Online Communication and Network Security

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now

Jo, H., Nam, J., & Shin, S. (2018). NOS Armor: Building a secure network operating system. Security and Communication Networks, 2018, 1-14.

As per the author, some form of communication is used for conversation and commerce, but not everyone knows the risks involved. Their communication system is under so many threats nowadays that we must put specific security measures in place. The cause is that global security breaches have cost billions of dollars at a time. Since life might be irreparably damaged if we do not take the time to learn about both, everyone must understand communication and network security. Security professionals reported that not most of their organizations decision-making processes lack the necessary security intelligence. Most individuals are becoming victims of cybercrimes and network security difficulties. This topic will help people to understand communication and network security.

Almeida, F., Carvalho, I., & Cruz, F. (2018). Structure and challenges of a security policy on small and medium enterprises. KSII Transactions on Internet and Information Systems, 12(2), 747-763.

Research Problem: Information security is becoming a business concern, not just a technology issue, and businesses must realize this. Small and medium-sized enterprises (SMEs) typically do not give information security much thought because they dont think it is significant enough to deter criminal activity. The importance of protection to the business is not well understood. Information is the most valuable resource for businesses, but it is also a target for several cyberattacks. SMEs must have information security procedures to reduce the likelihood of fraud or information loss in the hands of dishonest individuals or criminals. The document that directs and develops an organizations policies for safeguarding information assets and avoiding legal liability for all users is the information security policy. SMEs need to be aware of these components to create clear, simple security policies.

Jo, H., Nam, J., & Shin, S. (2018). NOS Armor: Building a secure network operating system. Security and Communication Networks, 2018, 1-14.

Background Information: According to the authors, network security has been a problem since the first networked computers were developed. In the 1990s, networks were not as common as they are today, and internet usage was not extremely widespread. Security was not as crucial back then, but its importance grew as more sensitive material was uploaded to networks. Throughout the 1970s and 1980s, researchers who had access to the Internet loved poking fun at one another on the web. These harmless jokes, however, exposed security flaws in the ARPANET, the forerunner of the contemporary internet. The network was modest at the time, and many of its participants were acquainted through their professional networks, which decreased the threat and danger.

Evans, L. (2016). Protecting information assets using ISO/IEC security standards. Information Management Journal, 50(6), 28-33.

Research Methodology: This study examines how an information security policy for SMEs is structured. It uses a quantitative methodology based on a survey developed on the Google Drive platform and distributed via two IT security-related LinkedIn groups. There are six sections and a total of 46 questions in the survey. They have the benefit of reaching many small and medium-sized businesses from various parts of the world by using a questionnaire to collect this data. With this strategy, it is guaranteed that respondents will be able to complete the questionnaire quickly and efficiently, and they will only be able to choose from a limited number of options.

Thompson, A., Otasowie. I., & Famose, O. (2014). Evaluation of security issues in social networks. Computing and Information Systems, 18(1), 6-20.

Research Design: Because social networking and the field of information security are both fields that are constantly expanding, it is challenging to include modern technologies to keep information secure on social platforms. The authors consider five elements during social networking security quantification: authentication, confidentiality, integrity, availability, and non-repudiation. Secrecy in this situation guarantees more outstanding information protection while preserving data privacy over a network, in contrast to authentication, which exemplifies validating end users within a system or social profiles. Integrity follows a similar path to confidentiality in that it permits the data to be retained in a consistent, unchanging form and stored to allow users of social networks to communicate entirely and accurately.

The other two components of a secure social networking system are also covered in the essay. Availability refers to retaining access to the social system when necessary to ensure that those in authority can still access the data. Lastly, non-repudiation is a component of an asocial networking system that offers evidence of the authenticity and source of the material. The research team first developed a hypothesis to evaluate social networking services to determine the security risks associated with a networking system.

Evans, L. (2016). Protecting information assets using ISO/IEC security standards. Information Management Journal, 50(6), 28-33.

Purpose of the Study: The authors purpose in studying security operations is to recognize threats and safeguard the systems and data of businesses. To accomplish this, security operation analysts must be familiar with numerous security technologies and have a working knowledge of networks. Risk management for cybersecurity and information security are also extensions of that. The relevance of both of these risk categories to organizations is increasing. Thus, this essay aims to demystify them to be understandable and manageable. The author discusses implementing risk management for the ISO 27001 standard and achieving compliance with the General Data Protection Regulations risk-focused section.

Pirim, T., James, T., Boswell, K., Reithel, B., & Barkhi, R. (2008). An empirical investigation of an individuals perceived need for privacy and security. International Journal of Information Security and Privacy, 2(1), 42-53.

Research Question: The author of this article focuses on the need for security. Data protection management attempts to prevent and lessen the effects of security incidents to maintain business continuity and minimize corporate harm. The first is to protect organizational functionality; decision-makers must develop policies and administer their organizations following complicated, evolving legislation, efficient, and competent applications. Secondly, the company is under intense pressure to acquire and run integrated, efficient, and intelligent applications to enable application safety. Modern businesses must create an environment that safeguards apps that use their IT infrastructure, especially those that serve as essential infrastructure elements.

Pirim, T., James, T., Boswell, K., Reithel, B., & Barkhi, R. (2008). An empirical investigation of an individuals perceived need for privacy and security. International Journal of Information Security and Privacy, 2(1), 42-53.

Supportive Research Questions: The authors stress the importance of network security. Network security is critical for both residential and business networks. Most homes with high-speed internet connections have one or more wireless routers, which can be hacked if not properly secured. A solid network security system reduces data loss, theft, and sabotage. Client data is protected by network security. Governments and corporations keep information that is not theirs. Accounting firms and medical clinics are especially vulnerable to this information. Such data should be kept secure by the organization. It entails frequently synchronizing their data and ensuring hackers cannot access the machine.

Thompson, A., Otasowie. I., & Famose, O. (2014). Evaluation of security issues in social networks. Computing and Information Systems, 18(1), 6-20.

Instruments and Sample Size Used: The data collected was analyzed using statistical packages. The statistical data techniques utilized include the table of frequency, percentage distribution, and descriptive statistics. The author uses descriptive research to describe a chosen variables current situation. These studies seek to provide systematic data about a phenomenon. The researchers generally do not start with a hypothesis but instead after finding data. The assumption is tested using data analysis and synthesis, for systematic information gathering, careful unit selection and variable measurement are required.

Bai, H. (2022). Legal management of network information security based on embedded real-time task processing. Computational Intelligence and Neuroscience, 2022, 1-10.

Results Obtained: According to the authors, adults between 18 and 25 spend more time on the Internet and social networking sites. As per the findings, information sent and received on social networks is insecure; therefore, confidential messages should not be exchanged. The more people who use social media, the riskier it becomes. Consequently, it is practically impossible to gauge how well social networks are protected because security is difficult to measure.

Jo, H., Nam, J., & Shin, S. (2018). NOS Armor: Building a secure network operating system. Security and Communication Networks, 2018, 1-14.

Recommendations: As stated by the authors, standards, and processes for recognizing criminal activities must be established after the legislative framework has been finalized. There is currently no comprehensive system for network data security preventative measures in China. According to the author, one addresses the constitutions restrictive role in achieving adequate network data security protection. Within the network, the definition and accountability of the subject and object of crime must be made clear. Criminal activity is a problem on the web, affecting not only individual users but also governmental bodies, law enforcement, and other organizations. Network operators, service providers, individuals, and specific criminals are among the targets of crime. The definition and accountability of the subject and object of crime within the network must be made clear. Illegal activity is a problem on the web, affecting not only individual users but also governmental bodies, law enforcement, and other organizations.

References

Almeida, F., Carvalho, I., & Cruz, F. (2018). Structure and challenges of a security policy on small and medium enterprises. KSII Transactions on Internet and Information Systems, 12(2), 747-763. Web.

Bai, H. (2022). Legal management of network information security based on embedded real-time task processing. Computational Intelligence and Neuroscience, 2022, 110. Web.

Evans, L. (2016). Protecting information assets using ISO/IEC security standards. Information Management Journal, 50(6), 2834. Web.

Jo, H., Nam, J., & Shin, S. (2018). NOSArmor: building a secure network operating system. Security and Communication Networks, 2018, 114. Web.

Pirim, T., James, T., Boswell, K., Reithel, B., & Barkhi, R. (2008). An empirical investigation of an individuals perceived need for privacy and security. International Journal of Information Security and Privacy, 2(1), 4253. Web.

Thompson, A. F., Iyare Otasowie, & O.A. Famose. (2014). Evaluation of security issues in social networks. Computing and Information Systems, 18(1), 621. Web.

Need help with assignments?

Our qualified writers can create original, plagiarism-free papers in any format you choose (APA, MLA, Harvard, Chicago, etc.)

Order from us for quality, customized work in due time of your choice.

Click Here To Order Now