Sunday, May 17, 2020

Functional Safety, Fire Protection And Radiation Protection

Functional Safety Student: Ken Kaufmann S14004464 Lecturer/Tutor: Fatima Mansour Table of contents 1 Introduction 1 2 Standard definitions 1 2.1 IEC 61508 1 2.2 IEC 61511 1 3 Case study 2 4 Conclusion 2 5 List of references 2 6 List of Figures 3 1 Introduction The increasingly extensive automation of complex system, presents completely new challenges to the development of technical solutions. The complexity of systems, whose malfunctions cause’s significant damages, are able to cause of most errors. In work areas such as aerospace or in power stations, there has always been ahead of awareness. There are international standard and guidelines available, which defines the requirements for safety-related equipment in different depths and classifications. 2 Functional Safety Functional safety refers to the part of the security of a system, which depends on the correct function of the safety related system and other risk mitigation techniques. Functional safety does not include electrical safety, fire protection and radiation protection. Systems which are consisting out of electrical and electronic components are used since many years to perform safety functions within the most application areas. Programmable electronic systems or also called computer based systems, are used in every application area, to perform non-safety functions and recently safety functions. [1] Within every industry sector, functional safety is applicable as concept. For SafetyShow MoreRelatedSmoke Alarms1556 Words   |  7 PagesEach year most people are in disbelief and doubt that something as critical as a fire could happen to them, this skepticism has led to more deaths and property damage than should have occurred. In the current generation smoke alarms are mandatory and advancements to the technology have been occurring rapidly. With the use of smoke detectors, firefighters have been more successful in the saving of lives and the protection of property. Even with smoke detectors getting more technologically advanced, researchersRead MoreThe Effects Of Radiation On Public Health2064 Words   |  9 PagesThe Effects of Radiation in the Environment on Public Health Introduction Radiation in the environment is widespread and a necessary process for the existence of life. We encounter it from natural sources like the sun or from modern technology such as computed tomography better known as CT scan, and nuclear power plants. Radiation from sunlight is essential but too much of it can be harmful, just as the use of radiation in CT scans. Computed tomography can provide lifesaving information aboutRead MoreThe Disaster Preparedness Cycle Of Chernobyl1345 Words   |  6 Pageshistory of the disaster, preparedness, and will be discussed, as well as the disaster preparedness cycle. The disaster at Unit 4 at Chernobyl occurred at 0124 on April 26, 1986 (Smith and Beresford, 2005). At this time, there were four functional units for generating electricity, with two more being built (Smith and Beresford, 2005). On April 25, these RBMK-1000 reactors were having supply failure testing performed at the time of the disaster (Smith and Beresford, 2005). To do this, theRead MoreThe Effects Of Radioactive Wastes On The Environment2165 Words   |  9 PagesIntroduction Radiation in the environment is widespread and a necessary process for the existence of life. We encounter it from natural sources like rocks, soils and the sun1,2 and from modern technology such as computed tomography better known as CT scan, and nuclear power plants. Radiation from sunlight is essential but too much of it can be harmful, just as the use of radiation in CT scans. Computed tomography can provide lifesaving information about disease but in high doses can also causeRead MoreThe Nuclear Of Nuclear Power2618 Words   |  11 Pagesfission because fusion is almost impossible to achieve due the conditions needed to have the reaction occur. One place where it is known that fusion can take place is the sun. When one thinks of nuclear power, they think radiation, however not all nuclear reactions emit radiation. The reason why all nuclear power is radioactive is due to the fact that radioactive elements, especially uranium, is used because of it is the easiest to produce a nuclear fission reaction because it is a large element andRead MoreThe Nuclear Of Nuclear Power2545 Words   |  11 Pagesfission because fusion is almost impossible to achieve due the conditions needed to have the reaction occur. One place where it is known that fusion can take place is the sun. When one thinks of nuclear power, they think radiation, however not all nuclear reactions emit radiation. The reason why all nuclear power is radioactive is due to the fact that radioactive elements, especially uranium, is used because of it is the easiest to produce a nuclear fission reaction because it is a large element andRead MoreArmy Safety Essay3672 Words   |  15 PagesAppendix A References Section I Required Publications AR 385–10 The Army Safety Program AR 385–40 Accident Reporting and Records DA PAM 385–10 The Army Safety Program DA PAM 385–40 Army Accident Investigation and DA PAM 385–64 Ammunition and Explosives Safety Standards DA PAM 385–90 Army Aviation Accident Prevention Program FM 5–19 Composite Risk Management Section II Related Publications A related publication is a source of additional information. The userRead MoreNanotechnology in Aviation2303 Words   |  10 Pagesthe next 20 years by an average growth rate of about 5%. Main reasons are GDP growth, increased globalization, and population growth. To satisfy these expectations aircraft companies are looking for new technologies. They are looking for increased safety, reduced emissions, reduced noise, increased capacity, increased range, enhanced payload, higher speed, lower operating and maintenance costs, better overall management of the aircraft and its use. II. Properties Of Nanomaterials The main drivingRead MoreWhy Teach Industrial Controls Without Being Brand Specific?1942 Words   |  8 PagesHISTORY OF THE UNDERWRITERS LABORATORY AND THE NFPA History Technology works with society and grows over time. A historic perspective aids in understanding where we come from and why we do what we do. The engineering codes known as the National Fire Protection (NFPA) Codes are a large part of devices and buildings today. This is a history of the NFPA. The Birth of NFPA Significant Codes for this Text This text will specifically discuss sections of NFPA 79: Electrical Standard for Industrial MachineryRead MorePaper on Work Place Safety10014 Words   |  41 PagesEMP 5103 RELIABILITY, QUALITY AND SAFETY ENGINEERING EMP 5103 TERM PROJECT ON: WORKPLACE SAFETY SUMMARY In this paper, workplace safety is discussed. Analysis of historical data on workplace accidents were used to establish the need and importance of workplace safety. Relationship between Safety and Reliability Engineering was established to show how reliability engineering techniques

Wednesday, May 6, 2020

What I Have Learned About Research - 1270 Words

What I have learned about research is that it is a process, a scientific process that psychologist and scientist develop that includes many different approaches and that is carefully peer reviewed and evaluated. There is what is called the Scientific Approach where scientist have an idea or theory and based on their observation will either support the theory or the theory can be falsified by their peers. Data also goes through a review period before it is published in a scientific journal by scientist who have the knowledge and expertise to evaluate it. I also learned the difference between basic and applied research where basic research focuses mostly on things such as emotion, cognition, social behavior, personality development, learning, and neuropsychology. Basic research will be more helpful for answering fundamental questions about the nature of behavior. Applied research however, addresses more of a specific problem with a possible solution. Program evaluation covers a large area of applied research. Program evaluation assesses the social reforms and innovations that occur in government, education, the criminal justice system, industry, health care, and mental health institutions. When discussing behavioral research it is imperative to note the precedents that it has in many fields and the significance of the applications to public policy. A variable is referred to as any event, situation, behavior, or individual characteristic that changes or varies. Any variableShow MoreRelatedWhat I Have Learned About Research At An Introductory Level986 Words   |  4 Pagesa community, or an organization. Case Studies illustrate a problem; indicate a means for solving a problem; and/or shed light on needed research, clinical applications, or theoretical materials† (APA, 2010, p. 11). The goal of this paper is for me to conduct a case study on myself and explain what I have learned about research at an introductory level, and how I evaluate or critique it from a biblical, Christian perspective. The Subject: Jasmine The subject of this case study is a 19-year-oldRead MoreWhat I Have Learned About Research At An Introductory Level1776 Words   |  8 PagesThroughout this course I have learned many things about research at an introductory level. Research is a critical part of all of our lives in many ways. God blesses each of us with a degree of common sense and we all learn from observing others even as babies, we learned behaviors and skills by observing our parents. Walking through experiences throughout life teach us a lot we need to know as well but sometimes we have to take a better approach when we need to learn about certain things. ManyRead MoreMy Experience At Eastern Connecticut State University937 Words   |  4 PagesConnecticut State University, I learned a lot about myself and what I have been doing as a student. In that time, I learned not only about myself, my academic strength’s and even learned to think critically and ask questions. Eastern has taught me to be myself and this campus puts more emphasis on individuality over group thinking. I learned a lot in applying my critical thinking skills to my history classes and learned a lot in how to look at History in everyday context. What my experience at EasternRead MoreA Research Study On My College Career I Have Spent A Lot Of Time Reading1671 Words   |  7 Pagescollege career I have spent a lot of time reading the research findings of other people. Whether reading an original study, taking notes on a lecture that summarizes research, or reading a textbook chapter that describes the latest knowledge in a particular field, I have been on the receiving end of other people’s research. Finally, in this class, I have performed my own primary research, and created new knowledge with my group. By doing this I have learned so much about research, and about myself, fromRead MoreWhat I Have Learned And Perfected While Taking This Course934 Words   |  4 PagesResearch can be a very scary topic when it is first introduced to a class, and I was that scary student. Research to me was like learning how to swim for the first time with a life vest on, and my heart beating 100 miles per hour because I’m so afraid. Taking off my life vest and diving into this research course has been very rewarding for me. I have learned so much in such a short amount of time. It has open my eyes up to a variety of ways I can start and conduct my research. Research is not soRead MoreResearch At Rutgers University1200 Words   |  5 Pagessummer, I interned for Rutgers University in their Grant and Contracting department. Going into this internship I didn’t know what to expect. I knew Rutgers was a very large University located in new Jersey which has multiple campuses located in New Brunswick, Camden and Newark. Rutgers is a state university of New Jersey and they recently joined the Big Ten for sporting affiliations. Their mascot is the Scarlet Knight. Since I live in New Jersey, I thought I knew a good amount about Rutgers, I wasRead MoreReflection Paper On Science And Science906 Words   |  4 Pages Before taking this course, I had never questioned how to characterize science. In elementary school I was taught that â€Å"good† science experiments use the scientific method so that they are replicable. I had always seen science as a source of reliable information. I certainly questioned certain findings, but I held the belief that there was such a thing as â€Å"good science.† I thought that â€Å"good science† transcended any subjectivity and was indisputable. These notions I had were called into questionRead MoreReflection On The Field Of Organizational Psychology963 Words   |  4 Pages Reflection Before the start of this class I had little experience with research and little knowledge regarding the components of each research approach. Additionally, I had preconceived notions that qualitative research would be my approach of choice because I assumed it was an easier choice so to speak because it did not include numeric data. This course has definitely changed my mind on being open to the other approaches. I have learned that quantitative, qualitative, and mixed methods approachRead MoreMy Reflection Of Writing1579 Words   |  7 PagesThis semester I wrote three essays; a review essay, annotated bibliography, and a research paper. As I wrote these essays I learned what they were, why they are written, and why people use these to obtain information. Throughout this course I enjoyed writing the essays and learning new things from what I was writing about. Although some were not easy I still took my time and made sure they were perfect in my eyes. While taking this class I lea rned a new perspective of writing these specific papersRead MorePersonal Note On Being A Good Writer978 Words   |  4 Pagesdefinitely not a skill that can be achieved overnight. Throughout the semester in English 908, I have written and read many ideas that I believe will help me in my future college courses and in life. I am proud to say I learned all of these concepts on my own with the help of two textbooks and the commitment to stay self-disciplined. Staying on course throughout this class helped me learn and achieve more than what I was expecting to. My first thought coming into an online English course was that it was

Encyclopedia of Cryptography and Security †MyAssignmenthelp.com

Question: Discuss about the Encyclopedia of Cryptography and Security. Answer: Introduction Cloud security is the wide range of approaches and strategies of securing data and information with the help of cloud computing. Several technologies are utilized in this process. These technologies and strategies are given to the user to secure their data perfectly and safely. The infrastructure of cloud computing is also involved in this security procedure (Rong, Nguyen Jaatun, 2013). It is the sub part of information security and network security. The Department of Administrative Services or DAS gives various services to the Australian State Government. The services are procurement, payroll, human resource management, personnel management and contractor management. Due to the recent changes in the policies of the government, Department of Administrative Services is shifting to a new approach known as the Shared Service approach (Almorsy, Grundy Mller, 2016). This particular approach means that a fixed number of services will be controlled by DAS for the benefit of the Whole of G overnment (WofG). DAS has to follow various strategies and tasks. The following report outlines a brief description about cloud security for the case study of Department of Administrative Services or DAS. The report provides a privacy strategy proposal for DAS. It includes the collection and control of applied personal data, utilization and security of various digital identities, securing and accessing personal data, rectifying personal data and proper recommendations to control and secure data with cloud computing (Liu, 2012). The report also covers a strategy to secure and protect personal data with proper recommendations. The description of the above discussion is given in the following paragraphs. Department of Administrative Services or DAS gives various services to the Australian State Government. The services are procurement, payroll, human resource management, personnel management and contractor management. Due to the recent changes in the policies of the government, Department of Administrative Services is shifting to a new approach known as the Shared Service approach (Behl Behl, 2012). This particular approach means that a fixed number of services will be controlled by DAS for the benefit of the Whole of Government (WofG). DAS has to follow various strategies and tasks. DAS gives the integrated services to the remaining agencies and departments of the government. There is another policy of the government, which is the Cloud First approach. This is utilized for upgrading and obtaining various services. The various tasks that are to be done by DAS are purchasing a personnel and HR management application. This particular application will give a human resources suite, prov iding a perfect management of performance (Lee, 2012). The employees of DAS will store the information directly into this particular application with the help of a secured URL. A secured application of transferring data will upload huge amount of data. It is the responsibility of DAS to check whether the data entered in correct or not. There will be a new application known as the Commercial Off The Shelf or COTS will control the public cloud section. All the authenticated credentials of the authorized users are uploaded to enable the users to access the payroll of the agency. It is noticed that authentication is done only by utilizing the agency ID credentials of the users (Aljawarneh, 2012). All the agencies in the Whole of Government are required to utilize the Active Directory Federated Services of ADFS for federation to the Azure AD instance for authorization and authentication. Privacy Strategy for Personal Data Department of Administrative Services or DAS will have to secure their personal data through a good quality of privacy strategy. There are various steps to protect their personal data (Tsai et al., 2012). The most important step is to manage their personal information so that it is not accessible by hackers or unauthorized people. The steps to secure the personal data of DAS are as follows: Secured Browser: Utilization of a safe and secured Web browser is the first and the foremost step in managing the personal data (Tianfield, 2012). This can help to prevent from entering into the unauthorized websites and all sorts of virus attacks. Passwords: Utilization of several passwords is another important step to prevent all types of data hacking (Kulkarni et al., 2012). DAS should keep specific passwords in all of their private information and they should change those passwords on a regular basis. Collection and Management of Solicited Personal Information a) Logging Out: This is an important step to secure the data form hacking. Every time the users should log out from the system so that other people are not able to access their data. b) Anti Virus: This is the most basic and the easiest way to secure personal data. DAS should install antivirus software in their cloud to protect their personal data from virus attacks (Chou, 2013). DAS can secure their personal information by blocking the access to the systems and personal websites (Suresh Prasad, 2012). The disclosure and utilization of personal information can lead the organization into serious security problems. Use and Security of Digital Identities A digital identity is data of an organization that is utilized to depict an external representative (Iankoulova Daneva, 2012). This particular representative can be an individual, an organization or an application. Digital identities has several advantages. The main advantages of digital identities are as follows: Security: The main advantage of digital identity is its security. The data is extremely safe and secured with the help of digital identity. Data Integrity: The integrity of the data is not lost because of digital identity. This is another important advantage of digital identity. Simple: Digital identity does not require many complexities and time to get implemented (Salah et al., 2013). This is extremely simple and thus this is another important advantage of digital identity. Fast: Digital identities are extremely fast and this is another important advantage of digital identity. However, implementing digital identities in DAS can sometimes turn to be risky. These digital identities should be safe and secured so that there exists no loopholes of hacking in the data. The utilization and security of digital identities are the most important step to secure the cloud. Limited Access to Systems: All the users should not be allowed to use all the systems (Malik Nazir, 2012). DAS should allow and unauthorized users to access their computers and systems. Private WiFi Connection: DAS should install a private wireless connection for internet access. Security and access to personal information is another important step to save the privacy. The information should be secured so that the unauthorized access to various information is mitigated (Hamlen et al. 2013). Department of Administrative Services should secure their personal information by limiting the access to their personal information from unauthorized users. Quality and Correction of Personal Information The quality and the correction of personal information is another important step to keep the privacy of the data. DAS should focus on the quality of their information so that there exists no loopholes in the privacy (Liu, 2012). Moreover, the information should be corrected from time to time to avoid all sorts of errors in the information. DAS is dealing with several dangerous information that are highly confidential. There are various ways to mitigate these risks (Von Solms Van Niekerk, 2013). It is recommended that Department of Administrative Services should focus on their security of personal information. The three ways to mitigate the privacy risks of information are as follows: Encryption: The procedure of encrypting or encoding a particular message to maintain its security without changing the inner meaning is known as encryption. It encodes the entire message into a cipher text, which is only readable by the receiver. When a sender sends a message, he sends it in an encrypted form (Stallings Brown, 2012). This saves the message from getting theft and thus security is maintained. There are two main algorithms used for encryption. They are the Symmetric Key Algorithm and the Asymmetric Key Algorithm. The symmetric key algorithm is extremely simple. The sender and the receiver are provided with a key. The sender while sending a message with encodes the message with the key. Once, the receiver receives the message, he is able to decode the message with that particular key only. No other unauthorized users will get the access of the data and thus the data is absolutely secured through encryption (Van Tilborg Jajodia, 2014). The unencrypted message is known a s the plain text while, the encrypted message is known as the cipher text. The main advantage of encryption is that it is extremely secured. The second algorithm for encryption is the asymmetric algorithm. Here, the case is different from symmetric key algorithm. Here the sender and the receiver have two different keys to encode and decode the message. The sender encrypts the message with a particular key and the receiver decrypts the message with a different key. The main advantage of symmetric key algorithm is that it is extremely simple as both the keys are same. However, it has one disadvantage as well (Stallings Brown, 2012). Both the keys are same in symmetric key algorithm. Thus, if any one of them loses the key, there is a high chance that the data cannot be recovered any more. This can lead to major problem for any organization. The main advantage of asymmetric key algorithm is that the security is double than symmetric key. Since, there are two keys; there is no need to e xchange keys between the sender and the receiver. This helps to keep the keys safe and secured. However, there is a disadvantage as well. The main disadvantage of asymmetric key algorithm is its complexities. Both the keys are different and this makes it much complex than the symmetric key (Buchmann, 2013). Another disadvantage of asymmetric key algorithm is that the time consumption is more as the complexity is higher. It is highly recommended for DAS to opt for encryption, as encryption would secure their personal information. Digital Authentication: This is the second most basic and important recommended strategy to secure the data for DAS. The procedure of getting confidence in the identities of users digitally is known as digital authentication (Hamlen et al. 2013). The word authentication means to an electronic procedure, which enables any type of electronic recognition of a legal person. Authentication also saves the integrity of the data and thus it can be claimed as another strategy for privacy of data. The main advantage of digital authentication is that it mitigates the chance of data theft and fraud. In a digital authentication, the identities of the user are given to a particular information system electronically (Buchmann, 2013). There are three main factors of digital authentication. They are as follows: Knowledge Factors: These factors are nothing but the confidential knowledge of a user like the password, pin number. Ownership Factors: These factors are those that the user possesses like a credit card, one-time passwords. Inherence Factors: These factors are those factors that an user has got in inherence like the biometric identifications (Stallings Brown, 2012). Fingerprint and face recognitions are two famous inherence factors. Digital Signatures: This is the third important strategy to reduce the privacy risks is the implementation of digital signatures. DAS can protect their data by implementing this very safe and secured data security strategy in their organization. this is nothing but a digital code, which is created by public key encryption and is utilized to verify an users identity (Kahate, 2013). It also verifies the contents of the message that are sent over the network. DAS should implement digital signatures for their private cloud. The main advantages of digital signature are the speed, cost, security, authenticity, imposter prevention, time stamp and tracking. These advantages will help DAS to protect their data and thus the privacy should be secured. However, digital signatures do have some disadvantages (Salomaa, 2013). The disadvantages of digital signatures include expiry of the signatures, need for verification software, compatibility, need for implementation of digital certificates. In sp ite of these disadvantages, digital signatures are one of the famous strategies for privacy of data. It is highly recommended for DAS. Personal Data Protection Strategy Department of Administrative Services or DAS is having problems in securing their personal data. This type of data should be secured and safe on immediate basis. There is a high risk that the data will be lost and the hackers and the unauthorized users will be able to access them (Salah et al. 2013). The access should be authorized so that the integrity of the information does not get lost. This will create a major problem as every data and information are important for DAS. The access and disclosure of the personal information should be authorized so that there exists no chance of hacking and modification of personal information (Salomaa, 2013). There are several ways to stop this hacking like installing antivirus, firewalls. The procedure to prevent the identity of personal data is known as de-identification of personal data. There are several ways to stop the identification of the personal data of DAS. They will have to adopt certain measures to mitigate or reduce the hacking of data (Liu, 2012). The best ways to prevent identification of personal data is the antivirus, security policies and firewalls. Implementing these techniques can help DAS to prevent their data identification. Digital identities are an important solution to their problem. A digital identity is data of an organization that is utilized to depict an external representative. This particular representative can be an individual, an organization or an application (Ali, Khan Vasilakos, 2015). There are various advantages of digital identities. The advantages of digital identities are as follows: Security: The main advantage of digital identity is its security. The data is extremely safe and secured with the help of digital identity. Data Integrity: The integrity of the data is not lost because of digital identity. This is another important advantage of digital identity. Simple: Digital identity does not require much complexities and time to get implemented. This is extremely simple and thus this is another important advantage of digital identity. Fast: Digital identities are extremely fast and this is another important advantage of digital identity. Security of Personal Data Security and access to personal information is another important step to save the privacy. The information should be secured so that the unauthorized access to various information is mitigated (Katz Lindell, 2014). Department of Administrative Services should secure their personal information by limiting the access to their personal information from unauthorized users. Securing and archiving personal data is an important step to secure the personal information. DAS should implement various strategies to secure their personal information as it is important for their business (Ali, Khan Vasilakos, 2015). Personal data are protected and secured through several strategies. Three strategies are recommended for Department of Administrative Services. They are as follows: Periodic Back up and Recovery: Personal information should be recovered periodically and back ups should be taken time to time (Peltier, 2016). This will help Department of Administrative Services to recover their lost data and to will not lose their confidential data any more. Remote Data Movement: Real time and non real time movement of data from a particular storage to another secured storage is another strategy for protecting data and information. There is always a high chance of losing of data and information if they are stored for longer period of time (Ali, Khan Vasilakos, 2015). The system or the storage may be damaged and thus the data can be lost. Two popular forms of data movement are the replication and the remote copy. These two techniques will help DAS to save their data and to save the storage system. Data Lifecycle Management: DLM or Data Lifecycle Management is the automatic movement of data to offline and online storage (Von Solms Van Niekerk, 2013). The major features of data lifecycle management are keeping the data in a particular storage that is read easily and cannot be modified. These three strategies will help DAS to secure their personal information and the information will not be lost. Conclusion Therefore, from the above discussion it can be concluded that, Department of Administrative Services or DAS gives various services to the Australian State Government. The services are procurement, payroll, human resource management, personnel management and contractor management. Due to the recent changes in the policies of the government, Department of Administrative Services is shifting to a new approach known as the Shared Service approach. This particular approach means that a fixed number of services will be controlled by DAS for the benefit of the Whole of Government (WofG). DAS has to follow various strategies and tasks. They have to secure their data and information through various ways and strategies. The report provides a brief description on how to manage and control personal information, utilization and security of digital identities, security and access to personal information, quality and rectification of personal information. The report also provides perfect recommenda tions on several strategies to secure the privacy of personal information in DAS. The report further covers a personal data protection strategy for DAS with the ability to control the unauthorized access to the personal information. Proper recommendations are also provided to mitigate the security risks for the protection of data. References Ali, M., Khan, S. U., Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges.Information Sciences,305, 357-383. Aljawarneh, S. (2012). Cloud security engineering: Avoiding security threats the right way.Cloud Comput. Adv. Des. Implementation, Technol., 147. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Behl, A., Behl, K. (2012, October). An analysis of cloud computing security issues. InInformation and Communication Technologies (WICT), 2012 World Congress on(pp. 109-114). IEEE. Buchmann, J. (2013).Introduction to cryptography. Springer Science Business Media. Chou, T. S. (2013). Security threats on cloud computing vulnerabilities.International Journal of Computer Science Information Technology,5(3), 79. Hamlen, K., Kantarcioglu, M., Khan, L., Thuraisingham, B. (2012). Security issues for cloud computing.Optimizing Information Security and Advancing Privacy Assurance: New Technologies: New Technologies,150. Iankoulova, I., Daneva, M. (2012, May). Cloud computing security requirements: A systematic review. InResearch Challenges in Information Science (RCIS), 2012 sixth international conference on(pp. 1-7). IEEE. Kahate, A. (2013).Cryptography and network security. Tata McGraw-Hill Education. Katz, J., Lindell, Y. (2014).Introduction to modern cryptography. CRC press. Kulkarni, G., Gambhir, J., Patil, T., Dongare, A. (2012, June). A security aspects in cloud computing. InSoftware Engineering and Service Science (ICSESS), 2012 IEEE 3rd International Conference on(pp. 547-550). IEEE. Lee, K. (2012). Security threats in cloud computing environments. InInternational Journal of Security and Its Applications. Liu, W. (2012, April). Research on cloud computing security problem and strategy. InConsumer Electronics, Communications and Networks (CECNet), 2012 2nd International Conference on(pp. 1216-1219). IEEE. Malik, A., Nazir, M. M. (2012). Security framework for cloud computing environment: A review.Journal of Emerging Trends in Computing and Information Sciences,3(3), 390-394. Peltier, T. R. (2016).Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press. Rong, C., Nguyen, S. T., Jaatun, M. G. (2013). Beyond lightning: A survey on security challenges in cloud computing.Computers Electrical Engineering,39(1), 47-54. Salah, K., Calero, J. M. A., Zeadally, S., Al-Mulla, S., Alzaabi, M. (2013). Using cloud computing to implement a security overlay network.IEEE security privacy,11(1), 44-53. Salomaa, A. (2013).Public-key cryptography. Springer Science Business Media. Stallings, W., Brown, L. (2012). Computer security.Principles and practice (2 nd ed). Edinburgh Gate: Pearson education limited. Suresh, K. S., Prasad, K. V. (2012). Security issues and security algorithms in cloud computing.International Journal of Advanced Research in Computer Science and Software Engineering,2(10). Tianfield, H. (2012, October). Security issues in cloud computing. InSystems, Man, and Cybernetics (SMC), 2012 IEEE International Conference on(pp. 1082-1089). IEEE. Tsai, H. Y., Siebenhaar, M., Miede, A., Huang, Y., Steinmetz, R. (2012). Threat as a service?: Virtualization's impact on cloud security.IT professional,14(1), 32-37. Van Tilborg, H. C., Jajodia, S. (Eds.). (2014).Encyclopedia of cryptography and security. Springer Science Business Media. Von Solms, R., Van Niekerk, J. (2013). From information security to cyber security.computers security,38, 97-102.