Tuesday, May 19, 2020
Compare How ââ¬ËWhoââ¬â¢s for the Gameââ¬â¢ and ââ¬ËDulce Et Decorum...
Compare how ââ¬ËWhoââ¬â¢s for the Game?ââ¬â¢ and ââ¬ËDulce et Decorum Estââ¬â¢ present war and how they reflect the authors view point. ââ¬ËWhoââ¬â¢s for the Game?ââ¬â¢ was written by Jessie Pope in 1915 (At the beginning of the First World War). Jessie Pope was an English poet who began writing for Punch; between 1902 and 1922 she supplied 170 poems to the magazine. She was a prolific writer of humorous verse, articles, and short stories, which were published in many newspapers including the Daily Mail, the Daily Express, the Evening Standard, The Queen, and the Westminster Gazette. The purpose of the poem ââ¬ËWhoââ¬â¢s for the game?ââ¬â¢ is to persuade men to become part of the army and fight for England. The main message in this poem is if you join the army then you willâ⬠¦show more contentâ⬠¦In Dulce et Decorum est the metaphor as under a green sea, I saw him drowning shows a sense of panic and horror. The word green implies that he is qui te alienated. The word drowning creates a disturbing image in the readers mind which expresses the reality to them. It also creates a sense of despair and claustrophobia and makes the audience obtain this feeling for themselves. In Dulce et decorum est the structure makes the poem resemble more to an essay. The lines are mostly longer. However Wilfred Owen includes some short sentences such as ââ¬Å"gas! GAS! Quick boys!â⬠which capture our attention and creates a serious atmosphere. It also has a very slow pace and therefore some words have a guttural effect guttering, chocking, drowning These words are spoken form the back of your throat which makes the meaning of the words apply into your voice. In whos for the game the stanzas are quite short unlike Wilfred Owens. Jessie Pope creates a more pleasant atmosphere using short sentences throughout her poem, for example ââ¬Å"Wholl give his country a handâ⬠and this makes the poem more noticeable. The words are mainly one syllable long which makes it more flowing; the rhymes also contribute to the simple
Wednesday, May 6, 2020
Is Beowulf a Hero - 2129 Words
Is Beowulf a hero? It is vital when approaching the question of whether or not Beowulf can be viewed as a hero to attempt to understand the concept of a Ãâhero. Joseph Campbell, the American theorist, studied mythological characters and texts in great detail and developed the concept of the monomyth (or Heros Journey) which he suggested all heroes undertook: A hero ventures forth from the world of common day into a region of supernatural wonder: fabulous forces are there encountered and a decisive victory is won: the hero comes back from this mysterious adventure with the power to bestow boons on his fellow men. If we are to take this statement as being accurate it is fair to say that at least in so far as what actually occurs inâ⬠¦show more contentâ⬠¦Shortly before his contest with Grendels mother we are told he is Ãâindifferent to death a point which is exemplified when prior to the fight he sets out his wishes to Hrothgar for what should be done should he perish. He is not arrogant enough to assume victory is assured and yet he is also courageous enough to not fear the possibility of defeat. In Seamus Heaneys translation of Beowulf we constantly see him referring to the great Geat as a hero. For instance Ãâthe hero arose and Ãâheros helmet are but two of the references made. Although it is a hugely contentious issue, if we are to assume that Heaney is attempting, if only on the point of calling Beowulf a hero within the actual translated text, to give as direct a translation as is possible then it would seem apparent that the original author was making no secret of the fact he wanted him to be seen in this way too. There have been many criticisms of the character of Beowulf that highlight certain traits which could point away from the notion of him being a hero. One such idea is that he fought the monsters chiefly for personal reasons: ÃâBeowulf steadily shifts from a primarily defensive role to an aggressive one, motivated to varying degrees in each of his battles by thoughts of glory, vengeance and treasure It is particularly the stance that Beowulf was motivated by thoughts of glory that I believe endangers the belief that he was a hero.Show MoreRelatedBeowulf Is A Hero Of Beowulf1017 Words à |à 5 PagesIn the movie and book Beowulf, Beowulf represents a hero. Beowulf is like our modern day heroes, firefighters, policemen, military men, doctors and EMTââ¬â¢s. All of these men do the same thing as Beowulf did in the movie. The fight the villains and protect the innocent. Beowulf had super strength to help him defeat the villains and protect the innocent. I have heard moreover that the monster scorns in his reckless way to use weapons; therefore, to heighten Hygelac s fame and gladden his heart, I herebyRead MoreBeowulf : A Hero Or Hero?1092 Words à |à 5 PagesCole Jackson Miss Sibbach Honors English IV 10 December, 2014 To Be a Hero, or To Not Be a Hero Countless people have tried to say that Beowulf represents the qualities required of an epic hero, but many people also suggest that Beowulf does not show any of these qualities. While Beowulf shows heroic characteristics in all of his acts, both pride and greed motivate his actions. The story of Beowulf contains all of the information needed to show this, but people do not notice that which they do notRead MoreBeowulf the Hero1005 Words à |à 5 PagesBeowulf The Hero ââ¬Å"â⬠¦ A fiend out of hellâ⬠(Heaney 100). These words describe the monster Grendel, who is truly an evil entity. Only an epic hero with strength, courage and confidence is able to defeat this mighty foe. This heroââ¬â¢s name is Beowulf. He displays all of these throughout the epic. Beowulfââ¬â¢s first epic hero trait is confidence. Beowulf displays confidence when he talked to Unferth in the great hall Heorot. Beowulf said, ââ¬Å"â⬠¦but he will find me different. I will show him how Geats shapeRead MoreHero and Beowulf1625 Words à |à 7 PagesThe hero is an age-old concept that describes someone that will defend their honor to the end. In Beowulf, the author portrays the warrior Beowulf and his three battles in such a way as to clearly define what it means to be a hero. Fred Robinson and J. R. R. Tolkien addressed heroism in Beowulf regarding the warriorââ¬â¢s traits, as well as his battles and burial. The author of Beowulf defines the hero through Beowulfââ¬â¢s three battles with Grendel, Grendelââ¬â¢s mother, and the dragon. In this poem, eachRead MoreBeowulf As A Hero1716 Words à |à 7 PagesThe concept of hero is never outdated in literary. Every author has their own understanding of how a hero should be like, and all heroes live and b ehave differently according to the society they live in. The definition of hero is much broader than a man with superpower. In Beowulf and The Great Gatsby, both of the protagonist, Beowulf and Jay Gatsby are considered heroes in the story. Although both of them embody the values of their societies, Beowulf is a more successful hero because he truly reachesRead MoreBeowulf As A Hero910 Words à |à 4 PagesWhy We Need Heros A hero, ââ¬Å"a person noted for courageous acts or nobility of characterâ⬠(ââ¬Å"Heroâ⬠). A hero shows much more than honor and glory, they sacrifice their own life to selflessly help out the lives of others. By having heroes it gives us hope, wisdom, and justice throughout the nation. The three main types of heroes include an epic hero, superhero, and your own personal hero. These heroes show that it s more than the cape or armour they wear, they show the true meaning of a hero by definingRead MoreA Hero : A Comparison Of The Hero Of Beowulf884 Words à |à 4 Pages or Ulysses. Beowulf is a great example of one of the early heroes written about. But what is a hero? The Merriam-Webster Dictionary defines a hero as: an object of extreme admiration and devotion; a mythological or legendary figure often of divine descent endowed with great strength or ability. Beowulf has many of these characteristics including great strength, and is portrayed as a legendary figure by tho se who look up to him. Through the entire poem, he is the epitome of a hero and displaysRead More Beowulf: A Hero Essay782 Words à |à 4 PagesBeowulf: A Hero Beowulf is a hero during the Middle Ages because of his generosity, strength, power, and courage. A hero is one who places himself or herself at great risk while performing acts of courage. Beowulf is a hero that put his life on the line for an entire kingdom. He has heroic and superhuman qualities. He must prove his worthiness of a superior warrior. He is recognized for his strengths and power of protecting his people. Beowulf is faced with three forces to fight, Grendel (a monster)Read MoreBeowulf Hero Analysis757 Words à |à 4 Pagesà à à To Joseph Campbell a hero is an individual who is able to depart from his or her ordinary life for the sake of helping others in an opposite world. Campbell portrays his idea of a hero by utilizing the title character in Beowulf. Beowulf demonstrates many of Campbells stages of a hero through his strategic actions, his love for justice, and most importantly through his extraordinary strength. à à à The hero Beowulf, is the ââ¬Å"strongest of the Geats-greater/ And stronger than anyone anywhere in thisRead MoreBeowulf Is a Hero Essay877 Words à |à 4 PagesBeowulf Essay Every epic hero possesses certain heroic characteristics. The epic poem Beowulf describes the most heroic man of the Anglo-Saxon times. Beowulf is the hero. He shows that he is a great man by always putting other things before his own needs. He is important and needed by his people and is known by many as a strong, courageous and a helpful person. He shows all of the qualities and traits that a true hero possesses. Beowulf, like other epic heroes, possesses the following heroic qualities:
Mobile Network Communications and Telematics â⬠MyAssignmenthelp
Question: Discuss about the Mobile Network Communications and Telematics. Answer: Introduction: Under the BYOD scheme, the employees of Aztek will be granted with the permission to bring and use their devices in office for the execution and completion of office related tasks. Aztek is an Australian firm and there are no particular laws that have been set up in Australia for the surveillance of the employee devices in case of the outsourcing. There is no specific governance policy set up; however, the finance industry does have certain rules and guidelines in place. These specific rules around finance will be applicable as per the territory of operation by Aztek which would either be South Wales or it would be Australian Capital. There is a government body called Australian Securities and Investment Commission (ASIC) that governs the financial activities at the federal level in Australia along with the state and territory levels. An e-payments code is also defined under ASIC for the tracking, management and regulation of the electronic payments (Asic, 2017). If the organizations allow its employees to use or access the organizational components such as specific tools or applications outside of the office boundaries, then the Government of Australia provides them with the permission to carry out surveillance on such activities executed by the employees. There is act that has been set up for this purpose called NSW Act. The employee activities will be monitored by Aztek as per the principles under this act and also, the employees will be prevented from sharing the specific organizational details with any external entity. There are specific applications and software that can also be used for tracking of these activities. Workplace Privacy Act 2011 is an act that defined the steps that an organization may take to track and monitor the emails that are sent by the employees for sharing the organizational information. The logs of the mail server are captured and reviewed as per the norms of this act defined by Australian Government (Act, 2016). There are various unknown and unwanted communications that often take place in organizations that lead to the occurrence of security attacks. Telecommunications Act 1979 was defined to put a check on such activities by tracking and monitoring the communication integrity (Coe, 2011). It shall also be monitored by the rules under Intellectual Property. The privacy of the information associated with Aztek can also be secured and protected by the norms of Privacy Act (APP 5). It states that the employee-owned devices must never have the private or sensitive information of the company or any of its stakeholders. The access rights shall be provided only on the basis of the use role and any suspicious activity shall be immediately reported to the concerned authorities for information protection (Oaic, 2014). Security Posture Review of Aztek Many of the prevailing security norms and principles at Aztek shall be analyzed and updated after the implementation of BYOD in the company. Some of these updates will revolve around the security and usage of mobile devices, geographical strategies and security methods in general. The legal and political policies and rules that Aztek shall follow have been discussed in the section above. Security is another area in which there shall be certain modifications that must be made. After an analysis of the security aspect and status of Aztek, there are a few loopholes that have been observed. The organization is still using the old desktops, computer systems and networking devices that are based upon the outdated technology. It is also difficult or impossible to upgrade these systems to the latest concepts and advancements and this may lead to the emergence of many security attacks. The company is still using magnetic cards and readers for the purpose of identification of the resources and their identity. There shall be use of advanced measures for this purpose and it shall include the biometric recognition. Most of the servers, applications and systems are present in-house in Aztek. This may possess a great risk from the security point of view as there is a single failure point associated. There shall be use of virtual spaces and third party suppliers for server locations. Many updates need to be done on the legacy systems and databases also. The replacement of the devices all at once will demand a huge investment for Aztek. They should make sure that the replacement is done but it shall be carried out in a series of phases. This will ensure that the expenses can be easily met. The use of BYOD will ensure that the business continuity is maintained. Security of the Devices and Information For the organizations in which there is a single supplier or provider of all the devices and systems, the control and management in terms of security and tracking becomes easy. There are uniform policies that can be implemented so that the security is maintained. In the case of organizations that use outsourcing of the devices or systems, maintenance of security is rather difficult. In Aztek, employees will have the permission to get their devices as work. These devices will have varying properties and nature along with varied security capabilities and status. The application of a single policy to secure all these devices will not be a possibility. Therefore, development of suitable and proactive strategies will be required for the management and safety of all the devices and information (Curran, Maynes and Harkin, 2015). In case of Aztek, the common approaches that the organizations adapt to like locking of the devices beyond office network etc. would not work. The devices are the personal properties of the employees and they will have the right to use them outside of the office. The security strategies to be implemented will be required to be flexible and adaptable. One of the controls that may be applied may be in the form of restriction on usage of critical organizational applications beyond office network (Gillies, 2016). The devices of the employees will also bring in many attacks and risks from the security perspective. These devices may get broken, stolen or may also get lost. In case of their connectivity with the VPN at the time of any of such incident, the information will get disclosed to the party that may access the device. There shall be use of advanced trackers to track the devices in such events. Issues around authority and ownership may also come up in this case. The employees would want complete authority on their devices and may attempt to jailbreak the same to avoid the security controls set up by the organization. This would be hazardous for the device and for the security as well. This may lead to avoidance by the employees to bring and use their devices in office (Tokuyoshi, 2013). The device and information security shall be enhanced by restricting to some of the basic principles and mechanisms towards security. An analysis and investigation of the complete device and its properties must be done in adherence to the security policies of Aztek before it is approved for the usage. There shall be use of automated applications and trackers for the management of mobile devices. Remote management of the devices must be allowed along with the ability to wipe out all the information remotely. Critical and sensitive applications must not be accessible from the networks that are outside of the office location or VPN (Beckett, 2014). The applications that would belong to Aztek may get adversely impacted by mainly two forms of risks. These include malware threats and attacks along with the security weaknesses. There are several controls that are present for the avoidance and prevention of these two risk categories (Romer, 2014). The devices and the applications that are installed in these devices must always be scanned and updated to avoid security risks. Risk Assessment The process for risk assessment that shall be used in the case of Aztek shall have the framework which should include the definition of all the functionalities along with the categories that must be specified in terms of security and associated references. The process of security and risk management must include the identification, protection of the assets, control of the access, identification of the incidents, response planning and data recovery. The security measures must make sure that the information in the database and the one that is transmitted on the networks is secured and protected. There are various standards that have been set up to identify the security status of a particular organization. Tier 1: It is the security status of the organization in which the assets are partially protected and there are no formal definitions of the controls and measures to be applied. Tier 2: It is the security status in which the identification of the risks is completed and a formal definition is in place for the management of the risks. Tier 3: It is the state in which the leadership and management provide a go ahead on the security steps to be taken and the use of methods is also explained clearly. Tier 4: It is the state in which proactive and adaptive measures are taken that is ad-hoc in nature and there is no constant policy for the management of the risks. However, any of the risk or attack can be tackled in this state. Tier-4 is the state at which Aztek must work upon in order to reach so that the risks associated with the devices of the employees can be handled. The threats landscape is very dynamic in this case and would be possible to be handled only by the security mechanisms as defined under tier-4 (Singh et al., 2014). TVA Analysis (Threat Vulnerability Assessment) Name of the Risk Impact of the risk (5 being highest) Likelihood of the risk (5 being highest) Risk Ranking (Impact x Likelihood) Recommended strategy for risk control and management Breaching of the data and information sets 4 5 20 Avoidance strategy for the risks and attacks Leakage of the data and information sets 5 3 15 Avoidance strategy for the risks and attacks Loss of the data and information sets 5 3 15 Avoidance strategy for the risks and attacks Device loss or stealing 5 1 5 Mitigation strategy for the risks and attacks Insider Attacks Deliberate or Accidental 4 3 12 Transfer strategy for the risks and attacks Man in the Middle Attacks 4 4 16 Avoidance strategy for the risks and attacks IP Spoofing Threats 3 3 9 Avoidance strategy for the risks and attacks Exploitation of system and application vulnerabilities 4 3 12 Avoidance strategy for the risks and attacks Hacking of accounts 4 4 16 Mitigation strategy for the risks and attacks Denial of Service and distributed denial of service attacks 5 4 20 Avoidance strategy for the risks and attacks Malware Threats Virus, Worms, Ransomware, Logic Bombs, Spyware, Adware, Trojan Horses 4 4 16 Avoidance strategy for the risks and attacks Routing Control 4 2 8 Mitigation strategy for the risks and attacks Traffic Analysis and Monitoring 4 2 8 Avoidance strategy for the risks and attacks Social Engineering Risks and threats 4 3 12 Mitigation strategy for the risks and attacks Table 1: Risk Register for BYOD Countermeasures and Security Steps Many different countermeasures can be applied to control the risks and threats listed above in the table. Aztek must carry out a detailed planning for the management of the risks by defining the scopes, objectives and the goals that must be set up in terms of the BYOD scheme. The use of networks and the range of the devices must be considered for this. The prioritization in terms of the application of the treatment strategy or the handling of the identified risks must be set up. There shall be measures that must be taken for the analysis of the setting up of the priorities (Kumar and Singh, 2015). The risks that may have a higher likelihood of occurrence along with a higher impact especially on the sensitive data sets must be separately handled. These risks shall be treated with the highest priority. A mapping of the risks with the countermeasures to be applied shall be done. Not all the risks can be handled by using administrative checks only and not all of them would require extensive technical control. Such situations shall be decided on the basis of the type of risk (Stoecklin et al., 2016). There are many different types of controls that have been created for the purpose of risk handling and management. These control types along with their applicability has been described below. Preventive Controls: These are the types of controls which shall be applied for the enhancement of the basic security for the avoidance of the attacks from occurring in Aztek. The mechanisms like firewalls, access control and proxy servers would be included in this category. Detective Controls: The preventive controls may not always be successful and the malicious attackers may give shape to the attacks. The controls like intrusion detection, integrity checks along with maintenance of security logs shall be done for the detection of the attacks. Corrective Controls: In spite of the attack prevention and detection, the occurrence of the attacks may not be possible to be avoided. There are corrective controls that shall be applied in this case so that the damage can be controlled and corrected, for instance, information encryption (Blizzard, 2015). Deterrent Controls: The malicious entities must be made aware of the organization capabilities and readiness towards the attacks by informing them about the controls that they have taken. All of the policies and controls will be included in this category. Recovery Controls: Aztek must take the back up of their data sets so that in case of a risk occurrence, the damage is controlled and the recovery of the information sets and systems is possible. These controls would be included under this category. Compensating Controls: There can be use of alternate security controls in case of scenarios like unavailability of the desired control and likewise. These compensation controls shall be used in such cases. Data Information Security There are various assets that Aztek handles and manages. One of the most important and significant asset for the organization is its data sets. Out of the risks that have been listed in the risk assessment section of the report above, there are many risks that are specific only to the data and information security. There are many controls that can be applied for the purpose of securing the data like implementation of advanced access control mechanisms, recording and resolution of the incidents that are reported by the users, adherence to the best practices and standards, implementation of anti-malware packages and many others. The use of encryption techniques and user awareness sessions must be carried out as well. The data breaches in Aztek may occur due to several causes like malicious codes or attacks, system errors or user errors. With the implementation of the BYOD scheme, there will be many new forms of data security risks and attacks that will emerge. There will be increased likelihood of such attacks and the attacking surface will also enhance. It will be necessary to use advanced data protection and end-to-end security mechanisms. The employees may also be the carriers of the threats as they may disclose the information to the unauthorized entities or may also lead to device mismanagement. The security policies must be created for the protection of these forms of attacks as well. The employees shall be provided with the training sessions so that they may be aware of the risks and attacks that may occur. Many of the severe impacts may result out of these attacks in the form of legal risks and financial implications. The following measures must be taken for the protection of data and information. The logs that are maintained by the organization must include network logs, user activity logs and device logs and these logs must be reviewed regularly by using automated applications. Advanced Password Managers with the involvement of senior management must be present. The users shall be informed about the difference between strong passwords and weak passwords. They shall be encouraged to use strong passwords and PIN codes for data protection. The employees must not be allowed to access the critical applications on their home connections or public networks. Training sessions and schedules must be set up and executed so that the employees are made aware of the activities to be done and security practices to be followed. Information Classification Analysis of Security The data that will be handled by Aztek has been classified in different categories with different security mechanisms. Data Classified Type of information included in this category Type of Damage that may be caused Security policies and strategies applicable Extremely Sensitive Information Information such as social security number of the clients and the staff members, bank account details and credential to access the accounts The security risks and their occurrence can be extremely dangerous as there may be legal punishments and penalties along with financial penalties that may be applied by the victim These are the most critical data sets and shall be protected by using preventive, detection, deterrent, corrective and recovery controls. Viewing rights shall be given to CIO, CEO and Data Administrator with no updates allowed (Morrow, 2012). Internal Information: Confidential in nature Project information that will be covered by the organization, contractual terms with the third parties The customers will feel cheated and will avoid any form of engagement with the organization with the occurrence of such security risks and attacks (Yoo, Park and Kim, 2012) The use of technical and administrative checks must be done for data protection. Access must be given to senior management and senior officials in the security team. Modification shall be allowed to be made only by the Data Admin. Private Information Sets Internal strategies and decisions with set of plans and policies. Demographic details of the employees and the clients The stakeholders will feel cheated and will avoid any form of engagement with the organization with the occurrence of such security risks and attacks The use of technical and administrative checks must be done for data protection with application of preventive, detective and corrective controls. Access must be given to senior management and senior officials in the security team. Modification shall be allowed to be made only by the Data Admin and the Security Manager. Public Information Sets Set of services and products that are provided by the organization, contact details The market reputation and brand image of Aztek may negatively suffer Stakeholders shall be able to access and modify the information after the confirmation by the Data Admin. These must be protected using detective and preventive controls. Table 2: Classification of the Data Sets Security Strategies Conclusion Bring Your Own Devices (BYOD) is scheme that has been approved and is soon going to be implemented in Aztek. The issues and specific risk areas and their control measures have been specified. The main aim of Aztek is to provide its clients with the reliable and good quality financial services. There are several stakeholders associated with the organization that are working to achieve this goal. The BYOD scheme is also an attempt to achieve the same as the employees would be more comfortable with their personal devices leading to better operational services and efficiencies. The project has been evaluated as feasible from the operational perspective along with technical, political and organizational aspects. The specific rules around finance industry will be applicable on the BYOD project as per the territory of operation by Aztek which would either be South Wales or it would be Australian Capital. Workplace Privacy Act 2011 is an act that defined the steps that an organization may ta ke to track and monitor the emails that are sent by the employees for sharing the organizational information. Telecommunications Act 1979 was defined to put a check on unwanted communication activities by tracking and monitoring the communication integrity. Other applicable acts and policies include NSW, ASIC guidelines and Privacy Act. In Aztek, employees will have the permission to get their devices as work. These devices will have varying properties and nature along with varied security capabilities and status. The application of a single policy to secure all these devices will not be a possibility. Therefore, development of suitable and proactive strategies will be required for the management and safety of all the devices and information. Issues around authority and ownership may also come up in this case. The process of security and risk management in Aztek must include the identification, protection of the assets, control of the access, identification of the incidents, respons e planning and data recovery. It will also be necessary to use advanced data protection and end-to-end security mechanisms. References Act (2016). Workplace Privacy Act 2011. [online] Available at: https://www.legislation.act.gov.au/a/2011-4/current/pdf/2011-4.pdf [Accessed 27 Sep. 2017]. Asic (2017). ASIC Home | ASIC - Australian Securities and Investments Commission. [online] Asic.gov.au. Available at: https://asic.gov.au/ [Accessed 27 Sep. 2017]. Beckett, P. (2014). BYOD popular and problematic. Network Security, 2014(9), pp.7-9. Blizzard, S. (2015). Coming full circle: are there benefits to BYOD?. Computer Fraud Security, 2015(2), pp.18-20. Coe (2011). Telecommunications (Interception and Access) Act 1979. [online] Rm.coe.int. Available at: https://rm.coe.int/1680304330 [Accessed 27 Sep. 2017]. Curran, K., Maynes, V. and Harkin, D. (2015). Mobile device security. International Journal of Information and Computer Security, 7(1), p.1. Gillies, C. (2016). To BYOD or not to BYOD: factors affecting academic acceptance of student mobile devices in the classroom. Research in Learning Technology, 24(1), p.30357. Kumar, R. and Singh, H. (2015). A Proactive Procedure to Mitigate the BYOD Risks on the Security of an Information System. ACM SIGSOFT Software Engineering Notes, 40(1), pp.1-4. Morrow, B. (2012). BYOD security challenges: control and protect your most sensitive data. Network Security, 2012(12), pp.5-8. Oaic (2014). Chapter 5: APP 5 Notification of the collection of personal information| Office of the Australian Information Commissioner - OAIC. [online] Oaic.gov.au. Available at: https://www.oaic.gov.au/agencies-and-organisations/app-guidelines/chapter-5-app-5-notification-of-the-collection-of-personal-information [Accessed 27 Sep. 2017]. Romer, H. (2014). Best practices for BYOD security. Computer Fraud Security, 2014(1), pp.13-15. Singh, M., Sin Siang, S., Ying San, O., Hassain Malim, N. and Mohd Shariff, A. (2014). Security Attacks Taxonomy on Bring Your Own Devices (BYOD) Model. International Journal of Mobile Network Communications Telematics, 4(5), pp.1-17. Stoecklin, M., Singh, K., Koved, L., Hu, X., Chari, S., Rao, J., Cheng, P., Christodorescu, M., Sailer, R. and Schales, D. (2016). Passive security intelligence to analyze the security risks of mobile/BYOD activities. IBM Journal of Research and Development, 60(4), pp.9:1-9:13. Tokuyoshi, B. (2013). The security implications of BYOD. Network Security, 2013(4), pp.12-13. Yoo, S., Park, K. and Kim, J. (2012). Confidential information protection system for mobile devices. Security and Communication Networks, 5(12), pp.1452-1461.
Subscribe to:
Comments (Atom)