Ask a question from expert

Ask now

Assignment On Network Security | Case Study Of Amazon

6 Pages1288 Words45 Views
   

Added on  2020-02-12

Assignment On Network Security | Case Study Of Amazon

   Added on 2020-02-12

BookmarkShareRelated Documents
Demonstration of anetwork security tool
Assignment On Network Security | Case Study Of Amazon_1
TABLE OF CONTENTABSTRACT.....................................................................................................................................1LITERATURE.................................................................................................................................1BUSINESS CASE...........................................................................................................................2ANALYSIS......................................................................................................................................2CONCLUSION................................................................................................................................3REFERENCES................................................................................................................................4
Assignment On Network Security | Case Study Of Amazon_2
ABSTRACTA growing concern of security is continually rising with a rising technical measure in thebusiness operations of varied organizations. It is a principle agenda of most of the establishmentswho are merged with several online activities to maintain a safe and secured arrangement oftransactions that will be carried out while the transition of goods and services (Viswanathan,2017). The below report is based on a similar instance to overview a prime agenda of networksecurity by referring to a realistic case study of Amazon. It is with a fundamental consent ofdiscoursing upon their employed tact of cloud security to measure their affiliated services andrisk on their projected cloud services. Amazon is a profound participant of UK's internet industrywhere they are successfully operating in the field of E-commerce since last 23 years. LITERATURECloud networking is a relative prospect of cloud computing where it tends to define the accessof varied networking resources from a centralized third party provider by using yet anotherprovision of wide area networking (WAN) or any other internet based techniques. Bradley(2014) has at this moment stated it to be an attentive tact in which the centralized resources ofcomputing are at this moment shared for the clients and users. It at this moment requires a moreurging trend of proposing some more administration of network functions into the overall systemof cloud computing where it can, in turn, assist in referring to fewer customer devices formanaging the entire set of the network. Rashid (2016) has at this moment emphasized upon someleading security threats while adopting the tact of cloud computing with a foremost danger ofdata breach. It is basically due to a vast storage of information on the cloud servers where suchrisks are also dependent on the sensitivity of the unprotected data. Such perils are evident tomake a terrible impact on the brand image of the organizations where it is their chiefresponsibility to themselves safeguard their accessible data on the network.In context to which, Westervelt (2013) have at this moment suggested them to implicatemulti-factor modes of validation by together using certain measures of encryption to eliminatethe possibility of data breaches. It is with an argued clause of its several assistive means wherecloud computing is a cost-efficient way of storing limitless data with some proficient ways ofbackup and data retrieval. Bradley (2014) has argued over the relative pro's of cloud computingby illuminating its varied technical issues where it is much inclined to make extraneous attacks.1
Assignment On Network Security | Case Study Of Amazon_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Process Map for Cloud Computing
|7
|980
|364

Cloud Computing Assignment Essay
|8
|2197
|300

Edge Computing
|4
|512
|250

(PDF) Top Threats to Cloud Computing Security
|13
|2463
|122

Identification of Security Breaches
|2
|1667
|355

Issues in Cloud Computing: Disadvantages and Practical Examples
|8
|3674
|156