ReferenceGuide_WeekTwo.docx - Top Trends in the...

Info icon This preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon
Top Trends in the Cybersecurity Industry 1 References on Top Trends in the Cybersecurity Industry University of Maryland University College CBR600 10/16/2017 References
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Top Trends in the Cybersecurity Industry 2 1. Abstracted from a study on the potential threats faced by cloud consumers: Kalaiprasath, R., Elankavi, R., & Udayakumar, R. (2017, May 27). CLOUD SECURITY AND COMPLIANCE - A SEMANTIC APPROACH IN END TO END SECURITY. International Journal on Smart Sensing & Intelligent Systems , 10, pp. 482-494. Retrieved from http://eds.a.ebscohost.com.ezproxy.umuc.edu/eds/detail/detail? vid=11&sid=2d91e9e1-e0c0-4dc2-8b7a-9166aad9f08f %40sessionmgr4008&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ %3d%3d#AN=124759640&db=edb . As the cloud continues to increase in popularity due to its rapid scaling and cost-effectiveness, the security of cloud data continues to be a key concern for consumers. Ranging from data breaches and data loss to account or service traffic hijacking, the threats to cloud computing are many (p. 486). Providers employ an elaborate array of security and privacy controls, which often serve to further confuse users (p. 483). In this study, researchers have not only conducted comprehensive research to identify the potential threats faced by cloud consumers and developed and ontology describing the cloud security controls, but they have developed a web- based application that can suggest cloud security policies and providers to consumer organizations based on the specific needs of each organization.
Image of page 2
Top Trends in the Cybersecurity Industry 3 2. Abstracted from a series of lectures on security in an IoT enabled world: Watson, J., Marshall, J., Young, M., Smetny, P., & Mann, D. (2017, June). TIM Lecture Series – Building Trust in an IoT-Enabled World. Technology Innovation Management Review , 7(6), pp. 50-54. Retrieved from https://doaj.org/article/f2bf316c4cff48adbd0631972aa654bd . The Internet of Things (IoT) covers a massive spectrum, and as such there are countless vulnerabilities within it. Organized by David Mann, Director and Chief Security Officer at inBay Technologies, this lecture series consists of four different lectures by professionals in the technology industry that address some of these concerns and vulnerabilities. In these lectures, Mann and his colleagues discuss a variety of subjects, from information theft and trust as a service to wireless security and ransomware, and how all of these topics relate to the IoT. Moreover, all of the
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 4
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern