Literature Review 2

Please find the attached documents and write a literature review. we need to write how these articles are helpful for our proposal

Running head: CYBER SECURITY 1

Don't use plagiarized sources. Get Your Custom Essay on
Literature Review 2
Just from $13/Page
Order Essay

CYBER SECURITY 7

Emerging Cyber Security Threats

Name: Supriya Mutyala

Literature review

Papers for Cyber Security research

1. Abomhara, M. (2015). Cyber security and the internet of things: vulnerabilities, threats, intruders and attacks. Journal of Cyber Security and Mobility, 4(1), 65-88.

The article provides a lot of information about cyber security attacks and it also shows enough evidence that is relevant for the research and to give examples. This article can be bought online or its html version can be accessed for free.

2. Sutton, D. (2017). Cyber Security : A Practitioner’s Guide. BCS, The Chartered Institute for IT.

This book covers the various types of cyber threat and explains what you can do to mitigate these risks and keep your data secure. The book can be found online and can also be downloaded as a PDF version.

3. Ďulík, M., & Ďulík jr., M. (2019). Cyber Security Challenges in Future Military Battlefield Information Networks. Advances in Military Technology, 14(2), 263–277.

This paper is relevant for this research because it deals with complex threats to military cyberspace, in which primarily wireless channels may be easily available by the enemy. Employed sub-networks may have different properties. For the research the paper points out at the importance of maximum security

4. Svilicic, B., Rudan, I., Frančić, V., & Doričić, M. (2019). Shipboard ECDIS Cyber Security: Third-Party Component Threats. Scientific Journal of Maritime Research, 33(2), 176–180.

The analysis is based on the cyber security testing of the shipboard ECDIS using an industry vulnerability scanner. This analysis is relevant because it provides areas of weakness in cyber security. In this research this analysis helps to point out the areas of weakness in cyber security. The paper can be purchased online or accessed as a PDF.

5. Fuller, C. J. (2019). The Roots of the United States’ Cyber (In)Security. Diplomatic History, 43(1), 157–185.

This paper is relevant because it shows the vulnerability of computer networks to cyber-attacks exposed the security flaws across the computer networks of the U.S. Department of Defense. This paper adds more information on the vulnerabilities that exist in the US security computers. The paper can be found at EBSCO.

6. Svilicic, B., Brčić, D., Žuškin, S., & Kalebić, D. (2019). Raising Awareness on Cyber Security of ECDIS. TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 13(1), 231–236.

In this paper, it is estimated ECDIS cyber security in order to study the origin of ECDIS cyber security risks. This paper comes in to help in the finding of solutions to the cyber-attacks and raise awareness. The paper can be found at the EBSCO site.

7. KOVÁCS L. Cyber Security Policy and Strategy in the European Union and Nato. Revista Academiei Fortelor Terestre. 2018;23(1):16-24.

The paper is relevant for this research because it discusses the cyber security of infrastructures such as water systems which are present in public utilities, economic life, public administration, defence sector or even in the smallest detail of everyday life. The paper can be found at the EBSCO site.

8. Fielding, J. (2020). The people problem: how cyber security’s weakest link can become a formidable asset. Computer Fraud & Security, 2020(1), 6–9.

The paper discusses how technological changes that have come with lifestyle shift have increased threats. Insider threat has increased as working practices have evolved and new technologies. The paper can be accessed online as a html version or PDF

9. Kerner, S. M. (2019). Why Trust Is Key for Cyber-Security Risk Management. EWeek, N.PAG.

This paper outlines the intersection of identity, risk and trust and how his firm is bringing them together to help improve security outcomes. It can be found at EBSCO site.

10. Osborn, E., & Simpson, A. (2018). Risk and the Small-Scale Cyber Security Decision Making Dialogue–a UK Case Study. Computer Journal, 61(4), 472–495

This paper discusses results from a survey that considered (in part) cyber security decisions made by SSITUs. For the research this paper can reveal threats and help in finding solutions.

11. Kerner, S. M. (2019). How Superforecasting Can Help Improve Cyber-Security Risk Assessment. EWeek, N.PAG.

This paper outlines an advanced approach to help organizations go beyond basic methods for evaluating and reporting on risk. This resource can be accessed at the EBSCO site.

12. Quigley, K., & Roy, J. (2012). Cyber-Security and Risk Management in an Interoperable World: An Examination of Governmental Action in North America. Social Science Computer Review, 30(1), 83–94

This article deploys an anthropological understanding of risk in order to examine public sector action and capacity with respect to the multidimensional challenge of cyber-security and suggests some solutions. This paper can be accessed online for free.

13. Falco, G., Eling, M., Jablanski, D., Weber, M., Miller, V., Gordon, L. A., Shaun Shuxun Wang, Schmit, J., Thomas, R., Elvedi, M., Maillart, T., Donavan, E., Dejung, S., Durand, E., Nutter, F., Scheffer, U., Arazi, G., Ohana, G., & Lin, H. (2019). Cyber risk research impeded by disciplinary barriers. Science, 366(6469), 1066–1069

The article reports on Cyber risk research impeded by disciplinary barriers and explores how security progress requires cross-disciplinary collaboration. The paper can be accessed at the EBSCO site.

14. Siegel, C. A., Sagalow, T. R., & Serritella, P. (2002). Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security. Information Systems Security, 11(4), 33.

This paper presents a risk management approach to the security of information technology systems in the enterprise. The paper can be accessed at the EBSCO site.

15. Yin, X. C., Liu, Z. G., Nkenyereye, L., & Ndibanje, B. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors (14248220), 19(22), 4952.

The paper presents an innovative approach for a Cybersecurity Solution based on the Intrusion Detection System to detect malicious activity targeting the Distributed Network Protoco. This paper can be accessed online as a PDF document.

16. Wilson, J. R. (2019). Military cyber security: threats and solutions. Military & Aerospace Electronics, 30(12), 16–23.

The article informs about U.S. government and military taking steps to protect sensitive computers from cyber-attack, and providing solutions for them. The paper reveals some of the cyber security threats as well as solutions. It can be accessed at the EBSCO site.

17. Smith, G. (2018). The intelligent solution: automation, the skills shortage and cyber-security. Computer Fraud & Security, 2018(8), 6–9.

This paper is relevant for this research as it suggests unique solutions to the problem of cyber security. It can be accessed on Google scholar for books

18. Sun, C.-C., Hahn, A., & Liu, C.-C. (2018). Cyber security of a power grid: State-of-the-art. International Journal of Electrical Power & Energy Systems, 99, 45–56.

This paper further reveals the threats to cyber security especially in situations where there are infrastructures such as power grids. The paper can be accessed at Google scholar.

19. Yin, X. C., Liu, Z. G., Nkenyereye, L., & Ndibanje, B. (2019). Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach. Sensors (14248220), 19(22), 4952.

The paper is relevant for this research because other than helping to find solutions to cyber security it also helps in pointing out threats. The paper can be found at the EBSCO site.

20. van der Meer, S. (2015). Enhancing International Cyber Security. Security & Human Rights, 26(2–4), 193–205

This paper is relevant for this research because it provides a global approach to the problem of cyber insecurity. It can be accessed at the EBSCO site.

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy