NIT5140 Information Security Assignment: Cloud Network Security Case

Verified

Added on  2023/06/03

|3
|708
|147
Case Study
AI Summary
This case study delves into the realm of cloud network security, emphasizing the critical importance of data protection and risk mitigation. It begins with a literature review highlighting the inherent risks associated with cloud networks, such as data breaches and unauthorized access, referencing scholarly articles that underscore the need for robust security measures. The business case centers around a security breach in Google Cloud Storage, attributing the incident to inadequate entry point restrictions. The analysis underscores the paramount importance of data security in cloud environments, advocating for the implementation of stringent security protocols to harness the benefits of cloud technology. The conclusion reiterates the focus on security within cloud networks, emphasizing the need to prioritize data protection to ensure the integrity and confidentiality of information. Desklib provides access to similar case studies and solved assignments for students.
Document Page
Cloud Network
*Note: Sub-titles are not captured in Xplore and should not be used
XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract— The concept of the cloud computing is mostly in
area of focus which mainly deal with connecting of the
different sectors of operation into one concentrated area.
The cloud network can be stated as an interconnection of
different devices in order to get the normal working on the
organization. In the concept of the cloud network there are
different factors of advantage which can be seen but on
there are different factors of risk associated with the
concept.
Keywords—cloud security, data, mitigation plan
I. LITERATURE REVIEW
As stated by ([4]) the concept of cloud network can
be including different type of risk factor associated within
the concept. There are many types of issue like the breach of
the data or taking control of the data which is present in the
system. Moreover, on the other hand it was stated by ([3])
that in the sector of the risk the identification of the risk
factor is very much essential and it majorly takes into focus
the aspect of the data security which would be prevailing in
the system. There is more security concern which is related
to the concept of the cloud network as stated by ([1]) the
risk in the sector play a very primary role which would be
linked to the controlling of the data and the managing aspect
of the data which would be present and prevailing in the
system.
II. BUSINESS CASE
The main business case which can be stated here is the
Google cloud storage area. There was a security breach in
the Google cloud which directly impacted the data which
was saved in the concept [4]. The main event which was
seen in this sector was seen majorly due to the factor that
entry point restriction of the data was not given
III. ANALYSIS OF THE CASE STUDY
The main analysis which can be provided from the end of
the cloud network is the security of the data which would be
prevailing in the system. In most of the cases it can be seen
that data security aspects are one of the major concern area
after the movement to the concept of the cloud. If there are
proper security implication implemented within the data, it
can be a technology which is very much beneficial for the
organization who would be involving themselves in the
concept of the cloud network [1]. advantage sector is vast in
the sector and on the other hand the risk factor which is
associated within the concept also play a major role in the
context of the operating which is related to the context.
IV. CONCLUSION
The main sector of focus in recent times is seen in the
domain of the security which is prevailing in the concept of
the cloud network. In most of the cases it can be stated that
the security of the system should be given topmost priority
so that security of the data is which would be prevailing in
the system.
REFERENCES
[1] Hussain, Syed Asad, et al. "Multilevel classification of
security concerns in cloud computing." Applied Computing
and Informatics 13.1 (2017): 57-65.
[2] Li, Xinhong, Guoming Chen, and Hongwei Zhu.
"Quantitative risk analysis on leakage failure of submarine
oil and gas pipelines using Bayesian network." Process
Safety and Environmental Protection 103 (2016): 163-173.
[3] Wang, Nianxin, et al. "Cloud computing research in the
IS discipline: A citation/co-citation analysis." Decision
Support Systems 86 (2016): 35-47.
[4] Zhang, Limao, et al. "Developing a cloud model based
risk assessment methodology for tunnel-induced damage to
existing pipelines." Stochastic environmental research and
risk assessment 29.2 (2015): 513-526.
Document Page
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]