Verified Document

Internal Control For Information Security: Annotated Bibliography Annotated Bibliography

¶ … Internal Control for Information Security: Annotated Bibliography Making the case for Network Security. (2012, Apr 19). Retrieved from Wikibon Blog:

http://wikibon.org/blog/making-the-case-for-network-security/

This author addresses the central concerns regarding information security in the modern business world using broad strokes to make the importance of network security as a key business operation readily apparent to the reader. As the article is addressed primarily on business managers and other practically interested personnel, the language is a bit too full of professional jargon and other needless complications, however the basic facts that the author lays out and the conclusions drawn from these facts and their relationship are quite straightforward and clear. Though not providing any truly in-depth and concrete data or profound insights, this presents overview information that is directly related to the investigation of network and information security.

Information: Complying with the Safeguards Rule. (n.d.). Retrieved from Bureau of Consumer Protection: http://www.business.ftc.gov/documents/bus54-

After providing this overview definition of different types of institutions that must comply with the safeguard rules, a broad description of the rules themselves and the areas of concern for information security and the protection financial information in networks is also provided, and recommendations and guidelines to help companies ensure compliance (and to inform consumers of their rights in regards to the protection of their financial information) are also supplied. Though not exactly related to the technical how-tos of providing information and network security, this source does provide an understanding of the practical ends and the legislative imperatives applicable to the area of investigation.
Schneider, G.P. (2009). Electronic Commerce Security. In G.P. Schneider,

Electronic Commerce (p. 459). Boston, MA: Cengage Learning.

A chapter in a larger…

Sources used in this document:
A chapter in a larger book dealing with all manner of issues that are related to electronic and especially online commerce, the focus here is particularly on the security needs of online and electronic commerce components and provides an overview of how to fulfill these security needs. The author moves from a very broad overview of certain topics to more specific and concrete examples and explanations, and in this provides a comprehensive understanding of the most commonly relevant areas of security in consumer and commercial transactions. Highly academic in tone, the information remains very accessible and provides a solid foundation on which to build the current investigation. As far as more in-depth and ground-breaking research or conclusions are concerned, however, this source is not especially helpful (nor is it designed to be).

Pervaiz, M., Cardei, M. & Wu, J. (2010). Routing Security in Ad Hoc Wireless Networks. Network Security 117-42.

The authors begin by describing an ad hoc wireless network -- essentially a wireless computer and communications network that uses unplanned and unofficially connected terminals and other devices as a temporary means of networking various individuals, machines, etc. -- and the many ways in which they can be utilized in the modern era. The usefulness of such networks is somewhat confounded by routing security issues, and the authors discuss means of building these networks in such a way that they remain more secure while still serving the malleable and temporary purposes for which they are intended. The authors do an excellent job of presenting technical information in an accessible fashion, and provide clear evidence for their conclusions. At the same time, the information provided is highly specific and thus is not broadly applicable to the research
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now