logo

ITC568 - Cloud Privacy and Security - Assignment

15 Pages1619 Words198 Views
   

Charles Sturt University

   

Cloud Privacy and Security (ITC568)

   

Added on  2020-02-24

About This Document

This assignment is based on cloud privacy and security, which discusses the security of employee data issues such are internal threats by staff and external attacks over the network. This assignment will also discuss the severity of risk and threat to security employee data and its issues. Threats and risks to the digital identities of government employees from the move to SaaS applications.

ITC568 - Cloud Privacy and Security - Assignment

   

Charles Sturt University

   

Cloud Privacy and Security (ITC568)

   Added on 2020-02-24

ShareRelated Documents
Running head: CLOUD COMPUTING 1Cloud ComputingNamesCourse UnitDate
ITC568 - Cloud Privacy and Security - Assignment_1
Running head: CLOUD COMPUTING 21.Security of Employee Data S.NoSecurity Threat/ Risk DescriptionLikelihoodImpactPriorityPreventive ActionsContingency PlansStudent1StudentID1Unauthorized AccessHVHVH1. Ensure users are given strong APIs that cannot be breached easily and have them encrypted2. Sensitize users to be careful when accessing cloud services 3. Employ two step authentication to restrict unauthorized access 1. Disable suspected APIs and stop all remote access 2. Contact provider and alert them of security breaches immediately 3. use traffic access lists to monitor activity2PhishingHVHH1. Implement two phase authentication2. Sensitize employees never to give personal information online; ever 3. Constant review of user activity logs 4. restrict access using personal devices 1. Disable the remote access 2. Contact cloud service provider and report suspected attacks3Data access riskMHVH1. Ensure access is well defined in SLAs2. Strong access management3. Encrypt data or ensure the service provider offers full encryption 4. Ensure the SLA specifies data formats to ensure smooth portability in future (Behl, 2011)1. remote backup to ensure continuity
ITC568 - Cloud Privacy and Security - Assignment_2
Running head: CLOUD COMPUTING 34Data lossHVHVH1. Sensitize employees 2. Have data distributed across multiple locations 3. Have virtual backups and implement a hybrid cloud 1. Sensitize employees on safety2. Instant file recovery in case of accidental deletion/ overwritingExplain Issues1. Internal threats by staff: Entails employees stealing data/ information, or creating backdoors that malicious entities like hackers can use to exploit the DAS resources, either for financial gain or purelyout of malice2. Malicious software exploitation due to unintended employee actions: This entails employee actions that are unintended, such as downloading infected files and opening links that cause malware within them to infect systems and wreak havoc3. External attacks over the network: Entails hackers accessing the DAS ICT resources through the use of malware over the network, especially by exploiting vulnerabilities in network devices such as routers (wired and wireless), or through remote access by hacking user passwords4. Disasters: Are events such as fires, physical failure of hard drives, or natural disasters suchas earthquakes and flooding
ITC568 - Cloud Privacy and Security - Assignment_3
Running head: CLOUD COMPUTING 4Severity of risk and threat to security employee dataS.NoSecurity Threat/ Risk DescriptionLikelihoodImpactPriorityPreventive ActionsContingency PlansStudent1StudentID1Unauthorized AccessHVHVH1. Ensure users are given strong APIs that cannot be breached easily and have them encrypted2. Sensitize users to be careful when accessing cloud services 3. Employ two step authentication to restrict unauthorized access (Kuyoro, Ibikunle, Awodele, 2011)1. Disable suspected APIs and stop all remote access 2. Contact provider and alert them of security breaches immediately 3. use traffic access lists to monitor activity2PhishingHVHH1. Implement two phase authentication (Carl & Alexandros, 2008)2. Sensitize employees never to give personal information online; ever 3. Constant review of user activity logs 4. restrict access using personal devices 1. Disable the remote access 2. Contact cloud service provider and report suspected attacks
ITC568 - Cloud Privacy and Security - Assignment_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ITC568 - Cloud Privacy and Security
|18
|2193
|34

Cloud Security and Privacy Assignment 2022
|26
|5018
|14

Contemporary World Application 2022
|10
|541
|10

Security in Computing and IT PDF
|3
|619
|13

Security of Employee Data Question 2022
|16
|5147
|28

Threats to Wireless Networks and Countermeasures
|11
|2339
|60