Addressing Disruption and Losses: A Case Study
One of the largest fast food companies, with more than $1 billion in annual sales, had a power crisis in its corporate headquarter. A power transformer exploded, leaving the entire office complex, including the corporate data center, without power. The data center's backup power system immediately took over and kept critical parts of the data center operational. However, it's not enough to power all systems so the system supporting sales for all Australian agents, dealers and distributors had to be turned off.
B. Daya,“Network Security: History, Importance, and Future ,”University of Florida Department of Electrical and Computer Engineering , 2013.
Li CHEN, Web Security: Theory And Applications, School of Software, Sun Yat-sen University, China.
J. E. Canavan, Fundamentals of Network Security, Artech House Telecommunications Library, 2000.
A. R. F. Hamedani, “Network Security Issues, Tools for Testing,” School of Information Science, Halmstad University, 2010.
S. A. Khayam, Recent Advances in Intrusion Detection, Proceedings of the 26th Annual Computer Security Applications Conference, Saint-Malo, France, pp. 224-243, 42, 2009
M. M. B. W. Pikoulas J, “Software Agents and Computer Network Security,” Napier University, Scotland, UK.
R. E. Mahan, “Introduction to Computer & Network Security,” Washington State University, 2000.
Q. Gu, Peng Liu, “Denial of Service Attacks,” Texas State University, San Marcos.
M. A. Shibli, “MagicNET: Human Immune System & Network Security,” IJCSNS International Journal of Computer Science and Network Security, Vol. .9 No.1, January 2009.
M. Silva, “Virtual Forensics: Social Network Security Solutions,” Proceedings of Student
Research Day, CSIS, Pace University, 2009.
R. K. Khalil, “A Study of Network Security Systems,” IJCSNS International Journal of Computer Science and Network Security, 2010.
S. Alabady, “Design and Implementation of a Network Security,” Technology,Vol. 1, p. 11, 2009.
B. Preneel, “Cryptography for Network Security,” Katholieke Universiteit Leuven and IBBT, 2009.
M. Kassim, “An Analysis on Bandwidth Utilization and Traffic Pattern,” IACSIT Press, 2011.
M. Eian, “Fragility of the Robust Security Network: 80211,” Norwegian University of Science and Technology, 2011.
D. Acemoglu, “Network Security And Contagion,” NATIONAL BUREAU OF ECONOMIC RESEARCH, 2013.
S. Shaji, “Anti Phishing Approach Using Visual Cryptography And Iris Recognition. No. 3pp. 88-92, 2014.AUTHORS
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.