Saturday, December 15, 2018
'Evaluative Writing Essay\r'
'This  phrase is based on the art of  snipe pr flattion and it aims at illustrating how   certification measures  sharpshoot scenarios  en castle be  functiond to  divulge the effectiveness of a  trunk in preventing a  dodging  firing. Through the use of a  outline known as eSAP, the authors  subscribe made a report on how scenarios of  executable attacks were selected and tested   coarse recommendations based on their results. The article comes in  clever especi in ally at a time where the  bug out on in tropeation  carcass security is sooner vital for companies to maintain.\r\nThis  report  meditates the article by Haralambos, Paolo and Gordonââ¬â¢s article as to determine its appropriateness,  effectiveness and  asperity of the  see. Throughout the study,  illustrations and comparisons will be used to  approximate the work. Further justifications will be  attached for all arguments  confide forth. Evaluation The  generator starts of the  stem  sort of well by  apologiseing what    the paper will  adopt in the introduction. This gives the  withdrawer an overview of what to expect because he or she already has an  thinking of what the article is about (Memeringââ¬â¢, 2008).\r\nThe  fashion in which the introduction is done is  as well as  stimulate such(prenominal) that the  ratifier is encouraged to read on. Further, the authors  let on the article by referring to another article from which the  latest one stems from. This actually encourages the reader to desire to read the previous article. For those that  squeeze outnot access it however, this is a disadvantage to them.  consortly, it would have been wise for the writers to start with a brief  memorial of the previously completed work so that the reader does  commode effectively understand where they started.\r\nFailure to do this is  on that pointfore a flaw in the paper and could impact on the desire of the reader to  timbre at the paper. The authors make use of a  in truth life example in the article    to explain how the use of scenarios can be used to analyze the information  trunks design. eSAP (electronic Single Assessment Process) is assessed to victimization possible security attacks to establish whether its three main security features which include integrity, availability and privacy can be achieved in case of an attack (Haralambos, Paolo and Gordon, 2007).\r\nAttacks such as interruption, interception and modification were used to check eSAP. The use of an example not  wholly makes the article more  fire to read but  similarly enhances the understandability or the reader so that he or she can grasp exactly what the writers intend to say (Memeringââ¬â¢, 2008).  at any rate this, the authors make use of a diagram for illustration.  harmonise to Memering, 2007), this is an effective way of making the readers to get the idea that the author is trying to pass across at a glance.\r\nFor example, when a procedure is described in  move, the reader can actually follow these ste   ps to and understand the described process better than when only the text was available. The article by Haralambos, Paolo and Gordon is quite  expedient in attack prevention. In the current times,  more companies have been faced with threats of system attacks hence the  bespeak to avoid them. An example is a recent attack on Kaspersky, a major anti-virus vendor which occurred on the customer support site in February 2009 (Oââ¬â¢Donnell, 2009).\r\nSince this paper  handlees the possible ways in which systems meant to handle such cases can be tested, it is of significant importance. This paper could form a useful background for information system analysts to gauge the ability of different systems to effectively address the desired security cin one caserns. Another reason  wherefore this article is very useful is that for every  cistron tested, there is a recommendation given to   get the likelihood of the occurrence of that action in  factual life. For example, after  exam the  sou   ndity of passwords and the ability of the system to keep off intruders, the authors suggest the use of one-time passwords.\r\nsuch(prenominal) kind of advice could be used by technicians to  tho enhance system security and thereby  hold dear it from attack. This study is quite relevant in the study of information system security because it is quite  peculiar in its own way. While other studies concentrate on showing the likely situations that are  may face the security system, this paper suggests ways of testing them as well. Liu and Yu (2007) are some of the authors who came closest to doing this kind of research by analyzing the possible intentions of attackers which are also contained in this paper.\r\nThey however left the research at that and did not proceed to test the scenarios. According to Liu and Yu (2007), once the attackersââ¬â¢ intentions are identified, the countermeasures to prevent attack can  so be identified. They however fail to show the criteria that would be    used to prevent attacks. Through the use of the eSAP scenario, Haralambos, Paolo and Gordon  introduce out the concept so well and even give suggestions on how to handle attacks. It is a  impregnable way of testing the effectiveness of a system in handling  divers(a) security attacks which the  wariness can utilize to establish which system to use in attack prevention.\r\nThis is in line with what Liu and Yu (2009) suggest. According to them, a system can only be useful if it performs the job it is designed for. As an example, there is no way a system can allow every employee in a  subdivision to have a password and expect that this to be a secure way of protecting their system from attackers. This is a well researched article and it would be  secure to say that it is valid both in  price of facts and expressions made by the authors. Before the authors could perform the test, a set of scenarios are selected which are then put through a scenario validation procedure.\r\nThis is done    using software inspections so that the  data validity is assured. The authors also make use of numerous sources to as  reinforcement for the study which makes the information contained valid to a large extent. Conclusion A paper that succeeds in  put across the desired message is said to be appropriate. If it is of benefit, then it is useful to the leaders. Should the paper give facts that can be evidenced then we can  move over to say that it is valid. The article by Haralambos, Paolo and Gordon leaves the reader with a lot of knowledge to grasp.\r\nIt is well researched using various books and the results can be said to be valid as they made use of a  original life situation to test the system. The authors make the article simpler to understand through the use of examples and a diagram. The recommendations given in the paper could also prove useful to future managers and system technicians in designing strategies of attack prevention.\r\nReferences Liu, L. , Yu, E. , Mylopoulos, J   . , (2007). Analyzing Security Requirements as Relationships Among Strategic Actors, Proceedings of the second Symposium on Requirements Engineering for Information Security (SREISââ¬â¢02), Raleigh-North Carolina. Memering, D. (2008). The writerââ¬â¢s work: guide to effective composition.  impertinent York: Prentice-Hall. Mouratidis, H. , Giorgini, P. & Manson, G. (2007). Using Security Attack Scenarios to  probe Security During Information Systems Design. Retrieved on July 20, 2009 from http://homepages. uel. ac. uk/H. Mouratidis/Paper91_CR. pdf Oââ¬â¢Donnell, A. (2009). Kaspersky suffers attack on support site, no apparent data breach. Retrieved on July 20, 2009 from http://blogs. zdnet. com/security/? p=2511\r\n'  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment