This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Annotated bibliography on the articles

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Annotated bibliography on the articles

Rahulamathavan, Y., Rajarajan, M., Rana, O. F., Awan, M. S., Burnap, P., & Das, S. K. (2015). Assessing Data Breach Risk in Cloud Systems. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), Cloud Computing Technology and Science (CloudCom), 2015 IEEE 7th International Conference on, Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference On, 363–370. https://doi-org.proxy.ulib.uits.iu.edu/10.1109/CloudCom.2015.58

The article focuses on the different cloud computing networks existing in the market, exploring their susceptibility to a data breach.  It states that there exist several cloud environments, but most people are not entirely in support of them as they do not adequately address the security concerns that are the primary concern for most users. Therefore, it asserts the existence of both passive and active data breaches exploring a framework for analysis that people can employ to determine the breach risk that every platform may be susceptible to.

The main argument of the assessment frameworks is the identification of weaknesses that are likely to pose the system vulnerable. These attack routes are therefore simulated to a real-life scenario to inform an estimation of the capability of attack, which provides a base for decision-making based on the situations.

The article concludes by asserting that assessment followed a maximum utility approach where there is a measurement of risk capabilities on some quantified parameters. This, therefore, allows a client to inform his or her choice on the service with a lower chance of being breached. The model enables security parameters that are of concern to be given more priority, thus ultimately informs the decision to seal such loopholes.

Kumari, C., Singh, G., Singh, G., & Singh Batth, R. (2019). Security Issues and Challenges in Cloud Computing: A Mirror Review. 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Computational Intelligence and Knowledge Economy (ICCIKE), 2019 International Conference On, 701–706. https://doi-org.proxy.ulib.uits.iu.edu/10.1109/ICCIKE47802.2019.9004361

Don't use plagiarised sources.Get your custom essay just from $11/page

The article affirms that with the development of cloud computing, concerns over data security have been on the rise. In this regard, it provides the security concerns that have remained imperative due to advancement in technology. It also shows the various countermeasures that have been put in place to tackle the data breach issues.

The main arguments of the article base on areas of smart cities and the internet of things in addition to cloud computing and big data. Some of the issues on smart cities bases on transition parameters, storage concerns, intrusions on intelligent devices, and repurposed data issues.  On cloud computing, significant issue is hijacking, loss in data and accessibility and finally trust challenges in for service providers.   On big data, concerns range from securities related to cryptography, forgery and trust issues.  However, the countermeasures include robust access and control mechanism, authentication, anonymity, recovery control mechanisms and improvement in the quality of data.

The article concludes by showing that the underlying concern is that data requires protection from potential thieves. The continuous changes and improvement in technology are posing the globe to more security concerns; thus, a requisite to put privacy as the underlying pattern. The article also concludes highlighting big data, cloud computing and smart cities as the areas more susceptible to attack.

Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. WIREs: Data Mining & Knowledge Discovery, 7(5), n/a-N.PAG. https://doi-org.proxy.ulib.uits.iu.edu/10.1002/widm.1211

Cheng et al. in their article focuses on the data leaks that happen in enterprise data, gives an account of recent data leak accidents that have been seen in the past. Moreover, it provides the available solutions that have been put in place to address the data leakages, challenges that affect the sector as well as new developments that hint possible solution to the difficulties witnessed in this sector. They explore the various techniques that researchers have put in place in an attempt to find solutions to the data breach issues.

The main argument of the article is that breaches exist in two forms, which are intentional and inadvertent threats.  Based on these two forms, precautionary measures should align with each risk based on the possibility of occurrence on the premise of company assessment.  The article also lists some of the data breach incidents that have seen in the past to provide an overview of how such factors can impede the development of firms. In addition,  the article focuses on DLPD techniques highlighting the different types, their challenges, and how they have been effective in controlling the threats.

The article concludes s by affirming that leaks require continuous investment and effort by organizations. It accords that there are various techniques for detection and prevention though there still exist an array of opportunities for research on a possible solution.  However, the article affirms that the eventual solution is promising as there has been exploitation of major weakness points.

Dolezel, D., & McLeod, A. (2019). Cyber-Analytics: Identifying Discriminants of Data Breaches. Perspectives in Health Information Management, 1–17.

Dolezel, in her research, explores the various ways in which the breaches affect the people. It highlights the nature of the breaches exploring how the occurrence tends to have a negative consequence on the people responsible or associated with the data.  The baseline of the research is to know how the breach affects people either geographically and how, in particular, it affects the people involved. It is related to the previous articles in that it bases on data breaches.

The main idea of the research was to find a correlation between the breach and the people. Specifically, the unauthorized access occurred in network server locations. Also, the people affected by the data breaches in business associates was four times worse than the effects seen in healthcare providers. However, the geographic location did not predict the number affected.

The article concludes that there is an increase in the number of people affected by breaches, even with sufficient awareness of the same. Ransomware and medical identity attacks are the most prone, thus poses health workers to significant impact when they occur.  Knowing the risks related to breaches is therefore critical in enlightening firms on the relevant means to protect data.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask