Assignment on Digital Identity Issues

Added on - 23 Feb 2020

  • 15

    Pages

  • 1619

    Words

  • 83

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 15 pages
Running head:CLOUD COMPUTING1Cloud ComputingNamesCourseUnitDate
Running head:CLOUD COMPUTING21.Security of Employee DataS.NoSecurityThreat/ RiskDescriptionLikelihoodImpactPriorityPreventive ActionsContingency PlansStudent1StudentID1UnauthorizedAccessHVHVH1. Ensure users are givenstrong APIs that cannot bebreached easily and have themencrypted2. Sensitize users to be carefulwhen accessing cloud services3. Employ two stepauthentication to restrictunauthorized access1. Disable suspectedAPIs and stop allremote access2. Contact providerand alert them ofsecurity breachesimmediately3. use traffic accesslists to monitor activity2PhishingHVHH1. Implement two phaseauthentication2. Sensitize employees neverto give personal informationonline; ever3. Constant review of useractivity logs4. restrict access usingpersonal devices1. Disable the remoteaccess2. Contact cloudservice provider andreport suspectedattacks3Data access riskMHVH1. Ensure access is welldefined in SLAs2. Strong access management3. Encrypt data or ensure theservice provider offers fullencryption4. Ensure the SLA specifiesdata formats to ensuresmooth portability in future(Behl, 2011)1. remote backup toensure continuity
Running head:CLOUD COMPUTING34Data lossHVHVH1. Sensitize employees2. Have data distributed acrossmultiple locations3. Have virtual backups andimplement a hybrid cloud1. Sensitize employeeson safety2. Instant file recoveryin case of accidentaldeletion/ overwritingExplain Issues1.Internal threats by staff: Entails employees stealing data/ information, or creating backdoors thatmalicious entities like hackers can use to exploit the DAS resources, either for financial gain or purelyout of malice2.Malicious software exploitation due to unintended employee actions: This entails employeeactions that are unintended, such as downloading infected files and opening links that cause malwarewithin them to infect systems and wreak havoc3.External attacks over the network: Entails hackers accessing the DAS ICT resources through theuse of malware over the network, especially by exploiting vulnerabilities in network devices such asrouters (wired and wireless), or through remote access by hacking user passwords4.Disasters:Are events such as fires, physical failure of hard drives, or natural disasters suchas earthquakes and flooding
Running head:CLOUD COMPUTING4Severity of risk and threat to security employee dataS.NoSecurityThreat/ RiskDescriptionLikelihoodImpactPriorityPreventive ActionsContingency PlansStudent1StudentID1UnauthorizedAccessHVHVH1. Ensure users are given strongAPIs that cannot be breachedeasily and have them encrypted2. Sensitize users to be carefulwhen accessing cloud services3. Employ two stepauthentication to restrictunauthorized access (Kuyoro,Ibikunle, Awodele, 2011)1. Disable suspectedAPIs and stop allremote access2. Contact providerand alert them ofsecurity breachesimmediately3. use traffic accesslists to monitor activity2PhishingHVHH1. Implement two phaseauthentication(Carl &Alexandros, 2008)2. Sensitize employees never togive personal informationonline; ever3. Constant review of useractivity logs4. restrict access using personaldevices1. Disable the remoteaccess2. Contact cloudservice provider andreport suspectedattacks
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document