Annotated bibliography on the articles
Rahulamathavan, Y., Rajarajan, M., Rana, O. F., Awan, M. S., Burnap, P., & Das, S. K. (2015). Assessing Data Breach Risk in Cloud Systems. 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), Cloud Computing Technology and Science (CloudCom), 2015 IEEE 7th International Conference on, Cloud Computing Technology and Science (CloudCom), 2013 IEEE 5th International Conference On, 363–370. https://doi-org.proxy.ulib.uits.iu.edu/10.1109/CloudCom.2015.58
The article focuses on the different cloud computing networks existing in the market, exploring their susceptibility to a data breach. It states that there exist several cloud environments, but most people are not entirely in support of them as they do not adequately address the security concerns that are the primary concern for most users. Therefore, it asserts the existence of both passive and active data breaches exploring a framework for analysis that people can employ to determine the breach risk that every platform may be susceptible to.
The main argument of the assessment frameworks is the identification of weaknesses that are likely to pose the system vulnerable. These attack routes are therefore simulated to a real-life scenario to inform an estimation of the capability of attack, which provides a base for decision-making based on the situations.
The article concludes by asserting that assessment followed a maximum utility approach where there is a measurement of risk capabilities on some quantified parameters. This, therefore, allows a client to inform his or her choice on the service with a lower chance of being breached. The model enables security parameters that are of concern to be given more priority, thus ultimately informs the decision to seal such loopholes.
Kumari, C., Singh, G., Singh, G., & Singh Batth, R. (2019). Security Issues and Challenges in Cloud Computing: A Mirror Review. 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Computational Intelligence and Knowledge Economy (ICCIKE), 2019 International Conference On, 701–706. https://doi-org.proxy.ulib.uits.iu.edu/10.1109/ICCIKE47802.2019.9004361 Don't use plagiarised sources.Get your custom essay just from $11/page
The article affirms that with the development of cloud computing, concerns over data security have been on the rise. In this regard, it provides the security concerns that have remained imperative due to advancement in technology. It also shows the various countermeasures that have been put in place to tackle the data breach issues.
The main arguments of the article base on areas of smart cities and the internet of things in addition to cloud computing and big data. Some of the issues on smart cities bases on transition parameters, storage concerns, intrusions on intelligent devices, and repurposed data issues. On cloud computing, significant issue is hijacking, loss in data and accessibility and finally trust challenges in for service providers. On big data, concerns range from securities related to cryptography, forgery and trust issues. However, the countermeasures include robust access and control mechanism, authentication, anonymity, recovery control mechanisms and improvement in the quality of data.
The article concludes by showing that the underlying concern is that data requires protection from potential thieves. The continuous changes and improvement in technology are posing the globe to more security concerns; thus, a requisite to put privacy as the underlying pattern. The article also concludes highlighting big data, cloud computing and smart cities as the areas more susceptible to attack.
Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. WIREs: Data Mining & Knowledge Discovery, 7(5), n/a-N.PAG. https://doi-org.proxy.ulib.uits.iu.edu/10.1002/widm.1211
Cheng et al. in their article focuses on the data leaks that happen in enterprise data, gives an account of recent data leak accidents that have been seen in the past. Moreover, it provides the available solutions that have been put in place to address the data leakages, challenges that affect the sector as well as new developments that hint possible solution to the difficulties witnessed in this sector. They explore the various techniques that researchers have put in place in an attempt to find solutions to the data breach issues.
The main argument of the article is that breaches exist in two forms, which are intentional and inadvertent threats. Based on these two forms, precautionary measures should align with each risk based on the possibility of occurrence on the premise of company assessment. The article also lists some of the data breach incidents that have seen in the past to provide an overview of how such factors can impede the development of firms. In addition, the article focuses on DLPD techniques highlighting the different types, their challenges, and how they have been effective in controlling the threats.
The article concludes s by affirming that leaks require continuous investment and effort by organizations. It accords that there are various techniques for detection and prevention though there still exist an array of opportunities for research on a possible solution. However, the article affirms that the eventual solution is promising as there has been exploitation of major weakness points.
Dolezel, D., & McLeod, A. (2019). Cyber-Analytics: Identifying Discriminants of Data Breaches. Perspectives in Health Information Management, 1–17.
Dolezel, in her research, explores the various ways in which the breaches affect the people. It highlights the nature of the breaches exploring how the occurrence tends to have a negative consequence on the people responsible or associated with the data. The baseline of the research is to know how the breach affects people either geographically and how, in particular, it affects the people involved. It is related to the previous articles in that it bases on data breaches.
The main idea of the research was to find a correlation between the breach and the people. Specifically, the unauthorized access occurred in network server locations. Also, the people affected by the data breaches in business associates was four times worse than the effects seen in healthcare providers. However, the geographic location did not predict the number affected.
The article concludes that there is an increase in the number of people affected by breaches, even with sufficient awareness of the same. Ransomware and medical identity attacks are the most prone, thus poses health workers to significant impact when they occur. Knowing the risks related to breaches is therefore critical in enlightening firms on the relevant means to protect data.