Cloudflare: Information Security Features and Contributions

Verified

Added on  2022/08/27

|2
|595
|17
Homework Assignment
AI Summary
This assignment focuses on Cloudflare, a U.S.A. organization specializing in content propagation, DDoS relief, and internet security. It details Cloudflare's key information security features, emphasizing the CIA triad (confidentiality, integrity, and availability) and their importance. The assignment also highlights Cloudflare's contributions to information security, including its work with Project Galileo, which provides security to vulnerable targets. The response clarifies that information confidentiality does not automatically imply information integrity, as both are distinct aspects of data security. The assignment draws on references to support the analysis of Cloudflare's role in information security, focusing on its functions, recent contributions, and the distinction between confidentiality and integrity.
Document Page
Cloudflare, Inc. organization is a U.S.A. organization responsible for managing the content
propagation, DDoS relief, Internet security, as well as widespread of the location name server
management, located among the guest as well as the Cloudflare business representatives
expedient associates as well as acting as a site switch intermediary. Cloudflare's head office is
located in Seattle, Washington, as well as has other offices in Singapore, London, India, Dubai,
Malaysia, as well as Chicago.
Cloudflare was opened in 2009 by the CEO Matthew Prince and CIO Lee Holloway, and CTO
Michelle Zatlyn, which previously lost chips in the project honeypot. Cloudflare was promoted
at the TechCrunch meeting which was held in September 2010. After providing security to
LulzSec sites, media was considered in June 2011 (Botelho, 2017).
In June 2012, Cloudflare worked with a variety of websites, including HostPapa, to realize the
innovation of Railgun.
In February 2014, Cloudflare reduced its scale to the point of recording DDoS attacks. This was
recorded in 400 Gbit/sec for private customers. In the end of Nov- 2014, Cloudflare declared
another giant DDoS attack, where autonomous destinations of media are concentrated at 500
Gbit / s (Botelho, 2017).
What are the key information security features?
The essential focal point of data security is adjusted insurance of information classification,
uprightness, just as accessibility (otherwise called CIA sets of three), concentrating on executing
effective arrangements without trading off the profitability of your association. This is essentially
practiced with the help of a multi-step hazard the executive’s procedure which recognizes
resources and danger sources, vulnerabilities and potential effects, just as potential controls just
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
as assesses the adequacy of the hazard the board plan. The confidentiality of information does
not necessarily mean the integrity of information. Granting access only to authorized personnel
can maintain the confidentiality of information. However, data integrity is not maintained if the
authorized person commits any error in the calculation. Therefore, it is clear that the
confidentiality of information as well as the integrity of the information is two different entities
in the CIA Triad as well as two different nodes. Confidentiality, integrity as well as availability
form CIA triads. You can think of this as a basic principle of information security policies. The
CIA Triad helps develop secure information security systems (Smith, 2017).
What contributions have you made recently in the area of information security?
In the early phases of 2014, Cloudflare met with Project Galileo in the digital attacks driven by
imperative, powerless targets such as imaginative gatherings, charities, as well as the voices of
political contradictions. Cloudflare works with free conversations, open conspiracies, as well as
public associations to extend the benefits of enterprise-class DDoS insurance as well as business-
level execution, ensuring that these sites remain web-based as well as not quiet (Smith, 2017).
References
Botelho, J. (2017). How automating data collection can improve cyber-security. Network
Security, 2017(6), 11-13. doi: 10.1016/s1353-4858(17)30061-2
Smith, M. (2017). How Can We Prevent Network Security Problems in Smartphone
Apps?. Latest Thinking. doi: 10.21036/ltpub10054
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]