Mits Advanced Research Techniques Research Report 2022
Verified
Added on  2022/09/16
|6
|1197
|19
AI Summary
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
MITS Advanced Research Techniques Research Report Candidate: Student Name Higher Education Department Victorian Institute of Technology Report Title: Proposed Title of the Research to be Undertaken Abstract The Abstract goes here. The abstract is a brief summary of the contents of a study, anditallowsreaderstoquicklysurveytheessentialelementsofaproject. Approximately 150 - 250 words. Abstract should be justified, italicized with small margins than the rest of the document
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Introduction The unauthorized transmission of data within a commercial establishment to an external recipient is known as data leakage [6]. Data leakage usually have a disastrous impact on the growth and productivity of a business, as it can cause both business loss and reputational loss. Unauthorized data leakage can occur by the removal of tapes, reports and disks using the concept of data hiding. There are diverse categories of data leakage as well, such as the accidental data breach, data exfiltration, and phishing attacks. There are numerous reasons behind unauthorized data leakage such as setting up of weaker and small alphanumeric passwords, theft of the login credential of an official account, exploitation of the network exposures by the ethical hackers, accidental emailing of the sensitive information, diverse categories of malicious attacks and loss of paperwork. Data leakage is one of the major limitations of Machine learning language as well. Achieving network security is one of the biggest achievements of most of the cloud computing experts, as there are numerous flaws related to cloud networking [1]. Network security is very much significant regarding the use of cloud computing technology as it helps them the users of this technology to secure their sensitive data from the threat of data exposure. Misuse and unauthorized changes in cloud computing accounts can also lead to data leakage issues. The role of the network engineer is much important to reduce the data leakage issue from the cloud servers. The loss of sensitive or essential data from the cloud servers is known as cloud leak [5]. All the commercial establishments and the consumers of the cloud computing technology are vulnerable to this data security threat; these threats can expose both the raw data of the business and the customer data, which are usually stowed in the cloud. It can be said that the privatized space of the cloud servers is the entry point of the social engineers. There are numerous measures which are taken by renowned global organizations to protect the data from getting exposed while they are on the cloud servers such as the two-factor authentication technique; however, it can be observed that even after the enactment of this secure technique data can be exposed from the cloud servers. On the basis of the network security perspective, it can be said that the cloud computing vendors and the analytics vendors are usually very much affected due to the data leakage activities [3]. Data leakage can also occur due to the misconfiguration of the cloud servers. Intellectual properties and the online assets of commercial establishments are also very much vulnerable to the data leakage threat. Trade secrets of bigger commercial establishments can also get exposed due to the data leakage incidents. The patterns and the trajectory of the corporate environments can also get exposed due to cloud leakage. The interference of the third parties can also expose all the essential data which are managed from the cloud servers; this type of threats can also be called as the in-house resilience. Cloud leaks can be exploited with the help of social engineering techniques such as spear phishing, fake email, credit card frauds,Personally Identifiable Information, data disruption [2]. The latest development in the field of social engineering has led to the incorporation of entirely new concepts which are deployed by the social engineers to identify the vulnerabilities of the cloud servers; thus it can be said that none of the cloud servers are free from the threat coming from unauthorized data leakage. The unsecured buckets of cloud services can also lead to data leakage. The lack of process control over data that are managed from the cloud servers can also lead to unauthorized data leakage as well. Data validation and configuration validation much important to reduce the threats coming from the cloud leak as per the network security experts all around the world.
Identification of the essential data among all the other sensitive data is very much required to reduce illegal data leakage from the cloud servers [4]. Gathering real-time information about the incoming and the outgoing traffics can also be very much useful to address the threats coming from data leakage. Data encryption techniques can also play a major role in securing the sensitive information which is stored in the cloud servers. Providing technology based training sessions and educating the employees of a commercial establishment about the adverse effects of cloud leaks can be beneficial to reduce illegal data leakage from the cloud servers. Selection of renowned cloud provider is also recommended for the commercial establishments to store their essential data in the cloud.
Literature Review This Section contains the methodology for the proposed research report… consider any feedback given and the marking guide used for the previous assignmentapprox. 5 pages
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Methodology This Section contains the methodology for the proposed research report… consider the marking guide used for the previous assignmentapprox. 3 pages
References [1] A,R. Dargad and S.G. Sutar. Enhanced Data Leakage Detection in IoT Network Backup with Cloud Using Paillier Homomorphic Cryptosystem.Asian Journal For Convergence In Technology (AJCT),3, 2017. [2] J. Li and Q. Li. Data security and risk assessment in cloud computing. InITM Web of Conferences (Vol. 17, p. 03028). EDP Sciences, 2018 [3] A. Archana Lisbon and R. Kavitha. A study on cloud and fog computing security issues and solutions.International Journal of Innovative Research in Advanced Engineering (IJIRAE), (03), pp.17-22, 2017 [4] D. Pallegedara and M. Warren. Unauthorised Disclosure of Organisational Information through Social Media: A Policy Perspective.IDIMC 2016,86, 2016 [5] M. Sen and S.S. Choudhury. Security and privacy issues for cloud computing and its challenges. Review of Computer Engineering Studies,4(2), pp.62-66, 2017 [6] C. Zuo, Z. Lin Y. and Zhang. Why does your data leak? uncovering the data leakage in cloud from mobile apps. In2019 IEEE Symposium on Security and Privacy (SP)(pp. 1296-1310). IEEE, 2019.