7 May 2022

108

Qualitative Annotated Bibliography

Format: APA

Academic level: College

Paper type: Research Paper

Words: 1571

Pages: 5

Downloads: 0

Bob, F. (2006). “Cyber security breaches threaten, smarter factories and processes…”, Magazine of the South African Institution of Civil Engineering 14(1)

The author expresses his concerns about the rising cyber security breaches and the shrinking engineering talent base. However, he always point out on the emergence of smarter factories and processes as well as the boom of consulting businesses. The cyber security in many organizations, according to the author, has remained vulnerable to both inside and outside attackers. He observes that majority of the cyber-attacks were orchestrated by the employees in organizations whereas attacks from the outside are mostly opportunistic and occasional. Moreover, most of the reported instances of the cyber-attacks affected the process control in industries. Some of the major instances resulting from cyber-attacks include the release of one million liters of raw sewage into adjoining waterways in Australia by a disgruntled contractor. This incident was arranged remotely by the contractor. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The author observes that students are turning away from engineering studies putting the future of the engineering discipline at risk. He points out that major catastrophes remind the society of the great significance of engineering talent. Moreover, large organizations like Microsoft have also raised concerns about the shortage of engineering manpower. However, the author expresses hope regarding emergence of smarter factories that are designed to run more cheaply and efficiently than ever. As such, it is anticipated that future factories will be smaller and more mobile. The article also points out the emergence of better systems and tools that help to simplify work. The emergence of the nanotechnology is considered a breakthrough in healthcare as it will be applied in delivering therapies to patients through the nanoparticle drug delivery systems (NDS). 

The audiences of the writing include students and industry executives in order to stress the importance of engineering technology in improving life. The unique feature about this article is that it is able to clearly bring about the relationship between cyber security, engineering studies, smart factories, and better systems and tools. It is able to make the learner appreciate the interdependencies that exist between them. Therefore, the author has fully explored how engineering technology, cyber, security and improved processes directly affect human life.

The Free Library (2014). Retrieved Nov 24 2016 from https://www.thefreelibrary.com/Google+search+test+shows+no+progress+in+cyber+safety.html

The article by UKFast critically explores the customer privacy breaches involving customers and businesses. It gives information on how a simple search on Google can display databases full of credit card information of business customers on the internet. The author further states that the online privacy breach does not only affect the customers but also businesses. It was observed that Google search was able to reveal page after page of business databases that included supplier information and even customer credit card details. Moreover, local government databases were also exposed on the internet. This has enabled the cyber criminals to trade people’s credit card details including their identities. The article mentions that Google hack is the most popular method used by cyber criminals to acquire private data by simply exploiting businesses’ data protection weaknesses. This has made the trade of people credit card details as well as identities as open as any other online purchase. 

The information that is made available to the cyber criminals regarding business customers include location hence putting a potential risk on not only the finances of the customers but their lives too because they can be tracked down. The businesses are also put at risk of failure too by the existence of database security lapses in their systems. The increased risk of identity theft and spear-phishing puts the business reputation at risk as the customers may quit patronizing the business affected. One of the major hack incidents involved Sony’s Play-station whereby the customer database was hacked. However, the customers were not concerned but it may not be the same case for other businesses especially SMEs. The article also gives some advice on maintaining data security. It advocates for encryption of sensitive customer information. Moreover, it discourages storage of information on the web server as it can be easily accessed by cyber criminals. Outsourcing of trusted security professionals is also important to ensure that the systems are up to date in terms of security of data. 

The audiences of this writing include business executives and the general public because almost everyone uses credit card at any given time. One important feature about this material is that it not only raises the online data security problems but it also suggests solutions. Therefore, the article is an effective informative and educative article. Furthermore, the article is an important tool in analyzing the data security conditions in SMEs.

Chris, R. (2015). “Managing your data risk”, Network Security 2015(8); 13-15

The article explores the nature and the extent of cyber security breaches and goes on to give recommendations on the most effective ways of maintaining security of information in organizations. The article observes that even the largest organizations are faced by potentially catastrophic intrusions into their systems by hackers as well as other malicious actors. The article points out that the ability by organizations to maintain an inventory of hardware and software is considered critical in the development of a strong cyber-security foundation. However, failure by organizations to consolidate hardware and software data from across all their and environments may render the cyber-security foundation vulnerable to cyber-attacks. Therefore, organizations are required to actively manage all software on the network so that only the authorized software is installed and executed. This will ensure that all unauthorized and unmanaged software can be identified and prevented from installation and execution. This is very necessary according to the article because the attackers continuously seek for vulnerable versions of software in organizations which can be remotely exploited. The article points out that the risk of cyber-attacks is increased when the organizations use unlicensed or unauthorized software in the company systems making it easy for the attackers to exploit the security structures of the companies. 

The writing is meant for system developers as well as information security personnel in organizations in order to assist them improve the security of information during designing and implementation respectively. The article is so special because it gives an in-depth factual and technical analysis of data security management in firms and recommends sound solutions for preventing security breaches. Therefore, the article is a very effective resource in the design, development and implementation of sound security systems.

Prashant, P. (2015). “Advanced security policies to protect the internet resources against the cyber-attacks”, International Journal of Advanced Research in Computer Science , 6(6); 47-49

The article focuses on the influence of the emergence of E-commerce on data and information security. E-commerce involves information flows between businesses, businesses and consumers, consumer and consumer as well as government and consumer. Therefore, the businesses have to design a security policy that ensures secure transmissions among the various levels and on various devices. Therefore, the cyber attackers begin by exploiting the simple breach applications. The article highlights several types of cyber-attacks that include Trojan horse, sabotage, telecom fraud, system penetration and financial fraud among many others. Trojan horse refers to a worm or virus that may send information back to the originator or may be utilized by the originator to gain control of a targeted system. Sabotage refers to making damages on a computer system without getting any gain while telecom fraud refers to getting hold of a customer’s good name and use it to sign up for a service. Moreover, system penetration refers to hacking into a system and making changes on the content, checking what the system is doing and locking or unlocking the port available on the system. The article suggests several policies to protect the online resources such as physical restriction, system administration policy access control and logon policy. System administration refers to ensuring that the systems are available only when needed as well as ensuring that confidential information is only available to authorized persons. Physical restrictions refer to protection of building from factors that may lead to loss or theft of information. Logon policy ensures that users are identified by name or number and belong to a particular group. The article emphasizes the fundamental need to implement the security policies before starting an online business. 

The writing is meant for audience intending to start online businesses in order to prepare them effectively for the online venture in terms of information security. The article is so unique in that it addresses the E-commerce segment and its particular security challenges to expect. Therefore, the article is useful because it addresses both the challenge and solutions regarding to information security in E-commerce.

3 Reasons Why Nuclear Industry is a Good Cyber Security Example . (2016). OPSWAT. Retrieved on 24 November 2016, from https://www.opswat.com/blog/3-reasons-why-nuclear-industry-good-cyber-security-example

The online article presents a cyber-security case study of the nuclear industry as well as the best practices for the implementation of the IT systems. The article observes that the nuclear industry is highly regulated. As such, the industry has adopted appropriate practices to help facilitate achievement of compliance through education and compliance. The article encourages other industries to emulate the best practices employed in the nuclear industry. The nuclear industry continuously improves information security practices through active exchange of information between different facilities regarding what has been working and what has not been working. This enables the entire nuclear industry to learn from each operator so that the best practices from across the entire industry can be applied at all sites. Furthermore, nuclear industries learn from other plants across the globe. The US nuclear industry in particular learned from the recent Fukushima disaster in Japan and implemented appropriate changes to prevent such disasters. 

The appropriate audiences of the writing include businesses that need to learn to promote information exchange across the respective industries in order to learn practices that work and those that do not work. The article is special because it provides a proven approach that can be used to address challenges regarding information security in organizations. The article is useful because it gives practical advice rather than a theoretical approach of dealing with cyber-attacks.

References

Bob, F. (2006). “Cyber security breaches threaten, smarter factories and processes…”, Magazine of the South African Institution of Civil Engineering 14(1)

The Free Library (2014). Retrieved Nov 24 2016 from https://www.thefreelibrary.com/Google+search+test+shows+no+progress+in+cyber+safety.html

Chris, R. (2015). “Managing your data risk”, Network Security 2015(8); 13-15

Prashant, P. (2015). “Advanced security policies to protect the internet resources against the cyber-attacks”, International Journal of Advanced Research in Computer Science , 6(6); 47-49

3 Reasons Why Nuclear Industry is a Good Cyber Security Example . (2016). OPSWAT. Retrieved on 24 November 2016, from https://www.opswat.com/blog/3-reasons-why-nuclear-industry-good-cyber-security-example

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 16). Qualitative Annotated Bibliography.
https://studybounty.com/qualitative-annotated-bibliography-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Climate Change Pattern around the World

Running head: CLIMATE CHANGE PATTERN AROUND THE WORLD 1 Climate Change Pattern around the World Name Institutional Affiliation Climate Change Pattern around the World It is now an accepted fact that the world’s...

Words: 690

Pages: 2

Views: 93

Autism Myths: Debunking the Misconceptions

The patient portal is a 24-hour internet application that the patients use to access their personal health information. The first patient’s website was established in 1998 but the patient portal was rolled out in...

Words: 1480

Pages: 5

Views: 154

Pros and Cons of Cancer Treatment

The project is about the pros and cons associated with the treatment of cancer patients. Patients who have cancer may benefit from the advantages of cancer treatment and suffer the consequences of the treatment...

Words: 359

Pages: 1

Views: 453

Human Mitochondrial DNA: Functions, Mutation, and Inheritance

2 Summary of Three Papers Human mitochondria DNA is characterized by circular double-stranded molecules that are separable through the process of configuration density. The comprehension of the various roles and...

Words: 1377

Pages: 5

Views: 134

What is Team Learning?

Teamwork is becoming paramount in organizations to achieve their objectives, but there are concerns that collaboration may limit individuals from reaching their career goals. Most teams are based on ensuring that a...

Words: 408

Pages: 1

Views: 199

What is Gentrification? Causes, Effects & Solutions

Gentrification refers to the conversation of farm buildings to dwelling places. The wealthy people mostly do gentrification by moving in from the outside community leading to the rise of the socio- economic status of...

Words: 293

Pages: 1

Views: 125

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration