Ensuring Cloud Security with Advanced Features

Verified

Added on  2021/04/21

|3
|809
|75
AI Summary
This assignment emphasizes the significance of implementing robust security measures in cloud-based systems to prevent unauthorized access, data breaches, and other threats. It highlights the importance of features such as top-of-the-line perimeter firewalls, intrusion detection systems with event logging, internal firewalls for individual applications and databases, data encryption at rest, and tier IV data centers with strong physical security. By incorporating these security features, organizations can minimize the risks associated with cloud computing and ensure the protection of sensitive information.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
GTI ENTERPRISE SECURITY SOLUTION
INTRODUCTION
The cloud computing has been in the center for data storage, this will offers so many
benefits to the organization, but still, the benefits that can be offered by the cloud computing can
easily be compromised by the failure to make sure that data is secured and the protection of the
privacy of the users and data too especially when using the services ,(Subashini, 2011)
.
CLOUD BASED SYSTEM SECURITY FEATURES
According (Hwang, 2009),When putting up a cloud based system, especially a system that is
aimed at running and being used all over the world, it is therefore recommended to check the
following security features and services in order to limit hacking and loss of data privacy.
1. Top of the line perimeter firewall.
Many of the firewalls are used to inspect the source and t5he destination of
packets therefore making it more simple. More advanced firewalls have very stable
packet inspection feature, this feature is used to check the packets file integrity which is
for stability reasons before admitting or rejecting the packet.
Some of the most common examples of the firewall is the Palo Alto Networks’
Perimeter firewall solution which in this case reviews the content of the packets of the
file in order to check the file type from the source , destination and also its integrity.
This is very important and crucial to any cloud based system in order to thwart the top
most threats of the current generation.
2. Intrusion detection systems with event Logging
It is generally advised to have a means to track and record the attempts of
intrusion to the cloud based system by unwanted users and hackers too. This is what is
recommended by most IT security compliance standards such as PCI and HIPAA, the use
of logging solutions are compulsory. Since GTI is aimed at operating world wide, the
users therefore will be from all over the world, hence very important and crucial to
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
comply with intrusion detection system requirement. Though some of the cloud service
providers offer the use of IDS.
3. Internal Firewall for Individual application and database
The top in line perimeter firewall is used to block external attacks in the cloud
based systems. But still the internal attacks are very dangerous. The internal firewall
restricts access to delicate data and applications, (Takabi, 2010). This prevents employees
who are maybe so much compromisable employee who can give the hacker a way to
access the account by bypassing the perimeter firewalls.
4. Data at rest encryption
Data encryption is a method of hiding data content into characters that are not
readable in order to hide the content of the data. For effective storage of data in cloud
infrastructure is the use of the encryption of data. This will prevent most sensitive data
from being accessed and manipulated by the wrong party. When encryption is strong, this
can minimize the stolen data risks
5. Tier IV Data centers with strong physical security
The hardware which is physically seen and is used to run the cloud based system
is the last loophole for hackers and spies of industrials to access important information.
When hackers are allowed to access the hardware which operates the cloud, they will
fully access the information and therefore they can do anything with the data. The tier IV
therefore help prevent cloud systems by restricting the access to physical structure which
operates the cloud data, (Bakshi & Dujodwala, 2010).
Document Page
CONCLUSION
It is therefore important to make sure that your cloud based system is very much secure
with the above features, though we have other many features too. This will minimize if not fully
solve the problems that comes about with cloud based systems since hackers now will have no
means to recheck into the system and manipulating data as they wish.
Bibliography
Bakshi, & Dujodwala. (2010). Securing cloud from ddos attacks using intrusion detection system
in virtual machine. In Communication Software and Networks, 2010. ICCSN'10. Second
International Conference on (pp. 260-264).
Hwang, K. S. (2009). ). Cloud security with virtualized defense and reputation-based trust
mangement. In Dependable, Autonomic and Secure Computing,.
Subashini, K. V. (2011). A survey on security issues in service delivery models of cloud
computing. Journal of network and computer applications.
Takabi, J. (2010). Security and privacy challenges in cloud computing environments. IEEE
Security & Privacy.
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]