Annotated bibliography Task_2

KEYWORDS:

Network Forensics, Internet, Security measures, Intrusion attacks, Intrusion Detection System, Detection from cyberattacks, Protection, Techniques.

 

Pattern or trends:

According to the collection of all annotated bibliographies are the indication of that all journals include information about various techniques and technologies that providing security to the organizations. The security for the organizations can be achieved by implementing mechanisms for example intrusion detection systems like HIM, DNN, SNORT, Anomaly detection methods so on.

Reflect arguments related to the annotated bibliography:

According to the examination of all articles and came out on this point that there are several articles and journal papers that mentioned how security plays an essential role for any enterprise and how some methods help to obtain that security to protect the network traffic flow.

Literature Gaps:

There is no doubt that this research topic includes various literature gaps such as some intrusion detection systems required to perform in real-time which are difficult because it is a backbreaking task to handle a large amount of data. Also, losing data during real-time analysis is another concern. However, these gaps can be improved by using a framework that works effectively to enhance such situations.

Literature Review:

Further, the task is to develop a literature review on the behalf of all the critical analyses which is performed and examined in this annotated bibliography task. A literature review is more about understanding the researcher viewpoint overall. Thus, in this task, we will recreate all the annotations with strong theoretical viewpoints and evidence.

 

MATERIALS AND METHODS:

This research discovers what types of security measures that organizations could receive with the help of internet and network forensics. To fulfil the research material related things, I follow the guidelines of CSU so, that I use IEEE, CSU A_Z database, and Goggle scholar which is an appropriate method to obtain the data related to the paper. Although, providing reference credit by utilized APA 7th edition to preserve the integrity of the work. For this research paper, I utilized several articles, journals, and conference papers.  Apart from that, critical examinations are done under task 1 which helps to explore the various methods and techniques that could use to obtain security measures for companies.

Leave a Reply

Your email address will not be published. Required fields are marked *