Wednesday, May 6, 2020

Transactions on Information Forensics and Security †Free Samples

Question: Discuss about the Transactions on Information Forensics and Security. Answer: Introduction: According to this particular article, network security is an important part of modern technology that is based on the internet and the virtual world. With the massive advancement of modern computing and information technology, the security threats are also increasing day by day. Hence, they have reiterated their concern regarding the situation of network security in the current world. They expressed in their works that network security issues are the fastest growing problems in the modern technology as the unethical users of the internet are using unethical techniques to steal information from other organizations or entities. Sometimes, the information is used as a medium for ransom. In this article, the authors have emphasized their works mainly on the nature of the network security issues that are consistently threatening the world technology at the current time. They said that the main security threat comes from the numerous malwares that are spread throughout the internet in the forms of popups, website links, patch files and others by some unethical users of the internet. These files have the capability to create malfunctions inside a system or even destroy it in certain conditions. Although these files can be removed more or less easily, there are massive threats as they go undetected most of the times while entering the system. The authors in their work emphasized on the subject of hacking that have become the biggest threat to the online virtual world these days. Using strong hacking techniques, hackers are able to access even the most secure information from different organizations and use them for ransom or even sell them to the rival organizations in exchange of money. With the development of technology, the technologies of the hackers are also advancing at an alarming rate and as a result, they now have the power to take over the entire server of an organization, even if it is for a few minutes. Within this small period of time, the hackers are able to extract the secure pieces of information that are stored inside the server. Virtualization of the storage systems has further attracted the attackers to steal the data and information. In exchange of return, the hackers either claim large ransom or sell them to a rival organization. In this article, the authors have discussed about possible effects of these security issues on the computing world. They have first raised the concern that the most basic level of effect is the stealing of personal information of different persons for doing unethical works and transactions with identity masking. However, they have expressed that the far reaching consequences are even worse than this problem. Due to the hacking of the servers of different private or government organizations, secure data and information are lost. While the business and other similar data generates high sale or ransom values, the organization and eventually the country faces economic crisis due to virtualization of the monetary unites. On the other hand, from government organizations, defense and security data can be stolen and might be sent to rival countries by the hackers, resulting in the wars. The authors here have discussed about possible solutions for the network security issues. They have advised the common and general users to use strong firewalls and antivirus security softwares to protect the system. According to them, these will be more or less sufficient for home connections. However, they also said that the large organizations need to revamp their existing IT model and reinforce cyber security options before starting daily operations of business and others. References Carter, K. M., Idika, N., Streilein, W. W. (2014). Probabilistic threat propagation for network security. IEEE Transactions on Information Forensics and Security, 9(9), 1394-1405. Daya, B. (2013). Network security: History, importance, and future. University of Florida Department of Electrical and Computer Engineering. Durairajan, M. S., Saravanan, R. (2014). Biometrics Based Key Generation using Diffie Hellman Key Exchange for Enhanced Security Mechanism. International Journal of ChemTech Research CODEN (USA): IJCRGG, 6(9), 4359-4365. Gelenbe, E., Grbil, G., Tzovaras, D., Liebergeld, S., Garcia, D., Baltatu, M., Lyberopoulos, G. (2013). NEMESYS: Enhanced network security for seamless service provisioning in the smart mobile ecosystem. In Information Sciences and Systems 2013 (pp. 369-378). Springer, Cham. Kahate, A. (2013).Cryptography and network security. Tata McGraw-Hill Education. Knapp, E. D., Langill, J. T. (2014).Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems. Syngress. Manshaei, M. H., Zhu, Q., Alpcan, T., Bac?ar, T., Hubaux, J. P. (2013). Game theory meets network security and privacy.ACM Computing Surveys (CSUR),45(3), 25. Perlman, R., Kaufman, C., Speciner, M. (2016).Network security: private communication in a public world. Pearson Education India. Shin, S., Wang, H., Gu, G. (2015). A first step toward network security virtualization: from concept to prototype. IEEE Transactions on Information Forensics and Security, 10(10), 2236-2249. Stallings, W., Tahiliani, M. P. (2014).Cryptography and network security: principles and practice(Vol. 6). London: Pearson.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.