Sign In
Not register? Register Now!
You are here: HomeCourseworkIT & Computer Science
Pages:
4 pages/≈1100 words
Sources:
6 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 25.92
Topic:

Annotated Bibliography on Cybersecurity and data protection (Coursework Sample)

Instructions:
Was to look for 6 sources on cyber security and data protection against the same and produce an annotated bibliography on the same source..
Content:
Annotated Bibliography Name University Annotated Bibliography Andreasson, K. (2012). Cybersecurity: Public Sector Threats and Responses. New York: CRC Press. The book is aimed at creating awareness of the threats faced as a result of our over reliance on the internet for our information requirements both at an offical working capacity and our personal level. While the author would not like us to relapse and reduce our use of information technology he provides case studies and emerging trends that outline the need to be cautious. The book concentrates on the threats as perceioved by those in the governmenst and goes ahead to provide solutions to these issues and how they can be averted. The case studies covered are the ones affecting the US federal government and the policies that were established to deal with them by various agencies. The book is targeted at those who are working for the US government and are charged with formulating policies to guide the others who might be facing similatr threats. The book fails to appareciate the unique challenges faced by other nations and it might not come in handy as one that can be recommended for their proplems and policy matters which might not be applicable to their situations. Chen, Y.-F. R. (2015). The Growing Pains of Cloud Storage. IEEE Internet Computing, 4-7. The purpose of this article is to outline the problems and the unique challenges that cloud data storage go through with the growing demand for more data storage requirements. The article notes that the number of internet users has been increasing at an alarming rate and in the same respect their data requirements have gone high considering that they use of the computer for their business transactions including advertising and the popularity of the social media sites. The article is targeted at the cloud computing experts, students and analysts interested in this subject content and are meant to make them appreciate the arising challenges and goes further to give suggestions on the technical means that can be used to avert these problems. With the demand for more data then experts in the field cannot proceed without taking this aspect into consideration and hence the relevance of the article. By the fact the research was undertaken with the AT&T laboratories from the technical aspect then the readers can be assured that the technical details will come in handy and do not need to be tested once again. Eichensehr, K. E. (2015). Cyberwar & International Law Step Zero. Texas International Law Journal, 50(2), 355-378. The article observes the challenges posed by cyber security threats on an international scale bearing in mind that some domestic laws are either too slow or lacking the jurisdiction to address and deal with the culprits effectively. The book observes that there has been a clash between technological innovations and the formulations of the laws that are meant to offer protection in case of renewed threats from the advancements. The book observes that there has been an ongoing debate on whether the international laws on war can also have a clause to deal with cyber threats. The biggest issue being whether the said laws can be used to regulate technology that are perceived to be harmful by the use of internationally binding treaties. It gives much insight by providing a case study of cyber weapons and ways that they can also be subjected to existing laws of war. The article concludes by calling for the modification of existing laws to tackle this threat effectively together with the accompanying complications. The article targets policy makers and law students and professionals on an international scale and presents its arguments quite clearly. However the article fails to provide a clear proposed solution to deal with the problem and it instead leaves the reader with more questions with a helpless perception especially with the poor relations existing between various blocs, nations and regions. Hassanien, A. E. (2014). Bio-inspiring cyber security and cloud services: Trends and innovations. The book gives an account of the research activities that have been undertaken in the field of cyber security and the progress that has been made in this context. It goes further to state how organizations can benefit from the utilization of the various security techniques that have been developed and are currently feasible in real life scenarios. In addition the book provides detailed accounts of some cutting-edge technologies, pseudo codes, applications, and approaches that have been taken towards encouraging the appreciation of cyber security-based systems. The book targets those undertaking studies related to cyber security at various levels and other readers seeking to advance their knowledge on the topic. The book is too technical and fails to give case studies which can be used as proof for the application of the innovations and techniques listed. Therefore, it might not impress the practitioners in the field to invest in the various approaches outlines in the book. Hulme, G. V. (2015). Cloud Security Comes of Age. Forbes, 62-63. The arti...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Types Of Relationships That In Cardinality Coursework
    Description: The number of associations that can exist between two record types. Identify the three types of relationships that deal with cardinality and explain each one....
    2 pages/≈550 words| 3 Sources | APA | IT & Computer Science | Coursework |
  • Factors In A Business Indicate The Need For Simulation
    Description: What is monte carlo simulation? Where does the name come from? What does it consist of? What is the difference between simulation and modeling? ...
    5 pages/≈1375 words| 6 Sources | APA | IT & Computer Science | Coursework |
  • Bridging versus routing
    Description: Bridging versus routing IT & Computer Science Coursework...
    4 pages/≈1100 words| 3 Sources | APA | IT & Computer Science | Coursework |
Need a Custom Essay Written?
First time 15% Discount!