logo

Information about Cloud Computing Technology 2022

   

Added on  2022-10-12

4 Pages518 Words11 Views
 | 
 | 
 | 
Running head: CLOUD COMPUTING TECHNOLOGY
Cloud Computing Technology
Name of the Student:
Name of the University:
Information about Cloud Computing Technology 2022_1

1CLOUD COMPUTING TECHNOLOGY
For the security problems
Identify the most significant source or evidence of the problem
1) There is a problem with password reuse
The most significant source or evidence of the problem are a) An intern was hired to help
reset passwords when employees forgot their password, b), the secretary new the CEO’s
password and c) The CEO had the same password for Earn, Payee and Leach and Facebook
The password was already hacked and known to the hijackers. Therefore, if the password
is reused then that server or account will also become accessible to the hacker.
This problem is required to be resolved to give sustainable, long term and high level
security to the information stored in the server.
2) Employees are valuable to social engineering and phishing attacks
The most significant source or evidence of the problem are a) There has been no
employee training since a new security policy was put in place three years ago, c) The interim
has access to sensitive information that could be exploited and d) The security training three
years ago is flawed because it is out of date.
As the company deals with managing stock and bond portfolios for clients also the
security training arranged for the associates was completely backdated. Therefore, maintaining
confidentiality of the client’s information is much essential.
In order remedy to the problem, the company is required to use encryption and firewall
incorporation mechanism.
Information about Cloud Computing Technology 2022_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
IT Security Risks and Proposed Solutions for an Organization
|8
|396
|52

CSI2102 - Introduction to Information Security
|6
|883
|177

Research on Cloud Computing and Data Encryption
|13
|653
|95

Privacy and Security Issues with Big Data: Challenges and Solutions
|17
|7279
|285

VPN Technologies and Security
|9
|2031
|99

(Solved) Assignment on Cloud Computing
|13
|2925
|208