Rohit Revo - Academia.edu (original) (raw)

Rohit Revo

Program Architect / BI Consultant / Security Consultant/ Writer and Social Commentator

less

Uploads

Papers by Rohit Revo

Research paper thumbnail of Internet of Things should bring many advantages to cyber terrorist in convergence and convenience but it is also poses potential risks. What are those risks and what measures may be taken to minimise them?

This paper is an attempt to analyze the IoT environment and understand the cyber security risks f... more This paper is an attempt to analyze the IoT environment and understand the cyber security risks faced by the evolving IoT ecosystem whose Information Assurance is being threatened by malicious cyber actors. The wide system footprint of IoT makes it an interesting target for cyber crime as issues related to data privacy and lack of common standards are still being addressed. Implementing the right architecture and addressing the risks identified in this paper will help in implementing the right IoT environment.

In this paper I identify IoT security risks and finally propose an IoT taxonomy framework which can be useful to IoT cyber security practitioners and IoT architects.

Research paper thumbnail of Compare the current Australian, British and US approaches to countering Islamic State terrorism.

Compare the current Australian, British and US approaches to countering Islamic State terrorism. ... more Compare the current Australian, British and US approaches to countering Islamic State terrorism. What are the major differences, and what seem to be the best options to deal with contemporary terrorism challenges?

Research paper thumbnail of Should state nations or even larger organizations that are victims of a cyber attack be able to launch destructive counter attack?

This essay analyses the legal and technical issues facing large organizations and Nations when la... more This essay analyses the legal and technical issues facing large organizations and Nations when launching counter cyber attacks and also explains the risks associated with such actions.

Research paper thumbnail of Journal Article Critique - "Counterterrorism Since 9 11, Evaluating the Efficacy of Controversial Tactics"

Research paper thumbnail of Internet of Things should bring many advantages to cyber terrorist in convergence and convenience but it is also poses potential risks. What are those risks and what measures may be taken to minimise them?

This paper is an attempt to analyze the IoT environment and understand the cyber security risks f... more This paper is an attempt to analyze the IoT environment and understand the cyber security risks faced by the evolving IoT ecosystem whose Information Assurance is being threatened by malicious cyber actors. The wide system footprint of IoT makes it an interesting target for cyber crime as issues related to data privacy and lack of common standards are still being addressed. Implementing the right architecture and addressing the risks identified in this paper will help in implementing the right IoT environment.

In this paper I identify IoT security risks and finally propose an IoT taxonomy framework which can be useful to IoT cyber security practitioners and IoT architects.

Research paper thumbnail of Compare the current Australian, British and US approaches to countering Islamic State terrorism.

Compare the current Australian, British and US approaches to countering Islamic State terrorism. ... more Compare the current Australian, British and US approaches to countering Islamic State terrorism. What are the major differences, and what seem to be the best options to deal with contemporary terrorism challenges?

Research paper thumbnail of Should state nations or even larger organizations that are victims of a cyber attack be able to launch destructive counter attack?

This essay analyses the legal and technical issues facing large organizations and Nations when la... more This essay analyses the legal and technical issues facing large organizations and Nations when launching counter cyber attacks and also explains the risks associated with such actions.

Research paper thumbnail of Journal Article Critique - "Counterterrorism Since 9 11, Evaluating the Efficacy of Controversial Tactics"

Log In