Assignment On Network Security | Case Study Of Amazon

Added on -2020-02-12

| 6 pages| 1288 words| 45 views

Trusted by 2+ million users,
1000+ happy students everyday

Showing pages 1 to 3 of 6 pages

Demonstration of anetwork security tool
TABLE OF CONTENTABSTRACT.....................................................................................................................................1LITERATURE.................................................................................................................................1BUSINESS CASE...........................................................................................................................2ANALYSIS......................................................................................................................................2CONCLUSION................................................................................................................................3REFERENCES................................................................................................................................4
ABSTRACTA growing concern of security is continually rising with a rising technical measure in thebusiness operations of varied organizations. It is a principle agenda of most of the establishmentswho are merged with several online activities to maintain a safe and secured arrangement oftransactions that will be carried out while the transition of goods and services (Viswanathan,2017). The below report is based on a similar instance to overview a prime agenda of networksecurity by referring to a realistic case study of Amazon. It is with a fundamental consent ofdiscoursing upon their employed tact of cloud security to measure their affiliated services andrisk on their projected cloud services. Amazon is a profound participant of UK's internet industrywhere they are successfully operating in the field of E-commerce since last 23 years. LITERATURECloud networking is a relative prospect of cloud computing where it tends to define the accessof varied networking resources from a centralized third party provider by using yet anotherprovision of wide area networking (WAN) or any other internet based techniques. Bradley(2014) has at this moment stated it to be an attentive tact in which the centralized resources ofcomputing are at this moment shared for the clients and users. It at this moment requires a moreurging trend of proposing some more administration of network functions into the overall systemof cloud computing where it can, in turn, assist in referring to fewer customer devices formanaging the entire set of the network. Rashid (2016) has at this moment emphasized upon someleading security threats while adopting the tact of cloud computing with a foremost danger ofdata breach. It is basically due to a vast storage of information on the cloud servers where suchrisks are also dependent on the sensitivity of the unprotected data. Such perils are evident tomake a terrible impact on the brand image of the organizations where it is their chiefresponsibility to themselves safeguard their accessible data on the network.In context to which, Westervelt (2013) have at this moment suggested them to implicatemulti-factor modes of validation by together using certain measures of encryption to eliminatethe possibility of data breaches. It is with an argued clause of its several assistive means wherecloud computing is a cost-efficient way of storing limitless data with some proficient ways ofbackup and data retrieval. Bradley (2014) has argued over the relative pro's of cloud computingby illuminating its varied technical issues where it is much inclined to make extraneous attacks.1

Found this document preview useful?

You are reading a preview
Upload your documents to download
or
Become a Desklib member to get accesss

Premium

$45

Q&A Library Access

Chat support

12

Document Unlocks

4

Answer Unlocks

Students who viewed this