Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

INFO5301 Information Security Management : Network Security in a Mixed

Select a topic from the list and conduct research (based on literature, at least three recent research papers) and prepare a summary report with brief supportive descriptions to post on the forum/blog. In your posting you should provide information about the topic (discuss the topic, challenges, problems, describe the relevant technologies, applications of the technologies, clarify vague areas, research questions… etc.)
 
Provide constructive feedback for (at least two) cohort colleagues and receive feedback from (at least two) cohort colleagues on your own design and make refinements accordingly.
 
Raise questions about the information provided by other students (this must be done in an adequately professional manner)
 
Respond to questions raised about your own information and other student's
 
Contribute to discussions in general

1.to build an understanding and perspective of current hot topics in Information Security; and
2. to build generic skills including, but not limited to:

  • a capacity for teamwork and collaboration;
  • an ability for critical thinking, analysis and problem solving;
  • information technological literacy;
  • a capacity for lifelong learning and an appreciation of its necessity.

Answer:

Report from Case study

The android and windows operating system

Most software-based interfaces which are necessary for users to handle the hardware units of the Android operating system. They are more bulky and expensive to use when compared with the mobile devices. The number of android devices is increasing daily and the increase in their features advances as technology diversifies from simple to complex applications.

The report of the research which was carried by some computer science students within the college indicated that people are not aware of the already existing threats resides in smart devices.  The devices which are used to connect to the virtual environment can undergo a great modification and their utilization is passed the limitation. Students are not aware that communication can be supported out through the mobile eq


uipment to facilitating the daily life. The new model of these devices allows one to command experience and stores the entire session of a user. These data can later be retrieved and be used as security constraints at the server disposal point.

The undefended network setting which accepts anonymous applications can connect to unknown locations within a website and extract documents and files. Visiting unknown sites was mentioned as one of the dominant sources of these threats. Some safety precautions were to be taken for the android equipment and accessories which the organization’s secrecy is reserved.

The research encompassed the dangers of internet things. The securities and the internet and privacy is a danger that is encrypted from any user’s device. Falk’s thought that the matter would be simplified to passwords and hacking ( Shunin & Kiv, 2012).

Smart devices privacy issues.

The Android operating system was developed by the Google. The Android operating system runs Linux system services to enhance its security, process administration, memory supervision, and driver prototype. It also functions as generalization level between the central hardware and software stack which is programmed in C language. Regardless of this modification of these operating system, it is preceded by a lot of threats. Many of threats are discussed in the research articles, (Abdallah, Shen & University of Waterloo, 2016) however, their one which was conducted revealed only a few threats that were found common to almost every user.

 Malware

Malware in its simplest expression which appears to be more malicious and it is intended to deliver a perfect data that is more specific and that cannot be detected by the user. When a malware enters a computer, it caused malicious damages to users’ documents and files. When its spread grows viral, it can demolish the whole system. The malware software comes as a pop ups add in or adds from unknown advertisement and are easily downloaded by the users. The major malicious software was found to be Trojans, Worms, Virus and Spyware.

Vulnerability of system software

This is the act of being delicate and not having power to offer required protection. Vulnerability of a system is said to exist when a computer device becomes extinct to implement the safety of input devices when linking with a particular network. Mobile devices have limited use of the Internet and networking environment, there are no firewalls to govern user accessibility protocols which becomes a crucial need that needs to be established and set to function for the overall ability of the system software. Because of this reason, the devices has been rendered highly vulnerable to attacks (Yao & Shin, 2013). A hacker who is also referred to as an interrupter or destroyer of networking systems as a result, gets an easier way to access the mobile devices through the unsecured ports. This has been a main problem affecting the internet systems that relates to social media, business sites, and software development sites among others. Among the most crucial effects have been in the banking systems where the hackers hack in to customers’ accounts hack the system and get all the money. To help reduce that, it has been recommended that a stronger firewall should be installed to protect these ports. When this is done, any guest user will not be permitted to connect to any device without the required security details. There may be unauthorized changes which take place during this process but should be honored by the owners.

The usability of computers is so versatile in daily life applications that nobody could be willing to quit any platform to old generation applications. In all sectors of life from education, business, health, agriculture among many others computers have been key to enhance delivery and productivity in the social institutions. This argument was used to secure proper strategy which was to be implemented to aid in mitigating the security issues of these devices. All these methods were accepted to be precise and easily adaptable by a common computer user. The support given by the stakeholders is very important in ensuring the processes put in place follow all the required steps.

How encrypt computers.

There exist a lot of operations which can be done by a computer manufacturing company who tries to gather data for malfunctions. A strong firewall can be installed for these devices (Hardware Firewall) through a computer that software that it is running since they are vulnerable.  Using a firewall ensures that data will not fall into wrong hands ( Rosenfeld and  Ramesh , 2010). A user can as well change their passwords of the devices to better the security performance of their computers. All smart devices have a default password. These passwords can be changed before anyone hooks it up with rest of the network linked to the Internet. Computer users should only buy those products from standard trademarks who comply with the local laws. Chances of being embittered will be reduced when the user go for branded devices.

Conclusion:

The safety of a computer is both an ethical responsibility and educational constraint of a company that should be strictly maintained. Manufacturing companies should include a clear consumer guide to the Internet that describes how to secure the Internet that will be successful only if the stakeholders are also included. By making the users aware of the many existing security   issues and the main need to fight against them in the computers systems it’s important to help fight against it. All the threats become very harmless when serious precautions are undertaken and maintained to ensure that the systems are safe to ensure the developments of the system. Therefore, nobody should be discouraged to stop using the smart devices but should be encouraged to ensure their devices are highly protected.

References:

Abdallah, A., Shen, X., & University of Waterloo. (2016). Security and privacy in smart grid.

Blacharski, D. (1998). Network security in a mixed environment. Foster City, CA: IDG Books Worldwide.

NATO Advanced Research Workshop on Nano devices and Nanomaterials for Ecological Security, Shunin, Y. N., & Kiv, A. E. (2012). Nanodevices and nanomaterials for ecological security. Dordrecht: Springer.

SecTech (Conference), Kim, T., & CA (Conference), CES³ (Conference), GST (Conference). (2012). Computer applications for security, control and system engineering: International Conferences, SecTech, CA, CES3 2012, held in conjunction with GST 2012, Jeju Island, Korea, November 28-December 2, 2012. Proceedings. Berlin: Springer.

Becher, F. C. Freiling, J. Hoffmann, T. Holz, S. Uellenbeck and C. Wolf, ?Mobile security

Catching up? Revealing the nuts and bolts of the security of mobile devices?. In Security and Privacy (SP), (2011), pp. 96-111.

Rosenfeld and K. Ramesh, ?Attacks and Defenses for JTAG?, IEEE Design & Test of Computers,  vol.27, no. 1, (2010), pp. 36-47.
Boyd and P. Forster, Time and date issues in forensic computing—a case study. Digital Investigation, vol.1, no.1, (2004), pp. 18-23.
C. Freiling, T. Holz and M. Mink, ?Reconstructing People's Lives: A Case Study in Teaching  Forensic Computing?, In IMF, (2008). pp. 125-142.
Marforio, R. J. Masti, C. Soriente, K. Kostiainen and S. Capkun, ?Personalized Security Indicators to  Detect Application Phishing Attacks in Mobile Platforms?, arXiv preprint arXiv: 1502.06824, (2015).
Yao and D. Shin, ?Towards preventing QR code based attacks on android phone using security  warnings?, In Proceedings of the 8th ACM SIGSAC symposium on Information, computer and Communications security, (2013), pp. 341-346.

Buy INFO5301 Information Security Management : Network Security in a Mixed Answers Online

Talk to our expert to get the help with INFO5301 Information Security Management : Network Security in a Mixed Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.

Get Online Support for INFO5301 Information Security Management : Network Security in a Mixed Assignment Help Online

Copyright © 2009-2023 UrgentHomework.com, All right reserved.