Internet Service and Security: Analyzing Risk for Google
Verified
Added on 2023/06/14
|17
|4471
|457
AI Summary
This report discusses the security policy of Google and analyzes the risks associated with it. It covers threats, vulnerabilities, and consequences of those threats. The report also suggests mitigation strategies for each threat.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: INTERNET SERVICE AND SECURITY INTERNET SERVICE AND SECURITY Name of the Student Name of the University Authors Note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
2INTERNET SERVICE AND SECURITY Table of Contents Introduction..........................................................................................................................3 Discussion............................................................................................................................3 Security policy of Google................................................................................................3 Analyzing risk for Google...................................................................................................7 Threats and its consequence............................................................................................7 Vulnerabilities..................................................................................................................9 Assets.............................................................................................................................11 Conclusion.........................................................................................................................13 References..........................................................................................................................15
3INTERNET SERVICE AND SECURITY Introduction Security policy of Google is applied to all the services which is offered by this organization. It affiliations is inclusive of various kinds of things like YouTube, services of Google are generally provided on various kinds of Android devices. It offers services on other kinds of sites but it also excludes to separate privacy policy which is not incorporate in this kind of privacy policy. The privacy policies are not applied to various kinds of services which is offered by other kinds of organization which is inclusive of products or sites which can be easily displayed in the various search results. It has certain number of Google services or other sites which is linked with the services. The privacy policy does not generally cover all the information practices of other kinds of companies and organization for which advertises our services. It can easily focus on the use of cookies, pixel tags along with other kinds of sever and offers. Google works hard to protect this organization from any kind of unauthorized access or any kind of unauthorized alteration. It focuses on disclosing or destruction of information which is hold by Google.Googleputssomerestrictiononaccesstovariouskindsofvitalorimportant information. In the coming pages of the report various kinds of security policies of Google has been discussed in details. After that various kinds of risk has been checked with respect to given organization that is Google. Various kinds of risk like assets, threats and vulnerabilities have been analyzed for the given organization that is Google.
4INTERNET SERVICE AND SECURITY Discussion Security policy of Google When someone makes use of Google services then one trusts the information which is provided to them. Security Policy of google generally helps in understanding the fact that why data is collected, what kind of data is collected and what is done with data that is collected. As per google there are various ways by which one can make use of services for searching and sharing of information which is used for communication with other people or creation of new kind of content. When an individual share information with google then the organization aims in share of those of kind of service for better kind of results. The security policy generally helps in establishmentofconnectionwithpeopleorsharingthiskindofinformationwithother individual. The Security policy of google explains that following things like what kind of information is collected and why information is collected followed by how to make use of that information, various kinds of choices offered by google like how an individual can access and update information. Google collects information for providing better kinds of services for all kinds of users round the globe which ranges from figuring out of basic kinds of things like language spoken and complex kinds of things people who matters the most in the domain of online. Various kinds of services need to sign up for a Google account. In this case various kinds of personal information are required like name, email, credit card for storing of information. This organization collects information related to device specific like hardware model, version of operating system and various kinds of parameters like phone number. Google store the various kinds of information like details of using of services like quires of search, internet protocol address. It also makes use of Google services for collection and processing of information about the actual location of an
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5INTERNET SERVICE AND SECURITY individual. Google makes use of various kinds of technologies for understanding location like IP address, GPS and other kinds of sensors. There are certain number of services which is inclusive of unique application number. Google makes use of information which is collected from various kinds of services for providing, maintaining, improving it, for developing new ones. It makes use of Google profile for providing a large number of services which is required for a Google account. When an individual contact Google, the organization aims in keeping a record of communication for providing help for solving any kind of problem. Google makes use of email address for informing about all the services like any kinds of new updates. The organization makes use of information which is collected from various cookies and other kinds of technologies like pixel tags and improvisation of user experience and overall quality of services. One of the products which is used by Google is its own service that is Google Analytics. The organization has automated service like content (inclusive of email) for providing personal products like search results, advertising products and detection of malware. Google combines personal information from one service with information which is inclusive of personal information like Google services for sharing of things and person known by them. Various people round the globe have different kinds of threats and privacy concerns. The goal of this organization is be clear about the information that is collected by them and its meaning for how it can be used. It focuses on review and update of Google activity controls for deciding of what kind of data like videos watched on YouTube or any kinds of past research for the kind of data. It focuses on control for managing when certain kind of activity is generally stored in the cookie or similar kind of technology on the device when one makes use of services which is stored during signed out of the technology. It focuses on reviewing and control for the
6INTERNET SERVICE AND SECURITY type of information which is associated with Google Account by making use of Dashboard of Google. It also provides view and edit of preferences of Google for the categories which this organization must be interested. Various kinds of services of Google provides a platform for sharing of information with others. The various kinds of service of Google provide various kinds of ways for sharing and removing of content. Whenever an individual makes use of services Google aims to provide an individual for access to personal information. If anyhow the provided information is wrong, then the organization aims in deleting or update the provide information. Google aims to maintain the service in such a way that it can easily protect information from any kind of accident or malicious kinds of destruction. After deletion of information of services, the organization might not immediately remove or delete the residual copies from active kind of server and might have remove information for backup for a system. Google does not share any kind of personal information outside the organization and individual outside the google until and unless a situation has taken place: With the consent:It aims in sharing of personal information with organization or even individual outside the organization. The organization focus in sharing of sharing of information any kind of personal information. DomainAdministrator:InanycaseGoogleAccountismanagedbydomain administrator then the domain administrator can provide user support to any kind of organization which needs to access various kinds of Google account information. External processing:Google aims in providing personal information which is affiliated for trust business or various kinds of person for process and it is totally based on instruction and
7INTERNET SERVICE AND SECURITY is according to privacy policy and any other kind of confidentiality and various kinds of security measures. Legal reason:The organization aims to share personal kind of information with large number of organization and individual outside the organization for having good-faith and it does not disclose any kind of information. Google works hard for protecting of Google and other user for any unauthorized access or any kind of unauthorized changes. Analyzing risk for Google Threats and its consequence Various kinds of threat for Google are Disgruntled Employees:Internal kind of attack is considered to be one of the biggest kind of threat for an organization like Google. At present human resource attention rates are considered to be high, it is considered to be high for any kind of good practice for understanding the sentiment status for Google1. Unhappy employees are usually considered to be harmless for Google but in some cases it is seen that it can easily damage the reputation of the organization and intellectual property. Mitigation:The first step which can be used for overcoming the risk is identification of all kinds of accounts and credentials followed by terminate of those that is no longer in use for the organization. It focuses on connecting to employees which are no longer in organization. 1Manhas, Saloni, and Swapnesh Taterh. "A Comparative Analysis of Various Vulnerabilities Occur in Google Chrome."Soft Computing: Theories and Applications. Springer, Singapore, 2018. 51-59.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
8INTERNET SERVICE AND SECURITY Careless or uninformed employees:A careless worker is considered to be dangerous for any organization like Google2. In many cases it is seen that employees leak information to the competitor which can be considered to be dangerous for Google. In many cases it is seen that employees are not trained to have best kind of security practices and also have weak password. Mitigation:Various employees of Google must be trained to cyber security and also offer ongoing kind of support. Some employees might not have any kind of idea regarding how to protect online data and easily risk business data at risk3. It is considered to be essential for having training sessions for helping employees and learning how to manage password. It also aims in hacking teaching how to manage password and avoid hacking through any kind of criminal activity like phishing and scams. Mobile theft:Data thefts is considered to be at high vulnerability when various kinds of employees are making of mobile device for sharing data, accessing information of Google and lastly neglecting of password for change mobile. Mitigation: Google must ensure the fact that they have proper BYOD policy. With proper kind of BYOD policy, employees must be educated on device expectation and so that organizationcaneasilymonitoremailsanddocumentswhichisbeingdownloadedto 2González-Orozco,CarlosE.,etal."Phylogeneticapproachesrevealbiodiversitythreatsunderclimate change."Nature Climate Change6.12 (2016): 1110. 3Weichselbaum, Lukas, et al. "CSP is dead, long live CSP! On the insecurity of whitelists and the future of content security policy."Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016.
9INTERNET SERVICE AND SECURITY organization or device of employee. In same way Google should implement mobile security solution which protects both data and access to corporate system. Unpatched or Unpatchable Devices:Various kinds of network devices like routers, servers and printers which is employed by a software or firmware in their working4. It is generally considered to patch for venerability which is not sent or created. The hardware is not designed to enable them for updating against various kinds of vulnerabilities. Mitigations:Google should develop vulnerability management technology for looking into the network. Another method for overcoming situation is having a policy where everyone has agreed for certain piece of equipment for not update or patch with certain amount of time. Third party provider:With increase in the technology it is generally becoming for the organization to have more outsource number and vendors for managing and maintenance of system5. Various third parties make use of remote access tools for connecting to the network of the organization. This threat when multiplied exponentially due to lack of vetting which is done by organization can allow organization to have an access to network. Mitigation:Google needs to validate any kind of third party which provides remotes access for best kind of security polices like implementation of multifactor authentication, unique kinds of credential for Google6. Google should disable all kinds of third party accounts when it is 4Alexander, Jennifer L., et al. "A meta-analysis and systematic review of the literature to evaluate potential threats to internal validity in probe procedures for chained tasks."The Journal of Special Education49.3 (2015): 135-145. 5Lagerström, Robert, et al. "Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities."International Symposium on Engineering Secure Software and Systems. Springer, Cham, 2017. 6Wynne, Brian. "Misunderstood misunderstanding: Social identities and public uptake of science."Public understanding of science(2016).
10INTERNET SERVICE AND SECURITY not needed by them. It should focus on monitoring of login attempts followed by red flag alert for alerting the attack which is sent on right way. Vulnerabilities There are many kinds of vulnerabilities for this Google organization like: Googlefindsdifficultyforscalabilityandadaptationofexistingkindof architecture for accommodating of increased traffic and advanced technology. The greater user traffic and greater number of complexity for products and services. It focuses on increasing computing power along with expansion and complex nature which results in inefficiencies or failure operation7. It also focuses on increasing of cost or failure for accommodation of new kinds of technologies. It focuses on changing of business requirement which can harm our present result and financial condition. Google reply on various kinds of bandwidth providers, data centers and other kinds of third aspects for analyzing process for providing products and services to large number of users. Google needs to have some kind of control over the various kinds of third party vendors. Technologies can be easily developed which can easily block the display of large number of advertisement. Maximum amount of revenue which can be derived from the various kinds of advertisement which is used for connection for display of web pages. Proprietarydocumentsformatscaneasilylimittheeffectivenessofsearch technology by prevention of various kinds of document formats. A large amount 7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
11INTERNET SERVICE AND SECURITY of information on the domain of internet is provided by taking into proprietary document formats like Microsoft word8. Various providers of software application are used for creation of documents that can engineer the format of document for prevent or interfere with large number of abilities. Index spammer can easily harm the integrity of web search results. It can damage the reputation and cause of dissatisfied with various kinds of products and services. There are large of increasing number of effort for development of ways for manipulation for web search results. This will ultimately result in decline in traffic which can damage the business of google. Privacy concern which is related to technology can easily damage the reputation of the organization like Google. Various kinds of concern might be developed which focus on privacy of users with respect to collection of data. It is also possible some of the cases that certain number of jurisdiction can easily enact law or various kinds of regulation for offering various kinds of product and services. Various kinds of individuals are making use of non-PC devices for accessing to internet. Functionality and associated memory with alternative makes use of product and services then it can make this kind of device difficult. 8González-Orozco, Carlos E., et al. "Phylogenetic approaches reveal biodiversity threats under climate change."Nature Climate Change6.12 (2016): 1110.
12INTERNET SERVICE AND SECURITY Assets The assets of Google are nothing but various kinds of plans, procedure, knowledge bases and policies which is used for specific and is used for performing of organization9. It is inclusive of any kind of artificial, knowledge from various kinds of methods used for governing a project. This kind of assets is inclusive of both formal and informal plans, policies for procedure and knowledge bases that is used for various organization. Google should make use of asset management company so that it can diverse all its clients10. Asset management organization focus on investing of funds into large number of securities. It generally provides various kinds of organization with much diversification and investing option themselves. AMC generally manage by making use of mutual funds, plans for pension and organization can earn by charging fees or commission to the clients. Google should appoint asset manager for research, review and analysis of computer markets, Asset management generally requires certain number of ways for maximizing the value of a company by properly managing fixed and intangible kind of assets11. It is considered to be more reliable, efficient and cheaper by evaluation of various kinds of assets of this organization. 9Chen, Kai, et al. "Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale."USENIX Security Symposium. Vol. 15. 2015. 10Groenteman, Ronny, et al. "Assessing invasion threats: novel insect-pathogen-natural enemy associations with native New Zealand plants in southern California."Biological Invasions17.5 (2015): 1299-1305. 11Johnston, Allen C., et al. "Dispositional and situational factors: influences on information security policy violations."European Journal of Information Systems25.3 (2016): 231-251.
13INTERNET SERVICE AND SECURITY It also focuses on the use of assets accounting methods for production management and use of maintenance of discipline. It generally focuses on two kinds of definition like advisory services and corporate finance. Financial service is an organization provides assets management by proper coordination and overseeing of portfolio of client. Organization like AMC provides diversification with client as they have larger number of pool sources in comparison to individual kind of investors12. Pooling assets together are paying out provides proportional returns for investor to avoid minimum kind of investment which is required often during securities of their own and has the ability for investing in large set of securities and smaller management. Sell side firms provide firms like Google with investment similar to banks and stockbrokers. They generally perform a great value of deal in analysis of market by looking into the banks and stockbrokers in comparison to sell investment services. Conclusion From the above discussion it can be easily concluded that this report is all about security policy in Google. An explanation of security policy has been provided with respect to report like information which is collected, why information is collected, how the collected information is used by Google. After that various kinds of choices have been provided on how to access and update information in Google. Various kinds of parameter like consent, domain administrator, external processing, legal reason has been checked with respect to Google. Various kinds of risk have been checked for this organization. Various kinds of threat have been checked in Google 12Zhang, Jialong, Jayant Notani, and Guofei Gu. "Characterizing google hacking: A first large-scale quantitative study."International Conference on Security and Privacy in Communication Systems. Springer, Cham, 2014.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
14INTERNET SERVICE AND SECURITY like disgruntled employees, uninformed employees, mobile theft, unpatched device and third party provider has been discussed in detail with respect to report. Various kinds of mitigation techniqueshavebeendiscussedindetailswithrespecttoreport.Mitigationtechniques termination, training to employees has been discussed with respect to Google.Various kinds of vulnerabilitiesofGooglehasbeendiscussedwithrespecttoreport.Variouskindsof vulnerabilitieshavebeendiscussedlikeindexspammer,privacyspammer,proprietary documents, bandwidth providers have been discussed with respect to Google. Various kinds of assets of Google has been discussed in the report. Benefits of assets management has been discussed briefly respect to Organization that is Google. Other kinds of privacy concern like review or updating of google activity has been discussed with respect to report. The privacy policy provides the method of view and editing of preference by Google.
15INTERNET SERVICE AND SECURITY References [1]"Google Earth Forensics",Network Security, vol. 2015, no. 3, p. 4, 2015. [2]"Ransomware menace will grow says Google",Computer Fraud & Security, vol. 2017, no. 8, p. 3, 2017. [3]A. Soules, "I Google, You Google, We Google...",Against the Grain, vol. 20, no. 2, 2013. [4]"US judge greenlights Google privacy case",Biometric Technology Today, vol. 2017, no. 3, p. 2, 2017. [5]"Google This! Putting Google and Other Social Media Sites to Work for your Library2014 2 Terry Balford Google This! Putting Google and Other Social Media Sites to Work for your Library Oxford Chandos Publishing 2012 189 pp. 978-1-84334-677-7 £49.50",New Library World, vol. 115, no. 34, pp. 193-194, 2014. [6] Johnston, Allen C., et al. "Dispositional and situational factors: influences on information security policy violations."European Journal of Information Systems25.3 (2016): 231-251. [7] Weichselbaum, Lukas, et al. "CSP is dead, long live CSP! On the insecurity of whitelists and the future of content security policy."Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016. [8] Safa, Nader Sohrabi, Rossouw Von Solms, and Steven Furnell. "Information security policy compliance model in organizations."Computers & Security56 (2016): 70-82. [9] Chen, Kai, et al. "Finding Unknown Malice in 10 Seconds: Mass Vetting for New Threats at the Google-Play Scale."USENIX Security Symposium. Vol. 15. 2015.
16INTERNET SERVICE AND SECURITY [10] Schuler, Matthew S., and Rick A. Relyea. "A Review of the Combined Threats of Road Salts and Heavy Metals to Freshwater Systems."BioScience(2018). [11]Malcolm,Dominic."Learningfromhistoryandactingpolitically:Thethreatsand opportunities facing the sociology of the sport community." (2017): 1012690217743508. [12] Kammüller, Florian, Jason RC Nurse, and Christian W. Probst. "Attack tree analysis for insider threats on the IoT using Isabelle."International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, Cham, 2016. [13] Wynne, Brian. "Misunderstood misunderstanding: Social identities and public uptake of science."Public understanding of science(2016). [14] Alexander, Jennifer L., et al. "A meta-analysis and systematic review of the literature to evaluate potential threats to internal validity in probe procedures for chained tasks."The Journal of Special Education49.3 (2015): 135-145. [15] Groenteman, Ronny, et al. "Assessing invasion threats: novel insect-pathogen-natural enemyassociationswithnativeNewZealandplantsinsouthernCalifornia."Biological Invasions17.5 (2015): 1299-1305. [16] González-Orozco, Carlos E., et al. "Phylogenetic approaches reveal biodiversity threats under climate change."Nature Climate Change6.12 (2016): 1110. [17] Huang, Jin, Shiyou Wu, and Suo Deng. "Relative income, relative assets, and happiness in urban China."Social Indicators Research126.3 (2016): 971-985.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
17INTERNET SERVICE AND SECURITY [18] Watts, Galen, John M. Ford, and H. Alyson Ford. "Space situational awareness applications for radio astronomy assets."Sensors and Systems for Space Applications VIII. Vol. 9469. International Society for Optics and Photonics, 2015. [19] Manhas, Saloni, and Swapnesh Taterh. "A Comparative Analysis of Various Vulnerabilities Occur in Google Chrome."Soft Computing: Theories and Applications. Springer, Singapore, 2018. 51-59. [20] Lagerström, Robert, et al. "Exploring the Relationship Between Architecture Coupling and SoftwareVulnerabilities."InternationalSymposiumonEngineeringSecureSoftwareand Systems. Springer, Cham, 2017. [21] Cahill, D. "18IN Vulnerabilities of IDH mutant gliomas."Annals of Oncology29.suppl_3 (2018): mdy046-006. [22] Zhang, Jialong, Jayant Notani, and Guofei Gu. "Characterizing google hacking: A first large-scalequantitativestudy."InternationalConferenceonSecurityandPrivacyin Communication Systems. Springer, Cham, 2014.