Evaluative Writing Essay

Free Articles

This article is based on the art of onslaught bar and it aims at exemplifying how security onslaught scenarios can be used to look into the effectivity of a system in forestalling a system onslaught. Through the usage of a system known as eSAP. the writers have made a study on how scenarios of possible onslaughts were selected and tested giving recommendations based on their consequences. The article comes in ready to hand particularly at a clip where the issue on information system security is rather critical for companies to keep.

This paper analyzes the article by Haralambos. Paolo and Gordon’s article as to find its rightness. usefulness and cogency of the survey. Throughout the survey. illustrations and comparings will be used to measure the work. Further justifications will be given for all statements put away. Evaluation The author starts of the paper rather good by explicating what the paper will cover in the debut. This gives the reader an overview of what to anticipate because he or she already has an thought of what the article is about ( Memering’ . 2008 ) .

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

The mode in which the debut is done is besides luring such that the reader is encouraged to read on. Further. the writers introduce the article by mentioning to another article from which the current one root from. This really encourages the reader to want to read the old article. For those that can non entree it nevertheless. this is a disadvantage to them. Consequently. it would hold been wise for the authors to get down with a brief history of the antecedently completed work so that the reader does can efficaciously understand where they started.

Failure to make this is hence a defect in the paper and could impact on the desire of the reader to look at the paper. The writers make usage of a existent life illustration in the article to explicate how the usage of scenarios can be used to analyse the information systems design. eSAP ( electronic Single Assessment Process ) is assessed to utilizing possible security onslaughts to set up whether its three chief security characteristics which include unity. handiness and privateness can be achieved in instance of an onslaught ( Haralambos. Paolo and Gordon. 2007 ) .

Attacks such as break. interception and alteration were used to look into eSAP. The usage of an illustration non merely makes the article more interesting to read but besides enhances the comprehensibility or the reader so that he or she can hold on precisely what the authors intend to state ( Memering’ . 2008 ) . Besides this. the writers make usage of a diagram for illustration. Harmonizing to Memering. 2007 ) . this is an effectual manner of doing the readers to acquire the thought that the writer is seeking to go through across at a glimpse.

For illustration. when a process is described in stairss. the reader can really follow these stairss to and understand the described procedure better than when merely the text was available. The article by Haralambos. Paolo and Gordon is rather utile in onslaught bar. In the current times. many companies have been faced with menaces of system onslaughts hence the demand to avoid them. An illustration is a recent onslaught on Kaspersky. a major anti-virus seller which occurred on the client support site in February 2009 ( O’Donnell. 2009 ) .

Since this paper addresses the possible ways in which systems meant to manage such instances can be tested. it is of important importance. This paper could organize a utile background for information system analysts to estimate the ability of different systems to efficaciously turn to the coveted security concerns. Another ground why this article is really utile is that for every factor tested. there is a recommendation given to cut down the likeliness of the happening of that action in existent life. For illustration. after proving the cogency of watchwords and the ability of the system to maintain off interlopers. the writers suggest the usage of erstwhile watchwords.

Such sort of advice could be used by technicians to foster enhance system security and thereby protect it from onslaught. This survey is rather relevant in the survey of information system security because it is rather alone in its ain manner. While other surveies concentrate on demoing the likely state of affairss that are may confront the security system. this paper suggests ways of proving them every bit good. Liu and Yu ( 2007 ) are some of the writers who came closest to making this sort of research by analysing the possible purposes of aggressors which are besides contained in this paper.

They nevertheless left the research at that and did non continue to prove the scenarios. Harmonizing to Liu and Yu ( 2007 ) . one time the attackers’ purposes are identified. the countermeasures to forestall onslaught can so be identified. They nevertheless fail to demo the standards that would be used to forestall onslaughts. Through the usage of the eSAP scenario. Haralambos. Paolo and Gordon bring out the construct so good and even give suggestions on how to manage onslaughts. It is a good manner of proving the effectivity of a system in managing assorted security onslaughts which the direction can use to set up which system to utilize in onslaught bar.

This is in line with what Liu and Yu ( 2009 ) suggest. Harmonizing to them. a system can merely be utile if it performs the occupation it is designed for. As an illustration. there is no manner a system can let every employee in a section to hold a watchword and anticipate that this to be a unafraid manner of protecting their system from aggressors. This is a good researched article and it would be right to state that it is valid both in footings of facts and looks made by the writers. Before the writers could execute the trial. a set of scenarios are selected which are so put through a scenario proof process.

This is done utilizing package reviews so that the information cogency is assured. The writers besides make usage of legion beginnings to as backup for the survey which makes the information contained valid to a big extent. Decision A paper that succeeds in seting across the coveted message is said to be appropriate. If it is of benefit. so it is utile to the leaders. Should the paper give facts that can be evidenced so we can afford to state that it is valid. The article by Haralambos. Paolo and Gordon leaves the reader with a batch of cognition to hold on.

It is good researched utilizing assorted books and the consequences can be said to be valid as they made usage of a existent life state of affairs to prove the system. The writers make the article simpler to understand through the usage of illustrations and a diagram. The recommendations given in the paper could besides turn out utile to future directors and system technicians in planing schemes of onslaught bar.

Mentions Liu. L. . Yu. E. . Mylopoulos. J. . ( 2007 ) . Analyzing Security Requirements as Relationships Among Strategic Actors. Proceedings of the 2nd Symposium on Requirements Engineering for Information Security ( SREIS’02 ) . Raleigh-North Carolina. Memering. D. ( 2008 ) . The writer’s work: usher to effectual composing. New York: Prentice-Hall. Mouratidis. H. . Giorgini. P. & A ; Manson. G. ( 2007 ) . Using Security Attack Scenarios to Analyse Security During Information Systems Design. Retrieved on July 20. 2009 from hypertext transfer protocol: //homepages. uel. Ac. uk/H. Mouratidis/Paper91_CR. pdf O’Donnell. A. ( 2009 ) . Kaspersky suffers attack on support site. no evident informations breach. Retrieved on July 20. 2009 from hypertext transfer protocol: //blogs. zdnet. com/security/ ? p=2511

Post a Comment

Your email address will not be published. Required fields are marked *

*

x

Hi!
I'm Katy

Would you like to get such a paper? How about receiving a customized one?

Check it out