logo

Data Breaching and Risks in Cloud Computing - PRJM 6003 Assignment 1

   

Added on  2023-04-23

7 Pages3957 Words483 Views
Theoretical Computer ScienceStatistics and Probability
 | 
 | 
 | 
PRJM 6003 ASSIGNMENT 1
[SURNAME, GIVEN NAME]
[STUDENT ID NUMBER]
Part 1
A. Data breaching will be the main issue that might act as a risk in case of implementation of
the cloud platform in the business organization. Losing of important data will be the major
issue in the prosecution of the data breaching. In case of using the cloud platform the data
will be stored in the database of the cloud system. This will insist the circumstance that the
management of the data that are stored will be performed as per the protocols of the cloud
based platform. The criminals can infiltrate the data that are stored in the database of the
cloud system. This data infiltrating can be performed with the help of the accessing of the
local files that are stored in the computer network system. With the help of network
bypassing the prosecution of the data that are stored in the database can also be performed.
Network bypassing is the major method that is used by the cyber criminals to gain
admittance to the statistics that are warehoused in the cloud database. This processing is
performed with the help of the remote system. With the help of the remote system the
main advantage that will be enjoyed includes the aspect that the management of the data
breaching gets easier for the imposters. The steps that are mainly followed by the cyber
criminals include research regarding the loop holes that are present in the system. This
system includes the fact that the cloud system is thoroughly discussed. With proper analysis
of the details pros and cons of the security of the business organization can be well
measured. After understanding of the issues present, the cyber-criminal makes the first
contact with the network using the social attack mechanism. After establishing the initial
contact with the system, the main target victim in this case is the employees of the
organization. The log in credentials of the employees are initially accessed. With the help of
the data that are gathered from the employees of the organization. After getting into the
cloud network, the imposter can attack the data that are present in the cloud networking
system. After gaining access to the data, tunnelling of data is done. In case tunnelling of data
is performed in an efficient manner, the cybercriminal attack is considered to be successful.
The main causes of performing data breaching is to fetch informations that are private in
nature. Gaining financial information is also another major aspect of the system. With the
help of the data breaching the foremost improvement that will be appreciated includes
gaining data of the competitors of the business organization. Gaining of legal information
will act harmful in the prosecution of the data management as the legal data can be pirated.
This piracy of data will lead to legal issues in the business organization.
B. 2 key causes are as follows: -
Unpatched security vulnerabilities: Leaving the software in an unpatched manner
leads to the unforced errors. This issue can be present in both small and big
companies. This issue is also termed as the zero day computer issue. This leads to
the fact that the patching of the data that are present in the database f the cloud
system includes better fixing of the law loops that are present in the database. This
issue is termed to be zero day because the outcome of the attack that will affect the
system has a tenure of less than a day. In case any personnel finds a potential
security threat he or she might inform he organization regarding the present issue.
This issue can be mitigated with the help of patching the data. Sometimes the
hackers are the first person to know about the issue that is present in the
networking system. In that case the imposter will attack the cloud database and tis
attack will occur without any prior notice. This N-day vulnerability can be fixed only
with the help of patching, In case the data that are stored in the cloud computing
system are unpatched updating of the software will not be provided. In this case the
loop-hole that are present in the commencement of the scheme he min issue that is
contemporary embraces the fact that the management of the project gets
performed as per the unpatched data gaining access to the data centre gets easier.
Implementation of proper password is very important. In case proper password
Data Breaching and Risks in Cloud Computing - PRJM 6003 Assignment 1_1

PRJM 6003 ASSIGNMENT 1
[SURNAME, GIVEN NAME]
[STUDENT ID NUMBER]
setting is not done un-patching the patched data gets easier for the imposters.
Hence unpatched data prosecution can be one of the major issue. These are the
main reason that unpatched data is considered to be data breaching terminology.
Malware: Malicious software presence also leads to data breaching. Malware are a
common form of worm that is injected in the computing system for gaining
unauthenticated access to the data set that are present in the cloud system. This
malware worms are mainly transmitted once usage of internet is done in a regular
manner without proper security measures. With the help of the cloud computing
platform the core shortcoming that is contemporary embraces the statistic that the
commencement of the project will be performed in a negative manner. The worms
and the viruses are treated differentially but this process falls under the subheading
of the malware. This introduction of the malware will introduce the aspect that the
prosecution of the spyware and the adware. This introduction of the spyware and
the adware increases the data breaching of the data that are present in the cloud
computation platform. With the introduction of the malware it gets easy for the
imposters to corrupt the data that are present in the cloud computing platform. This
corruption of data leads to violation of the company policies. This violation of the
company policy leads to data breaching. With help of malware alteration of the data
can be performed and this reduces the robustness in the management of the
protocol. Hence introduction can be considered as a key cause of data breaching in
the cloud computing system through the cloud computing.
Part 2
A.
. Objective /
Criteria
Insignificant Minor Moderate Major Catastrophic
Bandwidth
Cost
11-20% cost
increase
Data
breaching
11-20% project
slippage
Service
Quality
<5% schedule
slippage
Governance
and Control
11-20% project
slippage
Level of Consequence
Inclusion of the bandwidth cost in the consequence table is present as the cost that is
incurred in the prosecution of the entire system includes the fact that the cost of the
maintenance of cloud platform is very high. This high cost of the bandwidth cost is not
directly contributing to the revenue collection of the project. This might also affect in the
revenue earning efficiency. This issue have a moderate consequence on the business aspect.
Data breaching is one of the major disadvantage that is present in the prosecution of the
implementation of the cloud computing in the business organization. Data breaching is
caused by the imposters who try to gain data from the database of the business
organization. This commencement of the data accessing of the data in an illegal manner
leads to the circumstance that the supervision of the development will be performed as per
the security of the database that is used in the platform of cloud computing. In case the
Data Breaching and Risks in Cloud Computing - PRJM 6003 Assignment 1_2

PRJM 6003 ASSIGNMENT 1
[SURNAME, GIVEN NAME]
[STUDENT ID NUMBER]
cloud computing platform is highly robust then occurrence of this issue will not exist. This
issue have a major consequence.
Service quality is another risk as the data that are stored in the database of the cloud
platform is monitored by the third party organizations. The organizations that provides the
cloud platform is in charge of the data storage of the organization. Hence management of
the data will remain an issue in the projection of completion of the project. Hence the
quality of the service that will be refrained from the database of the cloud computing can be
prosecuted as per the management of the cloud computing system. This system has a minor
consequence.
Governance of the data that are deposited in the database of the cloud is not possible by the
business organization whose data is being stored in the data base, the foremost purpose of
this issue is that the management of the project will be performed by a third party business
organization. This process has a high consequence.
Level of Probability
1. The level of probability of Bandwidth cost is high
2. The level of probability of Data breaching is moderate
3. The level of probability of Service quality is high
4. The level of probability of Governance is low
B. Likelihood
RISK RATING Insignificant Minor Moderate Major Catastrophic
Almost Certain
Likely Service
Quality
Possible Data
breaching
Bandwidth
Cost
Unlikely Governance
and control
Rare
C. Level of consequence
Band width cost issue will have a major consequence as the cost that is incurred in
the proposition as no direct revenue is earned in this process.
Data breaching is one of the foremost question that will mark the functioning of the
entire scenario. The data that are stored in the database for ensuring the privacy of
the data might get violated. Hence the consequence of the issue will be having a
major consequence.
Service quality of the project will not be of much concern and hence the
consequence level be low.
Governance and Control of the data will be having improper management of the
project as the monitoring of the data will not be present in the company owners but
to the third party.
Part 3
Data Breaching and Risks in Cloud Computing - PRJM 6003 Assignment 1_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Risks and Mitigation in Implementing Electronic Health Record
|7
|2738
|191

Consequences of Increasing Threat of Identity Theft
|12
|675
|74

Data Security in Cloud Computing
|6
|874
|413

Security Threats in Cloud Computing and Preventive Methods
|7
|1380
|340

Security Analysis: Risk Assessment and Mitigation Strategies
|15
|2012
|445

Corporate Governance: Cyber Security Resilient Plan for Altium Limited
|13
|3301
|210