Rohit Revo - Academia.edu (original) (raw)
Program Architect / BI Consultant / Security Consultant/ Writer and Social Commentator
less
Uploads
Papers by Rohit Revo
This paper is an attempt to analyze the IoT environment and understand the cyber security risks f... more This paper is an attempt to analyze the IoT environment and understand the cyber security risks faced by the evolving IoT ecosystem whose Information Assurance is being threatened by malicious cyber actors. The wide system footprint of IoT makes it an interesting target for cyber crime as issues related to data privacy and lack of common standards are still being addressed. Implementing the right architecture and addressing the risks identified in this paper will help in implementing the right IoT environment.
In this paper I identify IoT security risks and finally propose an IoT taxonomy framework which can be useful to IoT cyber security practitioners and IoT architects.
Compare the current Australian, British and US approaches to countering Islamic State terrorism. ... more Compare the current Australian, British and US approaches to countering Islamic State terrorism. What are the major differences, and what seem to be the best options to deal with contemporary terrorism challenges?
This essay analyses the legal and technical issues facing large organizations and Nations when la... more This essay analyses the legal and technical issues facing large organizations and Nations when launching counter cyber attacks and also explains the risks associated with such actions.
This paper is an attempt to analyze the IoT environment and understand the cyber security risks f... more This paper is an attempt to analyze the IoT environment and understand the cyber security risks faced by the evolving IoT ecosystem whose Information Assurance is being threatened by malicious cyber actors. The wide system footprint of IoT makes it an interesting target for cyber crime as issues related to data privacy and lack of common standards are still being addressed. Implementing the right architecture and addressing the risks identified in this paper will help in implementing the right IoT environment.
In this paper I identify IoT security risks and finally propose an IoT taxonomy framework which can be useful to IoT cyber security practitioners and IoT architects.
Compare the current Australian, British and US approaches to countering Islamic State terrorism. ... more Compare the current Australian, British and US approaches to countering Islamic State terrorism. What are the major differences, and what seem to be the best options to deal with contemporary terrorism challenges?
This essay analyses the legal and technical issues facing large organizations and Nations when la... more This essay analyses the legal and technical issues facing large organizations and Nations when launching counter cyber attacks and also explains the risks associated with such actions.