logo Use SA10RAM to get 10%* Discount.
Order Now logo

Ask This Question To Be Solved By Our ExpertsGet A+ Grade Solution Guaranteed

expert
Dolll JuttLaw
(4/5)

976 Answers

Hire Me
expert
Arun SainiPolitical science
(5/5)

934 Answers

Hire Me
expert
Kim WoodLaw
(5/5)

573 Answers

Hire Me
expert
Laura LeighlandMathematics
(/5)

622 Answers

Hire Me
Database

Search for four papers or journals on the Internet, ACM and/or IEEE Digital Libraries avoid White Papers.

INSTRUCTIONS TO CANDIDATES
ANSWER ALL QUESTIONS

Search for four papers or journals on the Internet, ACM and/or IEEE Digital Libraries (avoid White Papers). One for each of the following topics:

  1. Inference in DataBase
  2. Statistical Database Security
  3. Polyinstantiation Database Security
  4. Cryptography in Database Security

The review must include the following three components in depth, showing that you understood the material of each paper for each topic specified (Please note this is not a chapter review).

  • Bibliography of the paper in APA style (see example below)
  • Abstract (summary of the paper in 10 to 12 lines max.)
  • Review (3 or 4 paragraphs) describing your opinion of the article’s quality and your position. Did the writer do sufficient research? Are there elements of the argument that could have been enhanced with more detail or more argumentation? What would a follow-up article contain to be useful to this one? Did you agree with the article? Did it support or change your opinion? If not, then why?

Example of a paper review (please follow the outline of the example):

 Bibliography

Kelo, T., & Koskinen, J. (2009). “Modeling Network Security Competence for Certification.”       ACM Proceddings SIN’09, 30-38.

Abstract

This is based on work done in one EU–funded projects (InCert, 2006 – 2010) in International Certificates of Excellence in Selected areas of Information and Communication Technologies (ICT).  InCert has defined several certificates and created their examination in areas of ICT, and one especially in Network Security. The role of InCert is to promote the certificates, watch the quality, as well as manage the certificate procedures. A two-dimensional model competence of the InCert Network Security Professional (INSP) is described followed by a section on key elements in the methodology and procedure for the INSP certification. After that the experiments to conduct the test and enhance the methodology is presented. The paper concludes with a discussion of the finding, lesson learnt, as well as future possibilities.

Review

Narrative in 3 or 4 paragraphs describing opinion of the article’s quality and your position. Did the writer do sufficient research? Are there elements of the argument that could have been enhanced with more detail or more argumentation? What would a follow-up article contain to be useful to this one? Did you agree with the article? Did it support or change your opinion? If not, then why?

The quality of the paper is good and it is very informative. The INSP certificate is very popular in Europe. The authors explain the cognitive skills needed by a network security profession using a table of two-dimensions consisting of 6 rows and 5 columns. The rows were composed of 6 task areas of a network professional and 5 columns of the competence categories in the INSP exam. In the 30 cells, relevant tasks were given as examples in each cell. The six task areas are: preparation for defense, building countermeasures, daily operations, reacting to incidents, learning and growing, and various communicative skills within all other task areas. The five competence categories in the INSP certification exam are as follows: security threats in networks; using, applying and evaluating the defense arsenal, good practices in network security design, administrative and organizational defense of network security related issues.

The authors have done sufficient research and presented their work in an easy way to understand it. They also conducted experiments to test and enhance the methodology of the INSP.

The paper is technically correct. It is shown in the cells of the two-dimensional table how to derive some multiple-choice questions. For example, in the intersection of the row (prepared) with the column (defense) a question such as: “What type of server,…, firewall, …,fire extinguisher should we choose” is a valid question. A lot of questions that refer to logic and physical security can be asked in the examination. The mapping of this table to derive is technically correct. One drawback of the paper is the lack of emphasis of cryptography in this paper. It is slightly mentioned in some categories. Certainly, the authors could have enhanced this paper by including topics such as biometric, steganography, and cryptography, especially if they are included in the INSP.

The actual security work of a typical network security professional in an enterprise is broadly divided into six task areas. The common duties in all tasks are described; however, the inclusion of subcategories within the tasks can be very useful as a follow-up article.

The experiments with the students show that the exam questions need more validation. The number of students (16) is quite low for true statistical inferences, which makes it difficult to agree with the quality of the exam. Nevertheless, the quality of the paper is good and the research work done by the authors is encouraging

Related Questions

. The fundamental operations of create, read, update, and delete (CRUD) in either Python or Java

CS 340 Milestone One Guidelines and Rubric  Overview: For this assignment, you will implement the fundamental operations of create, read, update,

. Develop a program to emulate a purchase transaction at a retail store. This  program will have two classes, a LineItem class and a Transaction class

Retail Transaction Programming Project  Project Requirements:  Develop a program to emulate a purchase transaction at a retail store. This

. The following program contains five errors. Identify the errors and fix them

7COM1028   Secure Systems Programming   Referral Coursework: Secure

. Accepts the following from a user: Item Name Item Quantity Item Price Allows the user to create a file to store the sales receipt contents

Create a GUI program that:Accepts the following from a user:Item NameItem QuantityItem PriceAllows the user to create a file to store the sales receip

. The final project will encompass developing a web service using a software stack and implementing an industry-standard interface. Regardless of whether you choose to pursue application development goals as a pure developer or as a software engineer

CS 340 Final Project Guidelines and Rubric  Overview The final project will encompass developing a web service using a software stack and impleme

Get Free Quote!

354 Experts Online