IT Risk Management: Cloud Security, DDoS Prevention System Analysis
VerifiedAdded on  2023/06/03
|16
|3858
|422
Report
AI Summary
This report delves into the IT risk management aspects of implementing a DDoS prevention system within cloud security for Gigantic Corporation. It identifies key threats and vulnerabilities, such as reduced data control, unauthorized data usage, compromised APIs, data deletion, stolen credentials, and insider threats. A risk assessment is conducted, categorizing the severity of each identified risk. The report also explores the consequences of these risks based on the IT control framework, outlining potential impacts on the organization. Recommendations, including the use of VPNs and parallel networking, are provided to mitigate these risks, along with specific techniques like implementing antivirus software and firewalls. The report concludes by highlighting the importance of proactive risk management in ensuring the security and resilience of cloud-based systems, emphasizing the need for continuous monitoring and adaptation to emerging threats. Desklib offers a wealth of resources for students seeking similar reports and solved assignments.

Running head: CLOUD SECURITY
IT Risk Management: Cloud Security
Name of the Student
Name of the University
Author’s Note:
IT Risk Management: Cloud Security
Name of the Student
Name of the University
Author’s Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1
CLOUD SECURITY
Table of Contents
Executive Summary...................................................................................................................2
Introduction................................................................................................................................4
Risk Assessment.........................................................................................................................4
Various Threats and Vulnerabilities for DDoS Prevention System in Cloud Security..........4
Risk Assessment on the Identified Risks for the Project.......................................................6
Consequences of the Identified Risks derived from IT Control Framework.........................6
Recommendations for the Project..........................................................................................7
Mitigation of Risks and Impact on System............................................................................8
Literature Review.......................................................................................................................9
Protection Mechanisms Required for Information Security in the Project............................9
Conclusion................................................................................................................................11
References................................................................................................................................13
CLOUD SECURITY
Table of Contents
Executive Summary...................................................................................................................2
Introduction................................................................................................................................4
Risk Assessment.........................................................................................................................4
Various Threats and Vulnerabilities for DDoS Prevention System in Cloud Security..........4
Risk Assessment on the Identified Risks for the Project.......................................................6
Consequences of the Identified Risks derived from IT Control Framework.........................6
Recommendations for the Project..........................................................................................7
Mitigation of Risks and Impact on System............................................................................8
Literature Review.......................................................................................................................9
Protection Mechanisms Required for Information Security in the Project............................9
Conclusion................................................................................................................................11
References................................................................................................................................13

2
CLOUD SECURITY
Executive Summary
The main aim of this report is to know about the case study of Gigantic Corporation. This
organization will be executing a project on cloud security, DDoS prevention system. They
have recruited an IT risk assessment lead consultant for their organization. The main role of
this IT risk assessment lead consultant is to provide an interface between the business
stakeholders and technologists and translating the potential technical difficulties to risk
language for the facilitation of effective and efficient decision making process by the
stakeholders.
The cloud security is the major set of technologies, policies as well as controls that are being
implemented for the proper protection of data, applications or the associated infrastructures
of the cloud computing technology. This cloud security is the sub domain of information and
network security. There are a number of security issues that are associated with cloud
computing as well as storage providers. This is the fastest growing service, which helps in
providing some of the major functions, similar to the traditional information technology
security. The major functions include protection of the critical information from any type of
theft, data deletion or data leakage. The main advantage of the cloud security is that the data
is absolutely safe and secured.
Gigantic Corporation has recruited the IT risk assessment lead consultant for identifying the
major IT risks within their project of distribution denial of service prevention system. This
particular system is the set of tools and techniques that help to resist as well as mitigate the
overall impact of the DDoS or distributed denial of service attack over the computer networks
that are solely attached to the Internet connection by proper protection of the target or relay
networks. These types of distributed denial of service attacks are the constant threats for the
organizations and businesses by simply threatening the service performance or by shutting
CLOUD SECURITY
Executive Summary
The main aim of this report is to know about the case study of Gigantic Corporation. This
organization will be executing a project on cloud security, DDoS prevention system. They
have recruited an IT risk assessment lead consultant for their organization. The main role of
this IT risk assessment lead consultant is to provide an interface between the business
stakeholders and technologists and translating the potential technical difficulties to risk
language for the facilitation of effective and efficient decision making process by the
stakeholders.
The cloud security is the major set of technologies, policies as well as controls that are being
implemented for the proper protection of data, applications or the associated infrastructures
of the cloud computing technology. This cloud security is the sub domain of information and
network security. There are a number of security issues that are associated with cloud
computing as well as storage providers. This is the fastest growing service, which helps in
providing some of the major functions, similar to the traditional information technology
security. The major functions include protection of the critical information from any type of
theft, data deletion or data leakage. The main advantage of the cloud security is that the data
is absolutely safe and secured.
Gigantic Corporation has recruited the IT risk assessment lead consultant for identifying the
major IT risks within their project of distribution denial of service prevention system. This
particular system is the set of tools and techniques that help to resist as well as mitigate the
overall impact of the DDoS or distributed denial of service attack over the computer networks
that are solely attached to the Internet connection by proper protection of the target or relay
networks. These types of distributed denial of service attacks are the constant threats for the
organizations and businesses by simply threatening the service performance or by shutting
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3
CLOUD SECURITY
down the entire website, even for the shorter time. The normal conditions are identified for
the network traffics by properly defining the traffic patterns. This particular system of DDoS
prevention even needs the proper identification of incoming traffic for the purpose of
separating the human traffic either from the human like bots or from the hijacked web
browser. The significant procedure is being completed by proper comparison of signatures or
examination of each and every attribute of network traffic like cookie variations, IP
addresses, Javascript footprints and finally HTTP headers.
Distributed denial of service attack is one of the major threats for cloud security. Gigantic
Corporation has selected this particular project DDoS prevention system for their area of
cloud security. There are some of the most significant risks or threats in this type of cloud
based system. The main issue is that this type of system could block the IP address of the
user’s system, hence proper precautions should be undertaken accordingly. Moreover,
whenever the synchronization or SYN packets are being sent to the target system, the user
replies with the other packet, called SYN/ACK. This type of issue is extremely vulnerable for
the user’s system and when the server waits for getting a distinct response from the original
system, which is not arriving.
This report has properly identified all the issues of the cloud based distributed denial of
service prevention system for the organization of Gigantic Corporation. The IT risk
consultant of this company has not only identified the various risks of this project, but also he
has proposed proper mitigation techniques for the specific project. Moreover, the various
consequences of those risks according to the IT control framework. The final part of the
report has provided proper recommendations for this particular project of DDoS prevention
system.
CLOUD SECURITY
down the entire website, even for the shorter time. The normal conditions are identified for
the network traffics by properly defining the traffic patterns. This particular system of DDoS
prevention even needs the proper identification of incoming traffic for the purpose of
separating the human traffic either from the human like bots or from the hijacked web
browser. The significant procedure is being completed by proper comparison of signatures or
examination of each and every attribute of network traffic like cookie variations, IP
addresses, Javascript footprints and finally HTTP headers.
Distributed denial of service attack is one of the major threats for cloud security. Gigantic
Corporation has selected this particular project DDoS prevention system for their area of
cloud security. There are some of the most significant risks or threats in this type of cloud
based system. The main issue is that this type of system could block the IP address of the
user’s system, hence proper precautions should be undertaken accordingly. Moreover,
whenever the synchronization or SYN packets are being sent to the target system, the user
replies with the other packet, called SYN/ACK. This type of issue is extremely vulnerable for
the user’s system and when the server waits for getting a distinct response from the original
system, which is not arriving.
This report has properly identified all the issues of the cloud based distributed denial of
service prevention system for the organization of Gigantic Corporation. The IT risk
consultant of this company has not only identified the various risks of this project, but also he
has proposed proper mitigation techniques for the specific project. Moreover, the various
consequences of those risks according to the IT control framework. The final part of the
report has provided proper recommendations for this particular project of DDoS prevention
system.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4
CLOUD SECURITY
Introduction
Cloud security is stated as the proper security or protection of the confidential data
that is stored online (Salah et al., 2013). There are some of the main threats for the cloud
security that involve data loss, hijacking of service traffic, insecure APIs or application
program interface, breaches to confidential data, shared technology and poorer choice of the
providers of cloud storage and various other. Gigantic Corporation is one of the most popular
and significant organization that has decided to execute a project of DDoS prevention system
for the security of cloud (Krylov & Kravtsov, 2014). The following report outlines a brief
description on the case study of Gigantic Corporation and their project. A risk assessment is
done for the identified risks and the consequences are also taken into consideration from the
IT control framework. Furthermore, the various protection mechanisms will also be identified
in this report.
Risk Assessment
Various Threats and Vulnerabilities for DDoS Prevention System in Cloud Security
The project of DDoS prevention system comprises of several important and
significant risks, threats and vulnerabilities that could be extremely vulnerable for Gigantic
Corporation (Van Trung et al., 2015). The most important and noteworthy threats for this
particular project are as follows:
i) Reduced Control and Visibility of Data: The first and the foremost threat for the
DDoS prevention system in cloud security is the reduced control as well as visibility of data.
When the transitioning of the assets or operations is being done by the users, the respective
organizations lose control or visibility on the data or assets (Mahajan & Sachdeva, 2013).
When the external services are utilized, there is a major responsibility to move few policies
CLOUD SECURITY
Introduction
Cloud security is stated as the proper security or protection of the confidential data
that is stored online (Salah et al., 2013). There are some of the main threats for the cloud
security that involve data loss, hijacking of service traffic, insecure APIs or application
program interface, breaches to confidential data, shared technology and poorer choice of the
providers of cloud storage and various other. Gigantic Corporation is one of the most popular
and significant organization that has decided to execute a project of DDoS prevention system
for the security of cloud (Krylov & Kravtsov, 2014). The following report outlines a brief
description on the case study of Gigantic Corporation and their project. A risk assessment is
done for the identified risks and the consequences are also taken into consideration from the
IT control framework. Furthermore, the various protection mechanisms will also be identified
in this report.
Risk Assessment
Various Threats and Vulnerabilities for DDoS Prevention System in Cloud Security
The project of DDoS prevention system comprises of several important and
significant risks, threats and vulnerabilities that could be extremely vulnerable for Gigantic
Corporation (Van Trung et al., 2015). The most important and noteworthy threats for this
particular project are as follows:
i) Reduced Control and Visibility of Data: The first and the foremost threat for the
DDoS prevention system in cloud security is the reduced control as well as visibility of data.
When the transitioning of the assets or operations is being done by the users, the respective
organizations lose control or visibility on the data or assets (Mahajan & Sachdeva, 2013).
When the external services are utilized, there is a major responsibility to move few policies

5
CLOUD SECURITY
and infrastructure in the target location. This is extremely vulnerable for the users since they
would not be able prevent the attack of DDoS effectively.
ii) Unauthorized Uses of Data: The second important threat for the DDoS prevention
system in cloud security is the unauthorized use of confidential data and information (Laskar
& Mishra, 2016). The new services could be easily provisioned and hence the features of on
demand self service provisioning help the personnel of Gigantic Corporation to enable the
several services without taking the consent of information technology experts.
iii) Compromising Internet Accessible Management APIs: Another significant and
important threat or vulnerability for the DDoS prevention system is the compromise of the
Internet accessible management of APIs. A distinct set of APIs or application programming
interfaces are utilized for managing as well as interacting with the cloud services (Lad &
Baria, 2014). There are some of the major software related vulnerabilities in these APIs and
hence these issues should be mitigated properly.
iv) Data Deletion: The next important and noteworthy vulnerability for the specific
DDoS prevention system is the deletion of data. Often the confidential data gets deleted
without any type of previous notification (Idziorek, Tannian & Jacobson, 2013). Hence, the
authenticated users have no idea about their data getting deleted. This particular risk concerns
about the spreading of data within a number of storage devices in the infrastructure of
prevention system.
v) Stealing of Credentials: The credentials could also be stolen by the attackers and
hence the organization of Gigantic Corporation could face some of the most significant issues
related to this problem.
CLOUD SECURITY
and infrastructure in the target location. This is extremely vulnerable for the users since they
would not be able prevent the attack of DDoS effectively.
ii) Unauthorized Uses of Data: The second important threat for the DDoS prevention
system in cloud security is the unauthorized use of confidential data and information (Laskar
& Mishra, 2016). The new services could be easily provisioned and hence the features of on
demand self service provisioning help the personnel of Gigantic Corporation to enable the
several services without taking the consent of information technology experts.
iii) Compromising Internet Accessible Management APIs: Another significant and
important threat or vulnerability for the DDoS prevention system is the compromise of the
Internet accessible management of APIs. A distinct set of APIs or application programming
interfaces are utilized for managing as well as interacting with the cloud services (Lad &
Baria, 2014). There are some of the major software related vulnerabilities in these APIs and
hence these issues should be mitigated properly.
iv) Data Deletion: The next important and noteworthy vulnerability for the specific
DDoS prevention system is the deletion of data. Often the confidential data gets deleted
without any type of previous notification (Idziorek, Tannian & Jacobson, 2013). Hence, the
authenticated users have no idea about their data getting deleted. This particular risk concerns
about the spreading of data within a number of storage devices in the infrastructure of
prevention system.
v) Stealing of Credentials: The credentials could also be stolen by the attackers and
hence the organization of Gigantic Corporation could face some of the most significant issues
related to this problem.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

6
CLOUD SECURITY
vi) Insiders’ Threat: The sixth important threat or vulnerability for DDoS prevention
system is the insiders’ threat (Zargar, Joshi & Tipper, 2013). The staffs or the administrators
for Gigantic Corporation could also take the access of data, networks and infrastructures
eventually.
Risk Assessment on the Identified Risks for the Project
The risk assessment on all the identified risks for this project of DDoS prevention
system is given below:
Serial Number Identified Risks Level of Risk
1. Reduced Control and Visibility of Data Moderate
2. Unauthorized Uses of Data High
3. Compromising Internet Accessible
Management APIs
High
4. Data Deletion Moderate
5. Stealing of Credentials High
6. Insiders’ Threat Low
Table 1: Risk Assessment of Identified Risks in DDoS Prevention System
The above provided table has properly assessed all the identified risks for this
particular project and thus they should be mitigated on time (Oo et al., 2016).
Consequences of the Identified Risks derived from IT Control Framework
The IT control framework is the respective data structure, which could organize as
well as categorize the internal controls of the company for creating the business values ad
then minimizing the risks (Somani et al., 2017). The consequences of all the identified risks
that are derived from the IT control framework are as follows:
CLOUD SECURITY
vi) Insiders’ Threat: The sixth important threat or vulnerability for DDoS prevention
system is the insiders’ threat (Zargar, Joshi & Tipper, 2013). The staffs or the administrators
for Gigantic Corporation could also take the access of data, networks and infrastructures
eventually.
Risk Assessment on the Identified Risks for the Project
The risk assessment on all the identified risks for this project of DDoS prevention
system is given below:
Serial Number Identified Risks Level of Risk
1. Reduced Control and Visibility of Data Moderate
2. Unauthorized Uses of Data High
3. Compromising Internet Accessible
Management APIs
High
4. Data Deletion Moderate
5. Stealing of Credentials High
6. Insiders’ Threat Low
Table 1: Risk Assessment of Identified Risks in DDoS Prevention System
The above provided table has properly assessed all the identified risks for this
particular project and thus they should be mitigated on time (Oo et al., 2016).
Consequences of the Identified Risks derived from IT Control Framework
The IT control framework is the respective data structure, which could organize as
well as categorize the internal controls of the company for creating the business values ad
then minimizing the risks (Somani et al., 2017). The consequences of all the identified risks
that are derived from the IT control framework are as follows:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7
CLOUD SECURITY
i) Reduced Control and Visibility of Data: The consequence of this particular threat
is moderate according to the IT control framework since this risk could be avoided with
proper measures.
ii) Unauthorized Uses of Data: The consequence of this particular threat is major as
this type of threat could lead to data loss or data theft (Akbar, Basha & Sattar, 2015).
iii) Compromising Internet Accessible Management APIs: The consequence of this
threat is major since it can compromise the Internet accessible APIs.
iv) Data Deletion: The consequence of this threat is moderate as the antivirus
software can easily reduce this risk.
v) Stealing of Credentials: The consequence of this risk is major since they would not
be able to maintain the authenticity and confidentiality of the credentials (Zhang & Green,
2015).
vi) Insiders’ Threat: The consequence of this risk is minor as by deploying some
security measures, they would be able to stop this issue.
Recommendations for the Project
Although, this project would be one of the most vital and noteworthy projects in
Gigantic Corporation, there are some of the basic issues that should be resolved by some
recommendations. The major recommendations for this project of DDoS prevention system
in cloud security are as follows:
i) Using VPN: The first recommendation for this particular project is the utilization of
virtual private networks within the system. VPN is the private network that allows the users
for sending or receiving the data in shared or public networks.
CLOUD SECURITY
i) Reduced Control and Visibility of Data: The consequence of this particular threat
is moderate according to the IT control framework since this risk could be avoided with
proper measures.
ii) Unauthorized Uses of Data: The consequence of this particular threat is major as
this type of threat could lead to data loss or data theft (Akbar, Basha & Sattar, 2015).
iii) Compromising Internet Accessible Management APIs: The consequence of this
threat is major since it can compromise the Internet accessible APIs.
iv) Data Deletion: The consequence of this threat is moderate as the antivirus
software can easily reduce this risk.
v) Stealing of Credentials: The consequence of this risk is major since they would not
be able to maintain the authenticity and confidentiality of the credentials (Zhang & Green,
2015).
vi) Insiders’ Threat: The consequence of this risk is minor as by deploying some
security measures, they would be able to stop this issue.
Recommendations for the Project
Although, this project would be one of the most vital and noteworthy projects in
Gigantic Corporation, there are some of the basic issues that should be resolved by some
recommendations. The major recommendations for this project of DDoS prevention system
in cloud security are as follows:
i) Using VPN: The first recommendation for this particular project is the utilization of
virtual private networks within the system. VPN is the private network that allows the users
for sending or receiving the data in shared or public networks.

8
CLOUD SECURITY
ii) Parallel Networking: The parallel networking is the second important
recommendation for this project. This type of networking could easily detect the issue of
DDoS attack and thus the problem is mitigated for Gigantic Corporation.
Mitigation of Risks and Impact on System
The mitigation techniques of each and every identified risk for this project are given
below:
i) Implementing Antivirus Software and Proper Updates: The basic mitigation
technique for reducing the risks of the DDoS prevention system is the implementation of the
antivirus software and proper updates are required (Purwanto & Rahardjo, 2014). If these
updates are not properly done, the respective system will not be able to prevent the DDoS
attacks easily and promptly. The antivirus software is the computerized program that is used
for the prevention, detection and finally removal of the malware. This antivirus software was
previously developed for the detection and removal of computer virus. However, with
proliferation of any other malware type, this antivirus software has provided protection from
other threats like DDoS attacks as well (Sahay et al., 2015). The malicious browser helper
objects, Trojan horse, rootkits and ransomware are also protected by this attack.
ii) Implementing Firewalls: The second mitigation technique for the reduction of
risks within the DDoS prevention system is the significant implementation of firewalls
(Ankita & Khatiwala, 2015). As the name suggests, the firewalls could easily detect the
various viruses or threats. This is the specific network security system, which eventually
monitors as well as controls the incoming and outgoing network traffic on the basis of the
predetermined security rules. The firewall helps in establishing the barrier within trusted
internal network and the untrusted external networks. Two types of firewalls are categorized
here, which are network firewall and host based firewall (Mihai-Gabriel & Victor-Valeriu,
CLOUD SECURITY
ii) Parallel Networking: The parallel networking is the second important
recommendation for this project. This type of networking could easily detect the issue of
DDoS attack and thus the problem is mitigated for Gigantic Corporation.
Mitigation of Risks and Impact on System
The mitigation techniques of each and every identified risk for this project are given
below:
i) Implementing Antivirus Software and Proper Updates: The basic mitigation
technique for reducing the risks of the DDoS prevention system is the implementation of the
antivirus software and proper updates are required (Purwanto & Rahardjo, 2014). If these
updates are not properly done, the respective system will not be able to prevent the DDoS
attacks easily and promptly. The antivirus software is the computerized program that is used
for the prevention, detection and finally removal of the malware. This antivirus software was
previously developed for the detection and removal of computer virus. However, with
proliferation of any other malware type, this antivirus software has provided protection from
other threats like DDoS attacks as well (Sahay et al., 2015). The malicious browser helper
objects, Trojan horse, rootkits and ransomware are also protected by this attack.
ii) Implementing Firewalls: The second mitigation technique for the reduction of
risks within the DDoS prevention system is the significant implementation of firewalls
(Ankita & Khatiwala, 2015). As the name suggests, the firewalls could easily detect the
various viruses or threats. This is the specific network security system, which eventually
monitors as well as controls the incoming and outgoing network traffic on the basis of the
predetermined security rules. The firewall helps in establishing the barrier within trusted
internal network and the untrusted external networks. Two types of firewalls are categorized
here, which are network firewall and host based firewall (Mihai-Gabriel & Victor-Valeriu,
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

9
CLOUD SECURITY
2014). The network firewalls are responsible for filtering the traffic within two or more
networks. The host based firewalls could run on the host computers and then control in and
out mechanisms of the network traffics within these machines.
Figure 1: Firewall Implementation
(Source: Krylov et al., 2014)
These above mentioned two techniques are extremely vital and important for
mitigating all the issues related to the security in the project of DDoS prevention system for
Gigantic Corporation.
Literature Review
Protection Mechanisms Required for Information Security in the Project
According to Deshmukh and Devadkar (2015), this type of protection is either from
the theft, deletion or even leakage. Numerous methods are present for providing security in
cloud such as implementation of firewalls, tokenization, and obfuscation, avoiding usage of
the public Internet connectivity, implementing VPN or virtual private network and
penetration testing. The cloud security is extremely vital for several users, who are eventually
concerned regarding the data safety, which are being stored within the cloud (Sahi et al.,
2017). It is believed the data is absolutely safe on the local servers and have explicit control
CLOUD SECURITY
2014). The network firewalls are responsible for filtering the traffic within two or more
networks. The host based firewalls could run on the host computers and then control in and
out mechanisms of the network traffics within these machines.
Figure 1: Firewall Implementation
(Source: Krylov et al., 2014)
These above mentioned two techniques are extremely vital and important for
mitigating all the issues related to the security in the project of DDoS prevention system for
Gigantic Corporation.
Literature Review
Protection Mechanisms Required for Information Security in the Project
According to Deshmukh and Devadkar (2015), this type of protection is either from
the theft, deletion or even leakage. Numerous methods are present for providing security in
cloud such as implementation of firewalls, tokenization, and obfuscation, avoiding usage of
the public Internet connectivity, implementing VPN or virtual private network and
penetration testing. The cloud security is extremely vital for several users, who are eventually
concerned regarding the data safety, which are being stored within the cloud (Sahi et al.,
2017). It is believed the data is absolutely safe on the local servers and have explicit control
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

10
CLOUD SECURITY
on the data. However, the data stored within the cloud might be more safe and secured since
all the cloud service providers consist of higher security measures and the staffs are the
security experts. The other significant threats to the cloud security are malware as well as the
social engineering attacks. As per Chauhan and Prasad (2015), the project of DDoS
prevention system might be facing these above mentioned security issues eventually.
However, some of the protection mechanisms are present that could be helpful to reduce
these issues.
The two important and significant protection mechanisms that are needed for the
information security within the project of DDoS prevention system are as follows:
i) Implementing Virtual Private Network: Akbar, Basha and Sattar (2015), state that
the first protection mechanism for DDoS prevention system is the implementation of virtual
private networks. The virtual private network is the extension of private network within the
public network for enabling the users to either send or receive the confidential data within the
public or shared networks since the computing devices are directly linked to their private
network (Zhang & Green, 2015). This particular technology enables the remote users for
securely accessing the corporate applications or any other resource.
Figure 2: Virtual Private Network
(Source: Purwanto & Rahardjo, 2014)
CLOUD SECURITY
on the data. However, the data stored within the cloud might be more safe and secured since
all the cloud service providers consist of higher security measures and the staffs are the
security experts. The other significant threats to the cloud security are malware as well as the
social engineering attacks. As per Chauhan and Prasad (2015), the project of DDoS
prevention system might be facing these above mentioned security issues eventually.
However, some of the protection mechanisms are present that could be helpful to reduce
these issues.
The two important and significant protection mechanisms that are needed for the
information security within the project of DDoS prevention system are as follows:
i) Implementing Virtual Private Network: Akbar, Basha and Sattar (2015), state that
the first protection mechanism for DDoS prevention system is the implementation of virtual
private networks. The virtual private network is the extension of private network within the
public network for enabling the users to either send or receive the confidential data within the
public or shared networks since the computing devices are directly linked to their private
network (Zhang & Green, 2015). This particular technology enables the remote users for
securely accessing the corporate applications or any other resource.
Figure 2: Virtual Private Network
(Source: Purwanto & Rahardjo, 2014)

11
CLOUD SECURITY
ii) Using Encryption Technique: According to Mihai-Gabriel and Victor-Valeriu
(2014), this is the simplest procedure for encoding any specific message and information in
such a manner so that only the authorized and authenticated users could have the access of
that data. The encryption technique does not prevent the interference and denies the
intelligent content for the interceptor. There are two algorithms for encryption and decryption
procedures.
Figure 3: Encryption and Decryption Process
(Source: Deshmukh & Devadkar, 2015)
The impact of these two mitigation techniques on the DDoS prevention system is
extremely high and hence these should be maintained properly for avoiding any type of risk
or threat.
Conclusion
Therefore, from the above discussion, it can be concluded that distributed denial of
service or DDoS attack is the most vulnerable and dangerous threat for the cloud security and
CLOUD SECURITY
ii) Using Encryption Technique: According to Mihai-Gabriel and Victor-Valeriu
(2014), this is the simplest procedure for encoding any specific message and information in
such a manner so that only the authorized and authenticated users could have the access of
that data. The encryption technique does not prevent the interference and denies the
intelligent content for the interceptor. There are two algorithms for encryption and decryption
procedures.
Figure 3: Encryption and Decryption Process
(Source: Deshmukh & Devadkar, 2015)
The impact of these two mitigation techniques on the DDoS prevention system is
extremely high and hence these should be maintained properly for avoiding any type of risk
or threat.
Conclusion
Therefore, from the above discussion, it can be concluded that distributed denial of
service or DDoS attack is the most vulnerable and dangerous threat for the cloud security and
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 16
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




