Tuesday, February 18, 2020

Writer's choice Research Paper Example | Topics and Well Written Essays - 1250 words - 4

Writer's choice - Research Paper Example ystem’s security requirements and gives a description of the controls that are in place or are planned to meet the security requirements (Nancy & Gregory, 2011). While securing systems, users can be one of the weakest links, and they, therefore, need to be trained adequately for them to understand system security risks. The NIST requires a cybersecurity profile to outline clearly the alignment of the functions, categories and subcategories of the business requirements, risk tolerance and resources within the organization. The cyber security profile identifies opportunities for improvement of the cyber security and moving the system from its current to a better state in terms of security. This paper will look at some security measures considered incorporated in a system security plan. These are safeguards incorporated in a computer, systems software, operation, and related devices for protection of critical IT resources against vulnerabilities both internally and externally. Implementation of effective logical access controls, an organization significantly reduces the risks to the system environment. Some logical access controls that have been incorporated into the system include assignment of access privileges, object re-use, session controls, re-certification of users, encryption, networking, dial-in, as well as use of warning banners. The core of an access-control system aims at securing evaluation of whether an established identity can access a particular computing resource, which is also called an object. A resource may be a service of some sort, an information receptacle such as a file or a Web resource like a uniform resource identifier (URI). The access control is decided over an existent security context and a controlled resource (Benantar, 2006). Intrusion detection systems are widely used in the enhancement of the security of information systems. The intrusion detection system detects and tracks the slightest signs of malicious activity and also keep

Tuesday, February 4, 2020

Online E-Petition System Literature review Example | Topics and Well Written Essays - 1250 words

Online E-Petition System - Literature review Example As such, in the midst of various possibilities of providing formal online participations platforms for citizens, e-petition systems have been considered as being official and fully operational online democracy activity for parliaments and governments, as well as for non-governmental institutions across the globe. The first of its kind was done in 2000 by the Scottish government; it was apparently the first online petition or e-petition system to be established anywhere in the world by an elected parliament (Susha and Gronlund, 2012; Medaglia, 2012). This was followed in 2002 by the Parliament of Queensland, which also designed and developed its own e-petition system. The Bundestag, German’s Federal Parliament also followed suit and has been, since 2005, operating an e-petition system that is more similar to the one established by the Scottish parliament. Not only parliaments followed this path, governments and other non-governmental institutions also followed this path; for in stance, the office of the British Prime Minister in 2006 launched an e-petition system dubbed the British Prime Minister’s e-petition system (Ralf Lindner and Ulrich Riehm, 2009; Beddie et al., 2001). In comparison to other forms of formal, codified, and institutionalized online political participation, which are albeit less advanced, e-petitions which have a quite impressive uptake by a number of public institutions still remains more an experimental concept; limited to very specific purposes (Taylor-Smith and Buckner, 2009). For instance, online voting, a form of online participation in referenda and general elections has been introduced in various jurisdictions across the globe; however, most governments eventually have refrained from these online political participation systems because of unresolved legal, technical, and political challenges (Kriplean et al., 2009; BÃ ¶hle and Ulrich Riehm, 2013). In the US, as well as in many jurisdictions throughout