Name: | Ben Parkinson | ||
Project Title: | Centralising Australian Government Cybersecurity | ||
Week No: | 8 | Date: | 6/09/2020 |
Planning | |||
Milestone: | Planned: | Actual: | Comment: |
Assessment 3 | 13/09/2020 | TBC | All articles identified |
Issues | |||
Description: | Date: | Action/Results | Finished (Y/N) |
Finding Articles | 06/09/2020 | Begin review | Y |
Work impact | 06/09/2020 | Nil taken | Y |
Year: 2020
Week 8 – Another few identified
I’ve now identified all articles, and reviewed another one. The list of articles I’m going to look at are below. Including them here because I’ve had a few issues with synching my Endnote, which blew away my last library.
References
- Baur-Ahrens, A. (2017). The power of cyberspace centralisation: analysing the example of data territorialisation. In M. Leese & S. Wittendorp (Eds.), Security/Mobility: Politics of Movement (pp. 37-56). Manchester University Press.
- Better Cloud. (2019). State of Insider Threats in the Digital Workplace. https://www.bettercloud.com/monitor/wp-content/uploads/sites/3/2019/03/BetterCloud-State-of-Insider-Threats-2019-FINAL.pdf
- FireEye. (2017). Security Orchestration: Best practices for any organization. https://www2.fireeye.com/rs/848-DID-242/images/wp-accessible-security-orchestration.pdf
- Griffith, M. K. (2018). A comprehensive security approach: bolstering Finnish cybersecurity capacity. Journal of Cyber Policy: SI: Comparative Industrial Policy and Cybersecurity, 3(3), 407-429. https://doi.org/10.1080/23738871.2018.1561919
- Islam, C., Babar, M., & Nepal, S. (2019). A Multi-Vocal Review of Security Orchestration. ACM Computing Surveys (CSUR), 52(2), 1-45. https://doi.org/10.1145/3305268
- MacDonald, N., Orans, L., & Skorupa, J. (2019). The Future of Network Security is in the Cloud. https://www.gartner.com/doc/reprints?id=1-1OG9EZYB&ct=190903&st=sb
- Mallinder, J., & Drabwell, P. (2013). Cyber security: a critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack. Journal of business continuity & emergency planning, 7(2), 103-111.
- Marston, S., Li, Z., Bandyopadhyay, S., Zhang, J., & Ghalsasi, A. (2011). Cloud computing — The business perspective. Decision Support Systems, 51(1), 176-189. https://doi.org/10.1016/j.dss.2010.12.006
- Miskon, S., Bandara, W., Gable, G., & Fielt, E. (2011). Success and failure factors of Shared Services: An Information Systems literature analysis. Proceedings of the International Conference on Research and Innovation in Information Systems, 1-6. https://doi.org/10.1109/ICRIIS.2011.6125726
- Poppensieker, T., & Riemenschnitter, R. (2018). A new posture for cybersecurity in a networked world (McKinsey on Risk, Issue 5). https://www.mckinsey.com/~/media/McKinsey/Business Functions/Risk/Our Insights/A new posture for cybersecurity in a networked world/A-new-posture-for-cybersecurity-in-a-networked-world.pdf
- Skopik, F., Settanni, G., & Fiedler, R. (2016). A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. Computers & Security, 60, 154-176. https://doi.org/10.1016/j.cose.2016.04.003
- Tourani, R., Bos, A., Misra, S., & Esposito, F. (2019). Towards security-as-a-service in multi-access edge. The Fourth ACM/IEEE Symposium on Edge Computing (pp. 358-363). https://doi.org/10.1145/3318216.3363335
Week 8 – Assessment 2 results back
I received my assessment 2 feedback today. Well technically received it yesterday, but only got around to looking at it today. The words used in the feedback were quite positive; however, the actual numbers associated with the feedback for my scores were pretty disappointing. I have considered going back to Ken to ask for further feedback, but at this point I just want to get through the subject, which is proving to be a struggle. In the interest of self-improvement I’ll be sure to get more comprehensive feedback for assessment 3, but I’m hoping the numbers aren’t so poor so won’t need the additional feedback.
Week 7 – It never lets up
Work continues to provide smash my time. I managed to read through two of the four articles this week which I had identified the previous week. One of the articles was pretty poor and so I’ve removed it from my pool. The other article, “A Multi-Vocal Review of Security Orchestration”, proved excellent, but unfortunately gave me more to think about. During my review I constantly needed to pull myself back from the rabbit holes I kept falling down. It has however helped me identify a number of other articles which I’ve put on my list to look at in the hope of completing my hand.
Week 6 – Building Blocks Defined
This week at work has been horrendous so I’m unfortunately only making a single entry this week. As I noted in my last post, I had to start down the track of breaking the research into building blocks for the final outcome as opposed to looking at the topic as a whole. I’ve managed to come up with my building blocks being ‘Shared Services’, ‘Cloud Technologies’, ‘Cloud Services’, ‘Multifaceted Security Orchestration’. Obviously these are my initial keywords but variations of these will be used as I progress through the research. I’ve discovered four articles so far which may fit the bill, but have as yet only read through the abstracts for these and not completed a more thorough analysis per the steps I outlined in my proposal.
Week 5 – Finding articles
I’ve today started work on searching for my articles. There is a dearth of available information on the topic, which I anticipated and hence catered for in my plan. It’s now a matter of breaking the work down into building blocks and researching each of those with the view to stitching the research together at the end.