Internet Infrastructure Security

Author(s):  
G. Manimaran ◽  
A.-D. Basheer
Author(s):  
Priyanshu Srivastava ◽  
Rizwan Khan

Today is the era of Cloud Computing Technology in IT Industries. Cloud computing which is based on Internet has the most powerful architecture of computation. It reckons in of a compilation of integrated and networked hardware, software and internet infrastructure. It has various avails atop grid computing and other computing. In this paper, I have given a brief of evaluation of cloud computing by reviewing more than 30 articles on cloud computing. The outcome of this review signalizes the face of the IT industries before and after the cloud computing.


Author(s):  
D.A. Kurmanova ◽  
◽  
D.R. Sultangareev ◽  
L.R. Khabibullina ◽  
◽  
...  

Cyber incidents continue to move up in the rating of possible threats and occupy the second position in the ranking of risks in the activities of companies (40 %). Five years ago, they were on the fifteenth line. Like a natural disaster or pandemic, a cyber attack can have a negative impact on hundreds of companies, and the number of such incidents is growing. So-called "cyber incidents",when hackers interfere with the activities of a large number of companies, using the dependencies of their shared Internet infrastructure, occur more often. This reflects the fact that today's world of risk management is more volatile than ever. At the same time, with the upcoming entry into force of the General data protection regulation (GDPR), which has been in effect throughout Europe since may 2018, the prospects of imposing more and larger fines on companies that do not comply with it have already become real. Actions taken by the company in light of a data integrity violation directly affect the final cost of such a violation. Reputational damage is inevitable if the response to a cyber incident is inadequate. New risks require new tools to respond to their potential impacts and mitigate them. This article discusses the possible risks of financial technologies, draws attention to cyber threats, the frequency of which is increasing, and offers a model for identifying and evaluating cyber risks.


2021 ◽  
Author(s):  
John Durham Peters

The contributors to Assembly Codes examine how media and logistics set the conditions for the circulation of information and culture. They document how logistics—the techniques of organizing and coordinating the movement of materials, bodies, and information—has substantially impacted the production, distribution, and consumption of media. At the same time, physical media, such as paperwork, along with media technologies ranging from phone systems to software are central to the operations of logistics. The contributors interrogate topics ranging from the logistics of film production and the construction of internet infrastructure to the environmental impact of the creation, distribution, and sale of vinyl records. They also reveal how logistical technologies have generated new aesthetic and performative practices. In charting the specific points of contact, dependence, and friction between media and logistics, Assembly Codes demonstrates that media and logistics are co-constitutive and that one cannot be understood apart from the other. Contributors Ebony Coletu, Kay Dickinson, Stefano Harney, Matthew Hockenberry, Tung-Hui Hu, Shannon Mattern, Fred Moten, Michael Palm, Ned Rossiter, Nicole Starosielski, Liam Cole Young, Susan Zieger


Sign in / Sign up

Export Citation Format

Share Document