Mits Advanced Research Techniques Research Report 2022

   

Added on  2022-09-16

6 Pages1197 Words19 Views
MITS Advanced Research Techniques
Research Report
Candidate:
Student Name
Higher Education Department
Victorian Institute of Technology
Report Title:
Proposed Title of the Research to be Undertaken
Abstract
The Abstract goes here. The abstract is a brief summary of the contents of a study,
and it allows readers to quickly survey the essential elements of a project.
Approximately 150 - 250 words. Abstract should be justified, italicized with small
margins than the rest of the document
Mits Advanced Research Techniques Research Report 2022_1
Introduction
The unauthorized transmission of data within a commercial establishment to an external recipient is
known as data leakage [6]. Data leakage usually have a disastrous impact on the growth and
productivity of a business, as it can cause both business loss and reputational loss. Unauthorized data
leakage can occur by the removal of tapes, reports and disks using the concept of data hiding. There
are diverse categories of data leakage as well, such as the accidental data breach, data exfiltration,
and phishing attacks. There are numerous reasons behind unauthorized data leakage such as setting up
of weaker and small alphanumeric passwords, theft of the login credential of an official account,
exploitation of the network exposures by the ethical hackers, accidental emailing of the sensitive
information, diverse categories of malicious attacks and loss of paperwork. Data leakage is one of the
major limitations of Machine learning language as well.
Achieving network security is one of the biggest achievements of most of the cloud computing experts,
as there are numerous flaws related to cloud networking [1]. Network security is very much significant
regarding the use of cloud computing technology as it helps them the users of this technology to secure
their sensitive data from the threat of data exposure. Misuse and unauthorized changes in cloud
computing accounts can also lead to data leakage issues. The role of the network engineer is much
important to reduce the data leakage issue from the cloud servers.
The loss of sensitive or essential data from the cloud servers is known as cloud leak [5]. All the
commercial establishments and the consumers of the cloud computing technology are vulnerable to this
data security threat; these threats can expose both the raw data of the business and the customer data,
which are usually stowed in the cloud. It can be said that the privatized space of the cloud servers is the
entry point of the social engineers. There are numerous measures which are taken by renowned global
organizations to protect the data from getting exposed while they are on the cloud servers such as the
two-factor authentication technique; however, it can be observed that even after the enactment of this
secure technique data can be exposed from the cloud servers.
On the basis of the network security perspective, it can be said that the cloud computing vendors and
the analytics vendors are usually very much affected due to the data leakage activities [3]. Data
leakage can also occur due to the misconfiguration of the cloud servers. Intellectual properties and the
online assets of commercial establishments are also very much vulnerable to the data leakage threat.
Trade secrets of bigger commercial establishments can also get exposed due to the data leakage
incidents. The patterns and the trajectory of the corporate environments can also get exposed due to
cloud leakage. The interference of the third parties can also expose all the essential data which are
managed from the cloud servers; this type of threats can also be called as the in-house resilience.
Cloud leaks can be exploited with the help of social engineering techniques such as spear phishing,
fake email, credit card frauds, Personally Identifiable Information, data disruption [2]. The latest
development in the field of social engineering has led to the incorporation of entirely new concepts
which are deployed by the social engineers to identify the vulnerabilities of the cloud servers; thus it
can be said that none of the cloud servers are free from the threat coming from unauthorized data
leakage. The unsecured buckets of cloud services can also lead to data leakage. The lack of process
control over data that are managed from the cloud servers can also lead to unauthorized data leakage
as well. Data validation and configuration validation much important to reduce the threats coming
from the cloud leak as per the network security experts all around the world.
Mits Advanced Research Techniques Research Report 2022_2
Identification of the essential data among all the other sensitive data is very much required to reduce
illegal data leakage from the cloud servers [4]. Gathering real-time information about the incoming
and the outgoing traffics can also be very much useful to address the threats coming from data leakage.
Data encryption techniques can also play a major role in securing the sensitive information which is
stored in the cloud servers. Providing technology based training sessions and educating the employees
of a commercial establishment about the adverse effects of cloud leaks can be beneficial to reduce
illegal data leakage from the cloud servers. Selection of renowned cloud provider is also recommended
for the commercial establishments to store their essential data in the cloud.
Mits Advanced Research Techniques Research Report 2022_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Mits Advanced Research Techniques And Report
|8
|3577
|16

MITS Advanced Research Technique Research Report 2022
|3
|996
|22

Potential Vulnerability of Cloud Technology | Report
|19
|3715
|23

Assignment On ICT Risks & Security Concerns
|13
|3436
|93

Internet of Things & Cyber Security
|19
|5950
|53

Strategic Information System (SIS) Assignment
|11
|1182
|207