Executive Summary
This risk assessment follows the risky political environment that is being experienced at the Global finance company. Typically there is risk of cyber attack because some of its IT devices have fallen into the public domain. Additionally, the management fears that the there has been distrust among its customers because they view the current IT system as unreliable. customers think that their information is not securely stored. Considering that global finance company is an established company that manages finance accounts it is of paramount importance to ensure all its IT system are secure and free from any kind of breach. the company deals with financial management, loan application approval, wholesale loan processing, and investment of money management for their customers. This assessment is necessary on indentifying the risk and identifying the best measures to mitigate such risks.
Objective and purpose of the risk assessment
The risk assessment will try to identify vulnerabilities, shortcomings and loopholes and threats on the current IT systems and infrastructure. It will be useful in evaluating the best methods that can be used to reduce the available risks and threats. It will also try to evaluate the value of the available information resources in the Global finance company.
Delegate your assignment to our experts and they will do the rest.
Ideally, the total risk facing the organization will be shown by identifying the threats that the company is facing and highlighting the vulnerabilities that the company is being exposed to as a result of the available threats. The asset value will also be important in making the risk assessment successful.
The objective of this risk assessment is to show how the threats such as the ineffective system and computer hardware, the current work environment and customer dissatisfaction can impact the financial organization. The risk assessment will try to come up with the measures that the IT department can employ in reducing these risks.
Identifying the risks and threats
Outsourcing
Among the major risks that the organization is open an attempt to outsource tasks and responsibilities. The management indication to try and outsource the services and functions of the IT department might be putting the company at risk. The belief that outsourcing is the only solution that can be used to address the flaws that the IT department is facing might is wrong. In this regard, the CEO has been downsizing the IT resources and staff. This is a big threat to the company because it is pilling pressure on the available personnel. When a highly-experienced officer is dismissed, the impact will be felt among the remnant IT staff. If the downsizing goes on it will mean most of the IT functions and operations will go unattended (Laudon, & Laudon, 2015).
Unreliable Hardware
The company also indicates it has unreliable and unsecure database; its oracle database server was attacked. the consequence was that the customer database lost its confidentiality, integrity and availability. Ideally this means that the company system and IT infrastructure was vulnerable. the attack can simply be termed as a cyber attack or hacking (Buecker, Andreas, & Paisley, 2008). Usually the oracle database hacking occurs in many ways. according to IT experts hacking oracle database is not much complicated. Nowadays hackers are using Script kiddies to hack into oracle databases. Typically the script Kiddie are tools comprising of scripts and codes and are used to hack into existing computer systems. Though this is a simplified way of hacking it can be used to steal, manipulate and transfer files (Wang, & Lu, 2013).
During the Global Finance Company database attack, the script kiddies might have been used to generate codes and scripts to that were utilized to gain access and manipulate data. Initially script kiddie tool had been developed as easy to use, automated software that can be used to break into oracle databases. The software used the internet to simulate cyber attacks. Considering the company deals with loan application and financial management such an attack would be risky to customer’s private information. such information might include the passwords, ATM pins, credit card numbers, financial account information and loan application information.
The oracle database attack on the global financial company is difficult to determine where it was done from. Nowadays hackers are operating from all over the globe and are hard to trace them. Hack threats and attacks are originating from within ad overseas. Major companies have been complaining of automated hacker bots from rogue programs. Experts warn that this programs and attackers are using the internet to look for organizations with easy access and therefore vulnerable (Hashizume et al, 2013).
There was also some failure in the management because the security on the computer hardware was not sufficient. The company might be termed as being vulnerable because despite handling sensitive client’s information and details, the database being used is weak to break into. Additionally, the corporate internal database is not secure in the sense that there is no use of encryption.
In addition to the oracle database attack the company’s computer system and IT infrastructure is vulnerable. The attack by malicious virus that happened to the system in 2014 is a proof of that. similar to other malicious attacks, the attack on global financial organization was extensive and affected the entire network. The oracle and email for the company was affected by the attack. these are critical elements of the company because they are used in handling customer data – including their detailed financial information. according to computer experts the attack could have been caused by viruses, spyware or malwares. a virus is an executable file or program that has the capability of self replicating and self modify and causes disruption to computers functionality and operations (Chang, & Ramachandran, 2016).
Viruses are malicious and risky in an IT system because they multiply in a network, memory or storage area. Depending on the part of computer that was harmed, the viruses cause substantial losses; for instance in the global financial scenario the virus attack affected the oracle database and the emails leading to a complete shutdown. the company suffered a $1, 700, 000 in revenue.
The viruses on computers may limit the users or owner from accessing the system. Additionally they may hinder one’s ability to use the computers efficiently. There is also indication that the viruses make the system give inaccurate output. Though it might be tricky to establish what the entry area of the virus was, there are numerous ways that the IT department could have learnt of the presence of a virus attack. The IT staff could have evaluated the speed of the computers (Burton, & Martin, 2014). Typically, the presence of viruses in computers makes them to lag in operations. The computer might also hang frequently and display inconsistent error messages.
The initial steps of mitigating a virus attack would involve purchasing and installing an antivirus. the best pro-anti viruses would protect the computer and IT system from all types of malware, spyware, hijackers, identity theft, key loggers, unwanted software, pop-ups, tracking threats and rogue anti spyware. Additional protection will include preventing the computer system form phishing, bots and worms (Fernandes et al., 2014). This upgraded antivirus will offer a firewall module protection on local network and the internet.
Using Network Typology To Assess Value Of The Infrastructure
Asset | Make | Description | Quantity | Price in $ |
Mainframe computers | IBM | The mainframe computers are used to do networking In the IT department | 7 | 490,000 |
Desktop pc | dell | The desktop are used in workstations in various departments. such departments include accounting, loan, customer service, management, credit department and fiancé | 164 | 166,624 |
Laptop/ notebooks | Acer | Heads of department have a laptop as a backup and to allow them remotely undertake tasks responsibilities | 40 | 13,960 |
Mobile phones | Samsung | Used by staffs to remotely undertake their duties and tasks. | 160 | 20,000 |
Tablet | Samsung | This are used in different departments to do monitoring and undertake remote operations | 25 | 2000 |
Multifunctional printers | cannon | Every department has printers | 28 | 3,360 |
Scanners | Epson | Used in various departments | 15 | 2,985 |
photocopiers | sharp | Used in every department | 15 | 2,670 |
Network servers | Dell power edge and supper micro super power stations | Servers available include remote access servers, SUS servers, internet web servers and oracle servers | 4 | 2640 |
External hard disks | Toshiba | It is used to externally store the files data and documents. it s a back up to the storage of the system | 4 | 548 |
Generator set | Champion power | Serves as a power alternative | 1 | 1,200 |
Operating system | Microsoft | It is the main operating system and through it all the other functions of the computer can be accessed | 50 | 5,250 |
software | Mostly Microsoft, and oracle and other financial applications. | They provide handle computer tasks and operations in the firm | 100 | 4500 |
Antivirus | Avast and Avira | They are sued to provide security against malware, spyware and other threats. | 50 | 1750 |
Networking appliances | Cisco | They are used in providing network connectivity in the organization | 40 | 1600 |
Fire wall router | Palo alto firewalls | Is used to manage traffic logs and provide security to the system. | 3 | 900 |
WLAN controllers | Cisco | Used to manage lightweight access points in large networks | 2 | 4000 |
routers | Cisco | There is the border core routers and the distribution routers | 2 | 2000 |
VPN gateway | Express VPN | These are used in connecting local area networks to the internet. | 3 | 717 |
VLAN switches | Cisco | They does broadcast control in an organization infrastructure. they also provide network security to the IT systems. | 5 | 2175 |
PBX | nextiva | This is used to provide IP connectivity to the companies telephone | 2 | 720 |
TOTAL ASSET VALUE | 724,349 |
According to the table above the total asset value for the organization is $724,349. the infrastructure is a complicated one because this is an international financial organization handling large volumes of sensitive data.
The table below shows the priority value for each of the organizations assets and the how they rank in terms of need for restoration in an event of catastrophic event of an attack.
Asset | Priority value | Description |
VPN gateway | Very high | When the gateway is under or is considered vulnerable to threats the company might be under very high risk of suffering hacking. This might lead great losses. the company should move fast to mitigate any risks, threats and vulnerabilities to its gateways. |
Laptops | high | Threats and risks to laptops can lead to the collapse of an organization. The laptops if not secured properly can be used to access loads of information about the organizations. If the laptops fall into the wrong hands it might be exposing the company to major risks. laptops should be highly protected to avoid such threats. in case of an attack the laptops need to be given priority on examining if they were used to gain entry into the system. |
Mobile phones | Very high | Mobile phones can also be used to as an access point into IT infrastructure. In case of an attack all mobile phones security should be reviewed and changed. There should be provision of better security like fingerprint access to avoid the mobile phones being used by hackers and attackers. |
Software and Operating systems | Very high | Software and operating systems in a computer are very important part of IT structure and its security. If the application and programs are not up to date or they are not original there might be a risk of suffering virus attack. there is high need to use original application that have been authorized and are in compliance with the law. staffs in the organizations should be prohibited from downloading unauthorized applications and software from the internet. this can lead to attacks by malicious viruses. in case of an attack, the application and software should be restored immediately to help regain access to the system. failure to do so would lead to users being denied the access to the IT system and infrastructure. |
Desktop computers | High | The desks are high priority assets they should be used with care to avoid being the source of an attack. in case they are not properly secured they can be used to gain entry in to the organizations IT infrastructure. all its components should be updated by the IT officers. in case there is an attack the desktops access should be reviewed and changed. if the computer hardware is to be disposed it should be done in the safest way possible. |
Fire wall router | high | The routers also have a somehow high need to be monitored for threats. if they are impacted it may be expensive to replace them. the firewall serves to protect the other structures from destructive attack. they therefore should be restored soon in case of an event of attack. |
Routers | High | Routers are an important aspect in the IT structure. a financial organization should consider investing in a good and reliable router. in case of an n attack the routers should be examined on their performance. failure to do so would result in the downfall of the system. |
Network servers | High | The servers like the routers a high priority asset. They should be protected by the best measures possible. In case of an attack they will need to be restored immediately. |
VLAN switches | Medium | These switches should be treated as important access points to ensure they are not used inappropriately. They should be replaced immediately after an attack. |
WLAN controllers | Medium | These are almost on the same rank as the switches. if they are not restored they can make utilization of the IT system to be difficult. |
Antivirus | High | In case of an attack the antivirus should be among the high priority assets to look at, if the Antivirus is weak the system might be vulnerable to attack. They should be updated and used to scan through the computers frequently to prevent any attacks. |
External hard disks | Very High | If external disk are attacked or are accessed by malicious people, the company may lose sensitive data and this might t not be taken well y the clients. hard disk are an important asset and should be safely stored and have only a few people accessing them. |
Tablets | High | Tablets can be used to launch attack and spy the company they should be kept safe at all time. in case their security is breached measures should be taken to prevent an attack. |
Printers | Low | Printers are not a high priority asset but they should be considered in keeping the system running |
Scanners | Low | They are in the same rank with the printers and are not vulnerable to attacks and risks |
PBX | High | In case of an attack this is an IT component that can be targeted in tapping telephone conversation and interfering with flow of communication in an organization. it should be a high priority area to look at in case of an attack. |
Network appliances | Medium | These are not high priority assets. though care should used to ensure they are not used as an entry point. |
Generator set | Very low | This would rarely be affected by an attack. it would be the last thing to consider replacing in case of an attack. |
Evaluating Security Perimeter
There are loopholes in the perimeter security that makes the system vulnerable to attacks. ideally the security perimeter in IT is the preventive control devices and applications that perform the functions of deter, detecting or denying unwanted or risky access (Waichal, & Meshram, 2013).
The table below shows a list of access points both internal and external that might be making the network structure vulnerable
Access Point | Vulnerability | Improvement |
Computer passwords | The company has weak computer settings | The company should come up with better security means like providing strong sets of password |
Firewall protection | The firewall is weak and has been attacked by malware, spyware and viruses on various occasions. | There should routine upgrade of the applications and firewall to avoid being vulnerable to attacks. |
Wi-Fi access | There is unregulated access of Wi-Fi by most of the employees. additionally the Wi-Fi access is supposedly open to the whole company and the nearby residents | The Wi-Fi network should be secured with strong password set. It should not be free provided to the nearby premises and the access should be monitored though the IT department. All access should be regulated to avoid unnecessary activities. |
Cloud services | The company has been saving most of the database in the cloud. But the cloud services are not well protected. many of the users can access | Access to the cloud services should be monitored. All unnecessary access should be terminated an officers in charge of checking the security of the cloud service. |
Website security | Their website has loads of sensitive information belonging to the customers. this website should be highly protected to avoid risk of hacking | The website should be encrypted and utilize the latest security means to ensure hackers cannot break through it. |
Database accessibility | The oracle database can be remotely accessed by different users. There is also shared access to corporate data though the TCB access points. This makes the system vulnerable. | The access should be limited and monitored. netted means to secure the data should be employed. |
Data transaction in remote access connection to internal databases | There is traversing into the database through remote access. additionally the internal database is not encrypted. | There should be authentication and better configuration to avoid risks to corporate internal database. encryption would also be necessary. |
Dial-up and VPN remote access | The VPN access point is used to remotely access the company network. | The password on the server should not be shared with any employee. the WEP should be of high standards to ensure better security. |
Applications traversing firewall policies | Considering the users are not effectively monitored on how they working the network and they have unlimited access, they can use any applications to undertake their duties. these applications can be used in exposing the company network to security threats. | The application accessing ghee network should be monitored to avoid exposing the network. it is also good to limit the access to perimeter security by users. |
Bring your own device (BYOD) opportunity | Users can bring their own mobile devices such as mobile phones and use it to access the company network, a Wi-Fi and databases. this means the devices can be used to manipulate the data and can be an avenue for attack. | Most of the devices are IP enabled. Improve on perimeter security such devices should be limited and their configuration doe in a way that they won’t interfere with the network system. it is also necessary to limit and regulate the number of devices accessing the network. it is also necessary for the company to scan all external dices used to access the network. |
Remote access infrastructure
Infrastructure | Vulnerabilities | Improvement suggestions |
Remote access severs | Software Bugs, buffer overflows, social engineering | Coming up with a better security and integrating to system with a firewall limiting social access |
Smart phone and tablets | Malicious application and malwares, hacking and theft. | Using better application and antivirus. using better security on the smart phones. limiting the phones that can access the network system |
Laptop | Unauthentic access, weak passwords and IP enabled access. | Using better security and monitoring all access done through laptops. |
DSL, modems and dial up | Unregulated access by users, | Implement a better authentication, limiting the users who can access the system, |
PBX | Workload and unmonitored access | Use better authentication method, install an alert system to the PBX and its accompanying components |
Best Practices Of Mobile Computing
Mobile computing entails using smart phones, tablets, and other bring your own devices that organizations allow users to carry out responsibility with. In this company there has been a feeling the devices might be used to breach the security of the IT infrastructure.
Here are suggestions of the best mobile computing practices that the company can utilize:
Encryption: this is an effective security method that can be employed on the devices that does handle sensitive information. Any devices using the Android and Apple OS can accept encryption. Automatic encryption and decryption are recommended method to secure the devices Schmidt et al 2013).
External identification : this entails labeling the devices and would be useful in tracking lost devices back to the owner. It is effective to help find the use of the device even if the battery is dead.
Limiting data storage : the mobile phones should be limited on the amount data they can store for the company. if they are lost and they are loaded with sensitive data there can be high risks of losses. the access of data using mobile phones should also be monitored and be highly secured.
Updates: the mobile applications should be regularly updated to avoid making the system vulnerable. Hackers usually target the unsecure and the devices that are not updated. Setting automatic updates on the mobile devices would be necessary.
There should be a team of experts to help in monitoring the devices use and their security. Such a team should have representatives from different departments. Additionally the utilization and objective of using mobile computing devices should be clearly established and described. There should be an internal policy to help monitor and regulate use of mobile devices. The disposal of mobile devices with company data should be done in a safe manner.
Wireless Vulnerabilities
According to IT expert’s wireless vulnerabilities may be present in a system but go unnoticed. Likewise the global finance organization has common wires within its environment. The company is suffering from hidden rogue APs and is making the system vulnerable. The rogue APs might be operating from nearby premises and buildings next door. The company is also suffering from blue tooth attack. Currently there are over one billion Bluetooth devices sold each year. These are devices that can be used to get access to network and cause data manipulation of theft. Devices had Bluetooth connectivity like smart phones, tablets; laptops and notebook are vulnerable to such attack. Any ad hoc or unregulated use of Bluetooth enabled device exposes the company to risks.
Some of the improvement that can be implement ted to avid this wires attacks in include regular examining of the network system to establish threat, using alert system might also be useful in identifying unwanted and malicious wireless access. The Bluetooth devices should be monitored of unwanted access and the IT department can come up with authentication mean for the Bluetooth devices.
Authentication Protocols and Methodologies
Within the wired and wireless and other network system there seem to be shortcoming in the security. That is the reason why there has been a spike of traffic to the company’s internal networks. Additionally, the company has been having systems attack and cannot establish the place from they are originating form. Furthermore the system has reported having unmonitored access that is making the system to be vulnerable. Authentication would be an important way t achieve system security.
Authenticating would be necessary in verifying, approving or regulating connection to a third party. Some of the major authentication methods that the organization might consider using includes passwords, and protocols such as secure socket layers, IP sec, and secure shell. Password is among the most widely used authentication method. It can come as word, phrase token card or numbers that are used for identification and launching connectivity. Within the network or IT system the passwords are usually encrypted, and does not require much processing (Chapman, 2015). Password can be produced as one time password where they are made in such a way that they are not reusable. Such password can be of two types, the challenge response passwords or password lists. The challenge response passwords respond with a challenge value after receiving a user identifier. The resultant password is got through calculation or choices based on the response. The one time list password utilizes sequentially produced password tom provide access to the system.
Other authentication and protocols includes zero-knowledge proofs, digital signature and secure socket layers. The zero knowledge proof allows the host to have another host providing full access without revealing any secret information. This form of authentication requires frequent communication between the involved parties. The client will create a random but complex problem and then use the information at their disposal to solve it. Then they will send the problem and commitment to the server. Then the client will need to prove that the problems are related to the server. he will also examine the solution if it fits them they will approve it. later this will serve to provide security to the system.
The digital signature is used when users are accessing the internet and downloading files. This authentication method is used to prevent malicious or invalid information form penetrating the system. Some of the protocol that the company can use in the system includes secure socket and IP sec. secure socket provides secure communication methods for TCP connections (Wu et al 2013). The major communication alert used here is the Hello message which is used to establish connections, the protocol version, and session identifier and compression method being utilized. the IP sec uses algorithm to provide security to the network
Web System Protocols and Their Improvement
The company has not been able to establish the information of the traffic accessing their website. There has been abnormal traffic to their site. Additionally there has been problem with network latency, slow performance and applications time out. Therefore the company needs to sure there is improved web system protocols to eliminate the vulnerabilities. A recommended way to do this would include having offline encryption systems. This system will take a message encrypt it and the store the cipher text or transmit it to another user. Some of the protocols that can help deliver on this objective include the PGP which provides encryption and digital signatures for email and electronic documents. The MIME protocol can slow be used to secure website and emails (Samociuk, Adamczyk, & Chydzinski, 2015). Other measure that the company can employ includes investing on additional bandwidth and compression. Having queuing schemes on the router would be effective in improving the web system security.
Cloud Computing
According to research, failure to have an appropriate security protection with the cloud services can result in higher costs and possible loss of business. This might be the reason why the global finance company had attackers use virus to break to the system and this consequently led to the collapse of the oracle and email servers. The attack could have occurred through eh cloud service and this resulted in a loss of $1.7 million in revenue. Such an incidence is risky in a company because it can lead to loss of trust and some customers might leave the company (Boyd, & Mathuria, 2013).
In order to solve the cloud computing risks it is necessary to use effective authentication and authorization measures, it is also essential to be in compliance with the law. Despite the fact that cloud resources can be access from any place in the globe, user identification and access should be monitored critically to eliminate presence of hackers and intruders in the system. Strong authentication and authorization would be important in ensuring the cloud services are secure and free from threats. The company can show their commitment to legal compliance by accepting regular permit audits by the cloud customers. This might include presenting prove of compliance like certificates.
The other means to establish suitable cloud services security is by auditing the compliance of IT systems and other business processes. The company should share report of cloud providers operation with the customers to prove they are reliable and trustworthy. The company might also consider issuing the customers with self service facilities to manage and monitor usage of cloud services; the same can also be shared with auditors.
Assets and Vulnerabilities
Asset | Vulnerability | Impact of being compromised |
Mainframe computers | Virus attack, | Loss of data, theft and manipulation of system operations |
Desktop pc | Unwanted access to the system and network, entry of destructive codes into the system | Loss of information, difficulty in undertaking operations |
Laptop/ notebooks | Unwanted access to the system and network, remote access, virus and malware attack, | Loss of data and information, virus attacking and destroying system components, malfunction of computer systems and hardware |
Mobile phones | Unwanted access, spying, theft and getting lost or being misplaced | Los of information, manipulation of company network, spying and sensitive information might be stolen |
Tablet | Theft, virus attack, getting lost or being misplaced | |
Multifunctional printers | Virus attack | malfunctioning |
Scanners | Hardware failure | malfunctioning |
photocopiers | Hardware failure | malfunctioning |
Network servers | Hacking, and intrusion | Slowed network, delay in operations |
External hard disks | Theft, virus attack | Loss of sensitive information and companies documents |
Generator set | Arson activities, hardware failure | Loss of backup power, or an alternative power source |
Operating system | Virus attack and spyware activities, | System failure, and inaccessibility |
Software | Virus attack | System failure |
Antivirus | Being out of date | Malware and virus attack, leads to impaired system |
Fire wall router | intrusion | Virus and hacking attack |
WLAN controllers | Wireless attacks, | Lock ins, |
Routers | Intrusions and unwanted access | Loss of Wi-Fi connectivity |
VPN gateway | Wields attack ad intrusion | Loss of connectivity and poor networking |
VLAN switches | Hardware failure | System failure |
PBX | Intrusion, and spyware | Loss of telephone connectivity |
recommendations on mitigating threats, risk, and vulnerabilities in the IT system
Asset | Recommended measures and improvements |
Mainframe computers | Using good governance and better administration procedures |
Desktop pc | Monitoring use of the desktop PCs |
Laptop/ notebooks | Use encryption and strong password, monitoring the use of the laptops |
Mobile phones | Provide strong password sets and encryption to avoid unfavorable access, regular scan and limiting the use of unnecessary application |
Tablet | Better security and limit the access by malicious persons, regular scan of the devices |
Multifunctional printers | Assign an expert to wok and assess the printers |
Scanners | Avoid operation by multiple users, scan for worn out parts |
photocopiers | Repair worn out parts, provide backup machines |
Network servers | Use fire wall protection, monitor every access, provide stronger and possibly one time passwords |
External hard disks | Safe storage, provide encryption security |
Generator set | Safe use and use of manual, regular assessment by an expert |
Operating system | Regular updates |
Software | Regular updates |
Antivirus | Regular updates and certifications |
Fire wall router | Encryption and better password set, update firewall applications |
WLAN controllers | Invest in modern appliances |
Routers | Stop using default password, |
VPN gateway | Providing latest VPN security authentication and authorization |
VLAN switches | Secure socket layer encryption, |
PBX | Provide warning system to eliminate intrusion and hacking, eavesdropping or tapping. |
References
Boyd, C., & Mathuria, A. (2013). Protocols for authentication and key establishment. Springer Science & Business Media.
Buecker, A., Andreas, P., & Paisley, S. (2008). Understanding IT perimeter security. IBM Corporation .
Burton, B., & Martin, B. (2014, October). The Second Generation of Teaching Mobile Computing: Practices and Pitfalls. In E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education (pp. 278-292). Association for the Advancement of Computing in Education (AACE).
Chang, V., & Ramachandran, M. (2016). Towards achieving data security with the cloud computing adoption framework. IEEE Transactions on Services Computing , 9 (1), 138- 151.
Chapman, A. (2015). Semi-Autonomous Networks: Effective Control of Networked Systems through Protocols, Design, and Modeling . Springer.
Fernandes, D. A., Soares, L. F., Gomes, J. V., Freire, M. M., & Inácio, P. R. (2014). Security issues in cloud environments: a survey. International Journal of Information Security , 13 (2), 113-170.
Hashizume, K., Rosado, D. G., Fernández-Medina, E., & Fernandez, E. B. (2013). An analysis of security issues for cloud computing. Journal of Internet Services and Applications , 4 (1), 5.
Laudon, K. C., & Laudon, J. P. (2015). Management Information Systems: Managing the Digital Firm Plus MyMISLab with Pearson eText--Access Card Package . Prentice Hall Press.
Samociuk, D., Adamczyk, B., & Chydzinski, A. (2015). Impact of router security and address translation mechanisms on the transmission delay. In Proc. 7th International Conference on Evolving Internet (INTERNET 2015) (pp. 38-42).
Schmidt, D. C., Stal, M., Rohnert, H., & Buschmann, F. (2013). Pattern-Oriented Software Architecture, Patterns for Concurrent and Networked Objects (Vol. 2). John Wiley & Sons.
Waichal, S., & Meshram, B. B. (2013). Router attacks-detection and defense mechanisms. Int. J. Sci. Technol. Res , 2 , 145-149.
Wang, W., & Lu, Z. (2013). Cyber security in the Smart Grid: Survey and challenges. Computer Networks , 57 (5), 1344-1371.
Wu, Y., Cegielski, C. G., Hazen, B. T., & Hall, D. J. (2013). Cloud computing in support of supply chain information system infrastructure: understanding when to go to the cloud. Journal of Supply Chain Management , 49 (3), 25-41.