Professional Documents
Culture Documents
Assignment Paper - Week 2-1B
Assignment Paper - Week 2-1B
Assignment Paper - Week 2-1B
INTRODUCTION
According to studies undertaken by leading experts, the internet is rapidly developing with new
advanced technologies appearing all the time. When a new product or anything that works with
the internet is put into the market, online security has always been the most crucial consideration.
Cyber Criminals attempts every method to gain access to personal data for harmful purposes as
more individuals gain access to the internet. To safeguard users and their data, internet safety
protocols has been established. Since cyber security is continuously evolving, it is a more
Dissertation 1
The research was conducted by Alberto Cotton from Colorado Technical University in
December 2020. The title of the research is “Identification of Manual Cybersecurity Tasks for
After collecting and analyzing data, the researcher made recommendation for future
research to be conducted. The first recommendation is that the future researcher should use the
The second recommendation is the study on how the organizations can create a plan to facilitate
the new professions by identifying new cybersecurity tasks requiring creative thinking. The last
recommendation is the study of how the use of AI automation decisions can among the
Dissertation 2
2
The researcher, Theodore Robert Hoffman III, conducted this study for his thesis at Utica
College. The title of the thesis is “5g and the Major Cybersecurity Concerns Regarding the
Implementation of the Technology” (Hoffman, 2019). The researcher suggested the future
research that should focus on the best practice for developing 5G cybersecurity strategy,
development of secure and low-cost IoT devices. The other area to be explored is the use of AI
Dissertation 3
Dr. Mitchell is from the Syracuse University and conducted a study called “CYBER
SECURITY @ HOME: The Effect of Home User Perceptions of Personal Security Performance
on Household IoT Security Intentions” (Mitchell, 2020). In this study, the researcher, Dr.
Mitchell recommended a future experimental study to test the user interfaces to improve security
feasibility. Dr. Mitchell recommended a pre-survey to measure human factor variables and a
post-test survey to determine whether the user was more confident in their ability to secure their
IoT devices. In addition, Dr. Mitchell suggested a further study can be conducted that could
assess the relationship between security intensions and security behaviors (Mitchell, 2020).
My proposed research will benefit from those future studies because medical devices are
Dissertation 4
The title of the study is “Exploring the Security Control Techniques Cybersecurity
Specialists Need to Protect Medical Wearable Devices” (Deal, 2021). According to the
researcher, there is a need to study on how data generated by medical wearables can be used by
insurance companies in real-time since they can help identify the best practice for supporting
medical devices privacy concerns. The future study can investigate the correlation between the
3
healthcare and the insurance providers. The other area of future research is the best approach by
comparing both passive and active Medical Internet of Things (MIoT) devices (Deal, 2021).
investigate.
Dissertation 5
The research of the study is “Security Improvements for Implementing the Internet of
Things into Medium and Large-Sized” (Hines-Cross, 2020). The researcher recommends a future
study to be conducted to determine the successes and shortfalls of this study. Dr. Hines-Cross
recommended a future research on executive awareness of IoT to understand the executive point
of view. The researcher in this case recommended a survey to be used to find out how many
executives are aware and are willing to adopt IoT technology in their businesses (Hines-Cross,
2020).
I think the future recommendation in this study would serve as my second alternative if I
Dissertation 6
The title of the research is the “Factors That Impact Information Technology Security
Professionals’ Intent to Use Intrusion Detection Systems: A Correlational Study” (Paiola, 2021).
Dr. Paiola recommend a future study to be conducted to explore the variables of IDS acceptance
Dissertation 7
The title of this dissertation is “Defending Infrastructure against Cyber Attacks through
Qualified Cybersecurity Professionals in the Federal Government: A Case Study” (Huhn, 2020).
4
The researcher Dr. Huhn suggested that a future study focusing the critical infrastructure sectors
such as healthcare, finance and others can be done. Another area of study is to compare and
contrast different critical infrastructure sectors inters on the cost, budget implications and
professionals.
Dissertation 8
Governance Formal Ontology”, (Mahmud, 2018). The research pointed that more research as
related to HI-MI decision governance require to be conducted to create a knowledge base for
Insufficient knowledge base in any profession or field can create a knowledge gap which
Dissertation 9
conducted. The title of the research is “Smartphone Security: A Quantitative Analysis of Security
Usage and Outcomes” (Winters, 2019). The researcher recommended several future researches
but I will discuss only two. The first one is a study to be conducted based on the outcome of this
study that would measure the effectiveness of the mobile device security. The second one is a
study that would gather amount of data loss and compare different security measures used
(Winters, 2019).
Dissertation 10
The title of the research is “Machine Learning Approaches to Improve Security and
Performance Monitoring of IoT Devices” (Kayode, 2020). In this study, the research
recommended a future study to be conducted in monitoring of digital twins and determine the
best way to easily upgrade connected devices or remotely deploy and monitor the updates
(Kayode, 2020).
SUMMARY
Organizations, individuals, and governments have recently adopted a reactive, "point product"
strategy to countering cyber threats, combining various security systems – one on top of the other
– to protect their networks and the precious data contained inside them. This technique is not
only costly and complicated, but news of devastating cyber breaches continues to dominate
headlines, rendering it useless. Given the growing number of data breaches, the subject of cyber
security has risen to the top of the priority list for boards of directors, who are looking for a less
on endpoints, in data centers, on networks, in public and private clouds, and across Saabs
environments. Organizations can prevent cyber-attacks from affecting their networks in the first
place and reduce overall cyber security risk to a tolerable level by concentrating on prevention.
6
REFFERENCE
University).
Deal, J. M. (2021). Exploring the Security Control Techniques Cybersecurity Specialists Need to
Hines-Cross, D. (2020). Security Improvements for Implementing the Internet of Things into
Hoffman III, T. R. (2019). 5G and the Major Cybersecurity Concerns Regarding the
Capella University).
Monitoring of IoT Devices (Doctoral dissertation, The University of Texas at San Antonio).
Mitchell, E. M. (2020). Cyber Security@ Home: The Effect of Home User Perceptions of
Syracuse University).
Paiola, M. (2021). Factors that Impact Information Technology Security Professionals’ Intent to
University).
7