Name: | Ben Parkinson | ||
Project Title: | Centralising Australian Government Cybersecurity | ||
Week No: | 11 | Date: | 27/09/2020 |
Planning | |||
Milestone: | Planned: | Actual: | Comment: |
A4: Task 1 | 06/10/2020 | TBC | Draft started |
A4: Task 2 | 06/10/2020 | TBC | Not Started |
A1: Task 2 | 06/10/2020 | TBC | This is the 2nd last entry |
Issues | |||
Description: | Date: | Action/Results | Finished (Y/N) |
Work impacts | 26/09/2020 | Nil | Y |
Month: September 2020
Week 11 – Who’s the idiot?
So, all my previous blog posts haven’t been displaying (nor has my project proposal, annotated bibliography, or journal synopsis). Why you ask? Because you are looking at the blog of a goose! I included an add-in for my site which I was hoping to help productivity. Previously when using the blog sites I’ve written my blog entry during my lunch breaks or at the end of the night, then push it to my blog via script from a markdown file…. Turns out there’s a setting where it saves it, but doesn’t actually publish it. I hadn’t been on the site because I just wanted to focus on the information and not get carried away with formatting. That’ll teach me for trying to be a smarty pants!
Week 10 – Annotated Bibliography & Journal Synopsis Submitted
Holy hell, that was an epic sprint to the finish. I got whatever it was my son had and just after the presentation on the 15th I ended up going straight home. I spent the Wednesday, Thursday, and Friday in bed. I considered requesting another extension, but it just didn’t feel appropriate. Ken has been really great thus far, and pushing that boundary is really unreasonable. I spent the day tidying up the annotated bibliography, which included fighting with Endnote for some reason. Either through delirium from the virus I have had, excitement that my Masters is almost complete, complete breakdown, or a combination of all of those, I had a bit of fun with the Journal Synopsis and lashed out on a ‘fun’ title. I know break out the geek glasses. The self reflection component of my assessment was really interesting to undertake. It had me question a number of my decisions during this project. It’s unfortunate that I hadn’t done this more thoroughly throughout the rest of the subject as I think I may have come up with a different approach to delivery.
Week 10 – Annotated Bibliography update
I’ve mustered up time from somewhere unknown and completed two articles. I like the format I have created where it is somewhat more conversational as opposed to a heading / body format as it is proving to be more readable. I’ve sorted out the issues I was having with Endnote, which turned out to be a problem in my Word template, essentially had to repair my normal.dot, which was somewhat frustrating.
Week 9 – All articles reviewed!
Didn’t think I would get to this point after the last week. I’ve reviewed all articles, and have made my notes against each article. I haven’t mentioned it for this subject, but I love OneNote, it has simplified the whole note taking process, so I should almost be able to do a copy paste into my final document… almost. Throughout my whole masters (and my work) it is an unsung application hero. I originally added my reviews for each article against the Endnote record so that I could do an easy import; however, I discovered, that you still have to export all of this as a rich text format and then copy that over. I was kind of hoping for a more elegant solution.
Week 9 – What is this thing called life
I type this as the song ‘Cats in the Cradle’ plays through my mind. I’ve had to request an extension for Assessment 3 to the 19th. My son has been tremendously sick, which has taken pretty much all my attention, this naturally impacted my work and I have a presentation on the 15th which I need to prepare for. Ugh! As a result I’ve done nothing since my last post unfortunately. I lie, I think I prettied up some of my document, but that was about the only time I could muster.
Week 8 – Another few identified
I’ve now identified all articles, and reviewed another one. The list of articles I’m going to look at are below. Including them here because I’ve had a few issues with synching my Endnote, which blew away my last library.
References
- Baur-Ahrens, A. (2017). The power of cyberspace centralisation: analysing the example of data territorialisation. In M. Leese & S. Wittendorp (Eds.), Security/Mobility: Politics of Movement (pp. 37-56). Manchester University Press.
- Better Cloud. (2019). State of Insider Threats in the Digital Workplace. https://www.bettercloud.com/monitor/wp-content/uploads/sites/3/2019/03/BetterCloud-State-of-Insider-Threats-2019-FINAL.pdf
- FireEye. (2017). Security Orchestration: Best practices for any organization. https://www2.fireeye.com/rs/848-DID-242/images/wp-accessible-security-orchestration.pdf
- Griffith, M. K. (2018). A comprehensive security approach: bolstering Finnish cybersecurity capacity. Journal of Cyber Policy: SI: Comparative Industrial Policy and Cybersecurity, 3(3), 407-429. https://doi.org/10.1080/23738871.2018.1561919
- Islam, C., Babar, M., & Nepal, S. (2019). A Multi-Vocal Review of Security Orchestration. ACM Computing Surveys (CSUR), 52(2), 1-45. https://doi.org/10.1145/3305268
- MacDonald, N., Orans, L., & Skorupa, J. (2019). The Future of Network Security is in the Cloud. https://www.gartner.com/doc/reprints?id=1-1OG9EZYB&ct=190903&st=sb
- Mallinder, J., & Drabwell, P. (2013). Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack. Journal of business continuity & emergency planning, 7(2), 103-111.
- Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing — The business perspective. Decision Support Systems, 51(1), 176-189. https://doi.org/10.1016/j.dss.2010.12.006
- Miskon, S., Bandara, W., Gable, G., & Fielt, E. (2011). Success and failure factors of Shared Services: An Information Systems literature analysis. Proceedings of the International Conference on Research and Innovation in Information Systems, 1-6. https://doi.org/10.1109/ICRIIS.2011.6125726
- Poppensieker, T., & Riemenschnitter, R. (2018). A new posture for cybersecurity in a networked world (McKinsey on Risk, Issue 5). https://www.mckinsey.com/~/media/McKinsey/Business Functions/Risk/Our Insights/A new posture for cybersecurity in a networked world/A-new-posture-for-cybersecurity-in-a-networked-world.pdf
- Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, 154-176. https://doi.org/10.1016/j.cose.2016.04.003
- Tourani, R., Bos, A., Misra, S., & Esposito, F. (2019). Towards security-as-a-service in multi-access edge. The Fourth ACM/IEEE Symposium on Edge Computing (pp. 358-363). https://doi.org/10.1145/3318216.3363335