimizing impacts of security incidents. Detection and analysis phase detects the unusual events and reports. After the incidents are detected, an efficient response is undertaken. Proactive degree is so little that immediate activities are taken position. Suppression as well as recovery is the required actions to be taken as incident responses. Post incident is a phase that contributes to final phase after the incidents are re solving. The information and internet users are facing one and more security breaches. The breaches are unauthorized access to the information of customers such as stealing of personal details and financial records of online login details. Using the triple R framework, the selected article is reviewed based on its relevance, reliability and reputable. The main limitation of this article is that a collaborative cloud incident management platform is not discussed to share information among various stakeholders, make easy real-time incident handling as well as replies to the malicious cyber actions within synchronized time. In this article, Jing et al., (2014) analyzed that internet of things (IoT) plays a key significant role and its security is important. IoT is to be building on basis of internet, and therefore the security problems are also show up into IoT. This particular article provides relevant information on security harms of each layer and tries to locate out innovative problems as well as results. It was found that at last this paper investigates the security issues among IoT as well as traditional network, and discussed of opening security issues among IoT. Standardization of the awareness of data processing for potential IoT is greatly preferred. Hackers, malicious software and also viruses into communiqu channel can disturb the data and information truthfulness. Expansion of IoT technology can directly threat the overall IoT system. Protection over data and security is one of the key applications challenges for the IoT. Three of the IoT layers are analyzed with its key security problems o f each layer. The future direction of this paper is to revise lightweight solutions for IoT system such as access confirmation and direct. The limitation is lot of discussion is not there on network control technologies. In this particular article, Alavi, Islam and Mouratidis (2014) discussed on the conceptual framework of securing information assets which is challenging for the organization to use of information system for supporting business processes. The paper reviews on information security management system (ISMS) to set up security structure as well as regulate of proper way to secure information system. It is relevant to get knowledge on solid security framework ensures for confidentiality, accessibility, legitimacy as well as adaptability of significant information assets. This paper analyzes the importance to understand main human factors within efficiency of ISMS. Goal modeling structure is discussed to provide an understanding of forces that are used to promote of security postures. The future work is based on evaluation of proposed framework to make sure that goal modeling framework is generalized into organizational context into real world. The support is favorable for better considerat e of the human factors into procedure of ISMS that leads to underlying principle change into organizational contexts. It provides of rational metrics for the security. The information security systems are rule bound as well as exclusive. It provides of a comprehensive environment that are more efficient. In this article, AlHogail (2015) discussed an establishment of information security culture (ISC) within the organization that influences employees perceptions as well as security behavior that can protector against the security threats. This particular paper also concerns on developing an inclusive information security cultural framework for the business. STOPE (Strategy, technology, organization, people and environment) is used as a framework where different information security issues are being integrated. ISC framework consists of change management principles to grow the culture of information security. It assists to develop of an effective informational security culture which protects against the information assets. With use of STOPE scope, the issues are covered and mitigated. The limitation of this article is that framework dimensions are not properly discussed which help to achieve objectives and reduce economic cost due to security threats. In the future, the research is exp anded to look on more frameworks using case study analysis in order to produce an evidence of theoretical framework. An assessment tool is used to measure information security cultural levels. The article is relevant as it designs of information security culture framework for the security issues due to use of internet. The information provided into the paper is reputable for validating the security framework. In this article, Ahmad, Maynard and Park (2014) discussed on prevention of security attacks with use of technical countermeasures. Qualitative study is discussed to implement of security strategies in order to protect information system. Prevention is aimed to protect of informational assets proceeding to protect of attacks by prohibition of unauthorized access. The identified countermeasures are deployed to outlook block of the attacks into the organization. The main focus of this context is to examine extent to different security strategies that are deployed, optimized as well as collective in reaction to the security environment. The strategies are identified based on time and space. The strategies address insider as well as outsider threats to prevent the technical security risks. The limitation of this study is that it conducted into Korean organizations. There are issues of generalizability into the organization. This study is relevant and reputable as it develops a security ar chitecture which enables the organization to address the technological challenges into security situation. The final project phase is analyzing in-depth study on Korean organizations case studies to examine relationship that the organization gains from various strategies. The challenge for the researcher is to select the strategies as it impacts the information environment. References Ab Rahman, N. H., Choo, K. K. R. (2015). A survey of information security incident handling in the cloud.Computers Security,49, 45-69. Ahmad, A., Maynard, S. B., Park, S. (2014). Information security strategies: towards an organizational multi-strategy perspective.Journal of Intelligent Manufacturing,25(2), 357-370. Alavi, R., Islam, S., Mouratidis, H. (2014, June). A conceptual framework to analyze human factors of information security management system (ISMS) in organizations. InInternational Conference on Human Aspects of Information Security, Privacy, and Trust(pp. 297-305). Springer, Cham. AlHogail, A. (2015). Design and validation of information security culture framework.Computers in human behavior,49, 567-575. Jing, Q., Vasilakos, A. V., Wan, J., Lu, J., Qiu, D. (2014). Security of the internet of things: Perspectives and challenges.Wireless Networks,20(8), 2481-2501. Acharya, K., Sajwan, M., Bhargava, S. (2014). Analysis of Cryptographic Algorithms for Network Security.International Journal of Computer Applications Technology and Research,3(2), 130-135. Er, M. K., Er, J. K. (2017). Data Encryption Using Different Techniques: A Review.International Journal of Advanced Research in Computer Science,8(4). Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Rao, J. D. P., Rai, M. S., Narain, B. (2017). A study of Network Attacks and Features of Secure Protocols.Research Journal of Engineering and Technology,8(1), 04-08. Stallings, W., Tahiliani, M. P. (2014).Cryptography and network security: principles and practice(Vol. 6). London: Pearson.

No comments:

Post a Comment