Internet Services and Security: A Case Study of Google
Verified
Added on 2023/06/14
|21
|1111
|237
AI Summary
This presentation focuses on the internet services and security aspects of Google. It covers their security policies, risk factors, vulnerabilities, and more. The presentation also provides an overview of internet services and security in general.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Internet Services and Security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction The main aim of the presentation is to take into consideration the aspect if internet service and security. In order to focus more on the topic a organisation is chosen whose risk, assists and vulnerability and the different factors relating to it are discussed.
What are internet Services Internet services allows the user to access information which are large in amount such as graphics, sound, text and software over the concept of the internet. The services can be categorised into the following points.
Types of Internet Services INTERNET SOCIAL MEDIA BLOGS VIRAL NETWORKING MARKETING WEBSITE
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
What are Internet security Internet security can be considered as a branch of computer related security. The concept can be directly related to the internet. The internet security aspect mainly involves the security aspect of the browser and also can be related to the security of the network in general. Internet security can be applied to the concept of operating system and user application.
Organisation Chosen
About the organisation (Google) Google Is an “American multinational Technology” company that deals with specializationintheinternetbasedproductandservices.Themain conceptswhicharedealtbytheorganisationmainlyincludesearch engine, advertising technology, cloud computing, hardware and software related technology. The Google was founded in the year 1998 by Serget Brin and Larry Page.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Security Policy of the Organisation(Google) Google has created a strong inclusive and vibrant platform which is related to the security. Some of the factors which are included into the working are stated below: InternetSecurityandPrivacy:Googlehostregularconferencewhichare internal to raise the awareness and drive the concept of innovation in the aspect of data privacy and security. The concept of privacy and security can be considered as an area which is ever evolving and Google recognized that dedication towards the field. Dedicated employee: Google employs more than 500 full time workers in their team whoa re part of the operation and engineering division. Within the organisation members who are related to the security team review the plans which are related to the security for the network, services and the systems.
Security Policy of the Organisation(Google) Contd. Collaboration with security research community: Google had employed a relation with the research security community and the organisation provide a value relating to the identified vulnerability in the platform of the cloud and other products of the Google. Due to the collaboration with the community of the research the organisation squashed more than 700 security bugs in the chrome. Malware prevention: The company has provided a effective measure the countermeasures in order to prevent the malware attacks. Google safe browsing concept help the user to prevent themselves from the different types of threats.
Security Policy of the Organisation(Google) Contd. Different sectors which can be related to the security of the organisation are stated belowDATA IN TRANSIT PROTECTIONSEPARATION BETWEEN USERGOVERNANCE FRAMEASSETPROTECTION AND RELIANCE PERSONAL SECURITYSECURE DEVELOPMENTSUPPLY CHAIN SECURITYOPERATIONAL SECURITY SECURE USER MANAGEMENT AUDIT INFORMATION FOR USER SECURE USE OF THE SERVICE EXTERNAL INTERFACE PROTECTION
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Risk in the Organisation (Google) The risk factor in the organisation can be divided into two parts which are internal and external risk. Internal risk Stability Organisational Structure Resources Innovation Incentives Risk Factors Approach method in Google
Risk in the Organisation (Google) contd. External risk Economy Socio cultural factors Technology Political legal factors
Assets of the organisation( Google) IMPROVE ASSEST VALUE EFFECTIVELY MANAGE RISK ENHANCE BUSINESS GROWTH AND IMPROVEMENT RELIABLE DECISION MAKING GROW STAKEHOLDER REPUTATION AND CONFIDENCE IMPROVE ASSEST PERFORMANCE ASSEST MANAGEMENT
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Threats relating to the Organisation (Google) Network threat: This type of threat mainly occur due to connection to an untrusted network. Configuration problem: unnecessary functionality of the IT resources can give different types of threats which can posses serious threat to the organisation. Malware prevention: threats which are related to the malware which basically impact the emails, web browsers, personally owned devices. Scanning of all the information would prevent this type of threat.
Threats relating to the Organisation Contd. THREATS PHYSICAL SECURITY THREATS LEGAL THREATS OTHER THREATS SOCIAL AND ECONOMIC THREAT SOFTWARE THREATS COMMUNICATION SECURITY THREATS HUMAN THREATS
Vulnerability of the Organisation (Google) Class of vulnerability Very high High Moderate Low
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Different vulnerability in the Organisation VULNERABILITY NETWORK DISCOVERY VULNERABILITY SCANNING RESULT ANALYSIS REMEDIATION
Types of Vulnerability in the Organisation VULNERABILITY OS AND APPLICATION CONTROL GAP AND DESIGN FLOW ATTACKS SOCIAL ENGINEERIING MALWARE DDoS RATs VULNERABILITY EXPLOID(0- DAY AND SQL INJECTION) MOTIVES POLITICAL FINANCIALREPUTATION MANAGE FAME ESPIONAGE
Vulnerability of the Organisation Contd. Matrix of risk
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Bibliography Lazer, David, et al. "The parable of Google Flu: traps in big data analysis." Science343.6176 (2014): 1203-1205. Post, Robert. "Data Privacy and Dignitary Privacy: Google Spain, the Right to Be Forgotten, and the Construction of the Public Sphere." (2017). Verma, Abhishek, et al. "Large-scale cluster management at Google with Borg."Proceedings of the Tenth European Conference on Computer Systems. ACM, 2015. Wynne, Brian. "Misunderstood misunderstanding: Social identities and public uptake of science."Public understanding of science(2016).
Bibliography contd. Kohlhoff, Kai J., et al. "Cloud-based simulations on Google Exacycle reveal ligand modulation of GPCR activation pathways."Nature chemistry6.1 (2014): 15. Vinyals, Oriol, et al. "Grammar as a foreign language."Advances in Neural Information Processing Systems. 2015. Wang, Calvin H., and Adam N. Hess. "Big, Fast, and Familiar: Looking at and past Google as BFF." (2015). Ramos-Casals, Manuel, et al. "Google-driven search for big data in autoimmune geoepidemiology: analysis of 394,827 patients with systemic autoimmune diseases."Autoimmunity reviews14.8 (2015): 670-679.