MITS4004 Assignment 1: Review of Networking and Communication Article

Verified

Added on  2022/09/18

|8
|1601
|26
Report
AI Summary
This report is a comprehensive review of a journal article concerning advanced networking and communication, with a specific focus on cloud computing and its associated security implications. The report begins with a summary of the chosen article, which discusses the increasing importance of networking, especially in the context of cloud computing and its growing acceptance. The report then delves into the research methods employed, followed by an examination of the critique models utilized in the article. Key findings are presented, highlighting the rise of cloud computing and the security challenges that accompany it, such as data breaches and vulnerabilities. The author also provides their opinion on the relevance of the article, emphasizing its direct connection to the field of advanced networking and communication. The conclusion reinforces the importance of cloud computing security and recommends its implementation, while also mentioning the benefits of data backup. The article emphasizes the importance of security, especially given the rise of smart phone usage and the increase in data breach attacks. The report also examines various aspects like identifying and access management, data loss prevention, and web security. The report also discusses the comprehensive security model, usage of trust model, and information dispersal algorithms. The report concludes with a discussion on the importance of cloud computing for providing proper security to the systems and the need for backup of data.
Document Page
Running head: ADVANCED NETWORKING AND COMMUNICATION
ADVANCED NETWORKING AND COMMUNICATION
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
ADVANCED NETWORKING AND COMMUNICATION
Table of Contents
Introduction......................................................................................................................................2
Summary..........................................................................................................................................2
Research methods............................................................................................................................4
Critique models................................................................................................................................5
Findings...........................................................................................................................................5
Opinion............................................................................................................................................5
Conclusion.......................................................................................................................................6
Bibliography....................................................................................................................................7
Document Page
2
ADVANCED NETWORKING AND COMMUNICATION
Introduction
Cloud computing is considered to be one of the major technology that have been gaining
acceptance among the mass. This ensures the fact that the networking system have been gaining
importance in the regular lifestyle of the people. Now that networking have been increasing the
efficiency of the working process, there are several security related issues. The report provides a
summary of the entire paper. After the summary is provided the research method that is
implemented in the research process is also stated. The models that are discussed in the chosen
paper have been discussed as well. Henceforth findings of the paper is also discussed. Lastly the
relevance regarding the topic is also provided.
Summary
Cloud computing have been providing individuals and industry a better assessment of the
operational process. Standardizing of the section ensures that there have been better assessment
of the Open group as well as the open cloud consortium. There have been an increase in attacks
that in the networks as the usage of smart phones have been on an increasing node. This section
ensures that the data RSA’s popular secure IDs are considered to be important. There have been
attacks that have been seen in the past regarding the penetration of the computer networks. This
attack was on the RSA’s most powerful contractor clients. There are certain steps that ate
considered I the cloud computational process. The processes includes the likes of identifying as
well as accessing management, creation of data loss prevention have been considered as web
security have been considered as well in the group. E mail security is also provided via the cloud
platform. Data that are stored in the cloud system are well encrypted. Information security is also
considered in the process. Disaster management is also performed by Cloud computing system.
Document Page
3
ADVANCED NETWORKING AND COMMUNICATION
The major concern that have been considered in the process is that in case the data of such big
organizations are breached then how is it expected that the data that are stored in the data base of
the SMEs will be protected. Data disclosure have been the main focus of many data breach
attacks. However, it have been observed that the data breach attacks that have taken place
includes the fact that there have been vulnerabilities in the software and this have been the reason
that the data breaching have took place. Another factor that have been discussed in the section is
cloud computing.
It have been seen that cloud have been getting accepted in a rapid rate, however this
acceptance rate have also led to several security related issues. Identifying and Access
management is also performed via cloud platform, Data loss prevention measures are already
taken. Web security is also performed. These are the major aspects that have been bettering the
working process of the cloud platfimr and hence security system gets better. Comprehensive
security model have been one of the major aspect that is to be considered in the process. This
process includes different approaches of distribution and management as a service is used in the
process. Both the factors are collaborated into the trust model. The comprehensive security
model is considered to be useful in the security assessment of the wireless networking system.
Usage of trust model can be acting beneficial in this process of increasing robustness. This
increasing of robustness with the help of the trust model ensures that there will be a proper
assessment of the security issues will be made and the internet can keep on growing and be
useful in nature.
Despite the fact that’s there have been issues regarding differentiation in between
requirements of confidentiality and verifiability. This have been precluding a general solutions
regarding the solutions which have not been highly efficient in nature. The main aspect that is
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
ADVANCED NETWORKING AND COMMUNICATION
considered in the process is that there have been issues regarding the network security, Hence the
need of application specific security program was implemented. This solution have been taking I
charge of the security and privacy related issues. Reliability constitutes the fact that there have
been trustworthy computer framework for different application. The basic aspects that are
considered in the process is that there is a need of usage of encrypted data while performing the
data transaction process. After this process, password of the system have been provided as well.
An encryption key is to be set in a manner that the assessment of the protection process of the
data. The entire process is known as conventional data protection method.
The next factor that is discussed in the section is the information dispersal algorithms that
will be used in the process. As per the data that have been analyzed in the process, it have been
seen that there have been no such benefit received due to the usage of firewall in eliminating the
data breaching assessment. Hence man made disasters are not well handled with the help of
firewall. Usage of Information Dispersal is considered to be one of the major example that have
been acting as a different server. Protection against data loss and disaster intrusion have also
taken place. There are 5 major sections that are considered in the proposed security model. The
security model have been one of the major aspect that have been bettering the working process.
This section also ensures that the security policy is mapped and hence wise the preciseness of the
entire system is changed. Usage of cloud assessment is also performed. Cloud user agent have
been acting as a user agent and hence this will be ensuring the fact that the connection gets
specific in nature. There are 6 major steps that are considered in the process. The steps are
namely verification and validation, security policies privilege control, data security service and
threat attacks detection.
Document Page
5
ADVANCED NETWORKING AND COMMUNICATION
Research methods
The research method that have been chosen for completion of the research is secondary
data collection and data analysis process. It have been seen that data that are present in the peer
reviewed journals are considered in the section. It have been seen that there will be no copyright
issues as referencing of data is made in a proper manner.
Critique models
Verification and validation is used for ensuring the accuracy of the data.
Security policies are based on the resonance safety completions.
Privilege control is used for controlling the people who can have access to the cloud
Data protection is considered for assessing the processing of cloud storage resources for
being sensitive as well as critical data management.
Security services have been focused on processing of the authentication methods that are
considered.
Threat and attack detection helps in analyzing network before the attack occurs.
Findings
There have been a recent growth in the usage of cloud computing globally. This section
ensures the fact that the backup process that is considered in this process have been highly
efficient and hence security issues can be eliminated. This elimination of the security issues have
been one of the major prospect that can be used as a specialized action against the security
issues.
Document Page
6
ADVANCED NETWORKING AND COMMUNICATION
Opinion
The research paper that have been selected for completion of the paper is completely
relevant to the subject. The subject that is considered in the process is namely advanced
networking and communication process. It have been seen that the article that have been selected
in the process is directly related to the network. It have been seen that security was a section that
was focused in the module. This article that have been completely focused on the security
aspects hence relevance of the entire research paper have been high.
Conclusion
From the above data that have been collected and discussed, the conclusion that can be
drawn is that there have been an increase in the usage of internet as smart phone usage have
been increasingly hence this can be stated that there have been several data breach attacks that
have occurred. This section ensures that the assessment that the networking is properly assessed.
This assessing of the networking can be seen and hence there have been security related issues
that were detected. It have been seen that the issues were not getting dissolved with the help of
general solutions. Firewalls are seen to be getting impractical in case of man made attacks.
However, usage of the cloud computing have been providing proper security to the systems and
hence wise using the same is highly recommended. Keeping backup of data have been one of the
major benefits of the cloud computing.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
ADVANCED NETWORKING AND COMMUNICATION
Bibliography
[1]R. Bunkar, "STUDY ON SECURITY MODEL IN CLOUD COMPUTING", International
Journal of Advanced Research in Computer Science, pp. 841-844, 2017. Available:
10.26483/ijarcs.v8i7.4350 [Accessed 11 April 2020].
chevron_up_icon
1 out of 8
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]