MITS5004: Report on Information Technology Security
VerifiedAdded on 2022/10/04
|6
|1875
|16
Report
AI Summary
This report examines the critical aspects of IT security, focusing on the challenges and encryption practices within cloud computing. It begins by establishing the importance of IT systems in organizations and outlines the benefits, such as efficient data storage and cost-effectiveness. The report then delves into a selected research paper that addresses cloud computing security, highlighting the security issues, including data integrity, privacy, and trust. The research paper also discusses the role of encryption techniques like RSA and homomorphic encryption in enhancing information security. The analysis of the research paper reveals that while cloud computing offers significant advantages, it also presents considerable security limitations, particularly in data protection. The report concludes by summarizing the key findings and suggests the implementation of data and privacy policies, surveillance, and data transmission procedures to mitigate potential vulnerabilities. The report evaluates the research paper's strengths and weaknesses, emphasizing the need for a more detailed discussion of mitigation strategies.

Running head: REPORT ON INFORMATION TECHNOLOGY SECURITY
REPORT
ON
INFORMATION TECHNOLOGY SECURITY
Name of the Student
Name of the University
Author Note:
REPORT
ON
INFORMATION TECHNOLOGY SECURITY
Name of the Student
Name of the University
Author Note:
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1IT Security
Introduction:
The aim of this report is to discuss about the aspect of information technology
security with the purpose to analyze its essentiality, benefits as well as how this may
influence the services of the IT systems. Followed by this aspect it has been noticed that
several researches has been conducted in the aspect of IT security from which a research
paper has been selected based on the application of cloud computing into the IT system,
which consists on a detail elaboration on the security challenges as well as the encryption
techniques which are utilized in the application of cloud computing. In order to support the
above mentioned discussion this paper will effectively elaborate on the key findings which
has been identified from the research, followed by which it will also discuss about the
security issues which has been noticed in the field of Information Technology security. Along
with the above discussion it will also analyze the accuracy of the effectiveness of the selected
research paper. Lastly, it will conclude by summarizing the key aspects which has been
identified from the above discussion.
Discussion:
Followed by the objective of this paper, a thorough investigation on the features and
application of information technology has been conducted, which has provided a brief idea on
the essentiality of the IT systems into the organizational field. After the investigation it has
been noticed that information technology is nothing but a combination of storage, processors,
networking as well as other devices that helps to enhance the services of an organization by
incorporating effective technologies in it. After the incorporation of technologies, the
organizational activities are performed via the utilization of electronic devices. Followed by
the above mentioned application several benefits has been accounted into the server of IT
system which holds a significant impact on enhancing the performance of an organization.
Those benefits includes the effective data storage process due to which the organizational
information are stored in IT system which provide effective services like data sorting, data
processing as well as helps to make effective decision as well. Along with being performance
efficient these technologies are cost effective as well, as it reduces the human efforts and
speed up the business activities. [1] However, apart from these benefits in the application of
IT systems there are several limitations present as well which includes the security of the
information. Considering the current industrial growth as well as the growth of security issues
it has been noticed that there are several significant challenges present in the application of
effective IT systems in to the business services as it may harm the organizational assets.
Introduction:
The aim of this report is to discuss about the aspect of information technology
security with the purpose to analyze its essentiality, benefits as well as how this may
influence the services of the IT systems. Followed by this aspect it has been noticed that
several researches has been conducted in the aspect of IT security from which a research
paper has been selected based on the application of cloud computing into the IT system,
which consists on a detail elaboration on the security challenges as well as the encryption
techniques which are utilized in the application of cloud computing. In order to support the
above mentioned discussion this paper will effectively elaborate on the key findings which
has been identified from the research, followed by which it will also discuss about the
security issues which has been noticed in the field of Information Technology security. Along
with the above discussion it will also analyze the accuracy of the effectiveness of the selected
research paper. Lastly, it will conclude by summarizing the key aspects which has been
identified from the above discussion.
Discussion:
Followed by the objective of this paper, a thorough investigation on the features and
application of information technology has been conducted, which has provided a brief idea on
the essentiality of the IT systems into the organizational field. After the investigation it has
been noticed that information technology is nothing but a combination of storage, processors,
networking as well as other devices that helps to enhance the services of an organization by
incorporating effective technologies in it. After the incorporation of technologies, the
organizational activities are performed via the utilization of electronic devices. Followed by
the above mentioned application several benefits has been accounted into the server of IT
system which holds a significant impact on enhancing the performance of an organization.
Those benefits includes the effective data storage process due to which the organizational
information are stored in IT system which provide effective services like data sorting, data
processing as well as helps to make effective decision as well. Along with being performance
efficient these technologies are cost effective as well, as it reduces the human efforts and
speed up the business activities. [1] However, apart from these benefits in the application of
IT systems there are several limitations present as well which includes the security of the
information. Considering the current industrial growth as well as the growth of security issues
it has been noticed that there are several significant challenges present in the application of
effective IT systems in to the business services as it may harm the organizational assets.

2IT Security
Followed by the above discussion the select paper is based on the cloud computing security
challenges and encryption process as in the current growth of technology cloud computing
holds a significant impact on enhancing the performance of the organizations. While
elaborating the nominated topic it has been noticed that cloud computing is a computing
service which includes the effective software, analytics feature, networking, database storage
as well as includes the server that works via internet, which offers effective computing
services and innovations as well. [2] Hence, after investigating the benefits of cloud
computing it has been noticed that cloud is one of the most cost effective technology that
provide resources on demand, speed ups the business services, holds effective scalability,
enhances the productivity, reliability, performance as well as the security of the organization.
However, followed by the above discussion security concerns of cloud computing has been
discussed in the selected research paper. [3]
According to the selected research paper cloud computing is one of the most trending
technology which is currently utilized by several organization due to its on-demand feature
which helps to expand the storage capacity as well as other resources as per their needs.
However, cloud computing holds significant issues related to its security features, which has
been highlighted by several researchers. Hence, in this research paper the aspect of cloud
security mechanism has been significantly focused in order to provide appropriate mitigation
strategy to address the identified risk related to IT security. Followed by this aspect the
researcher has mention that since, cloud computing is based on distributed pattern thus there
it with by interconnecting the computing resources with the purpose to enhance the services
of an organization. Followed by this several operational issues has been identified which
includes the security issues, cloud service issues as well as the issues related to the cloud
security issues. While describing the security issues it has mentioned that since, cloud server
works with the real time data which consist of important information related to the users and
organization it has several significant risk has been identified which may influence the
information issue, information privacy issue, security issue, trust issues as well as the issues
related to the application of cloud infrastructure into the organization. [4] Followed by this
the researcher has elaborated each of the issues by stating that data issues are nothing but the
issues related to the data availability, accessibility as well as the data integrity. Considering
these identified aspect on the issues of information explains that in cloud computing these are
the common conflicts which happens in the organizational infrastructure. Similar to this
privacy issues are those due to which cloud infrastructure experiences data leakage,
Followed by the above discussion the select paper is based on the cloud computing security
challenges and encryption process as in the current growth of technology cloud computing
holds a significant impact on enhancing the performance of the organizations. While
elaborating the nominated topic it has been noticed that cloud computing is a computing
service which includes the effective software, analytics feature, networking, database storage
as well as includes the server that works via internet, which offers effective computing
services and innovations as well. [2] Hence, after investigating the benefits of cloud
computing it has been noticed that cloud is one of the most cost effective technology that
provide resources on demand, speed ups the business services, holds effective scalability,
enhances the productivity, reliability, performance as well as the security of the organization.
However, followed by the above discussion security concerns of cloud computing has been
discussed in the selected research paper. [3]
According to the selected research paper cloud computing is one of the most trending
technology which is currently utilized by several organization due to its on-demand feature
which helps to expand the storage capacity as well as other resources as per their needs.
However, cloud computing holds significant issues related to its security features, which has
been highlighted by several researchers. Hence, in this research paper the aspect of cloud
security mechanism has been significantly focused in order to provide appropriate mitigation
strategy to address the identified risk related to IT security. Followed by this aspect the
researcher has mention that since, cloud computing is based on distributed pattern thus there
it with by interconnecting the computing resources with the purpose to enhance the services
of an organization. Followed by this several operational issues has been identified which
includes the security issues, cloud service issues as well as the issues related to the cloud
security issues. While describing the security issues it has mentioned that since, cloud server
works with the real time data which consist of important information related to the users and
organization it has several significant risk has been identified which may influence the
information issue, information privacy issue, security issue, trust issues as well as the issues
related to the application of cloud infrastructure into the organization. [4] Followed by this
the researcher has elaborated each of the issues by stating that data issues are nothing but the
issues related to the data availability, accessibility as well as the data integrity. Considering
these identified aspect on the issues of information explains that in cloud computing these are
the common conflicts which happens in the organizational infrastructure. Similar to this
privacy issues are those due to which cloud infrastructure experiences data leakage,
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3IT Security
replication as well as data loss. After analyzing this it has been also noticed that the
researcher has mentioned that the information security issues and the trust issues are also one
of the most significant issues that are present in cloud computing infrastructure. These issues
has been raised due to the growth of external data threats which holds the ability to
significantly steal or destroy the organizational data. Along with that there is a huge chance
of misuse of the gathered data hence, in this scope the security feature of cloud computing
has been highlighted. Followed by the above discussion the researcher has also mentioned
that in the functionalities of cloud computing there is huge impact of encryption technique in
information security. Furthermore, it has discussed about the RSA encryption algorithm,
homomorphic encryption techniques. After analyzing the working principles of the
encryption techniques it has been noticed that the encryption process starts by converting the
information into the cypher text which will be then send to the receiver and the receiver will
have the key to decode the encrypted file in order to decode it. After discussing the above
aspect it has then characterized the algorithm as per their functionalities. Later, the paper has
been concluded by stating that whereas, the application of cloud computing offers significant
benefits to the organizational services in order to enhance the performance of the
organization, it has been noticed that several significant limitations are also present there.
However, the application of effective mitigation approaches will help to reduce the risk
factors which has been identified in this research. Followed by this aspect has then suggested
to implement effective data security policy, privacy policy, surveillance as well as data
transmission procedure which will surely help to mitigate the possibilities of security
vulnerability. [5]
After analyzing the above mentioned research paper it can stated that the topic of the
research is trending, however the researcher has not effectively elaborated the key aspect that
are present in the security feature of cloud computing. Followed by this aspect it has been
also noticed several research has stated that the limitation present in cloud computing can be
mitigated by the application of firewall protection as well as by the incorporation of IDS and
IPS. Whereas, this paper has not elaborated the mitigation approaches which will help to
reduce the possibilities of the identified risk. [6] Thus, after analyzing the paper it can be
stated that the researcher must has have provide more focus on the risks as well as the
research paper should consist a detail elaboration of mitigation approaches which may help to
reduce the possibilities of security vulnerabilities.
replication as well as data loss. After analyzing this it has been also noticed that the
researcher has mentioned that the information security issues and the trust issues are also one
of the most significant issues that are present in cloud computing infrastructure. These issues
has been raised due to the growth of external data threats which holds the ability to
significantly steal or destroy the organizational data. Along with that there is a huge chance
of misuse of the gathered data hence, in this scope the security feature of cloud computing
has been highlighted. Followed by the above discussion the researcher has also mentioned
that in the functionalities of cloud computing there is huge impact of encryption technique in
information security. Furthermore, it has discussed about the RSA encryption algorithm,
homomorphic encryption techniques. After analyzing the working principles of the
encryption techniques it has been noticed that the encryption process starts by converting the
information into the cypher text which will be then send to the receiver and the receiver will
have the key to decode the encrypted file in order to decode it. After discussing the above
aspect it has then characterized the algorithm as per their functionalities. Later, the paper has
been concluded by stating that whereas, the application of cloud computing offers significant
benefits to the organizational services in order to enhance the performance of the
organization, it has been noticed that several significant limitations are also present there.
However, the application of effective mitigation approaches will help to reduce the risk
factors which has been identified in this research. Followed by this aspect has then suggested
to implement effective data security policy, privacy policy, surveillance as well as data
transmission procedure which will surely help to mitigate the possibilities of security
vulnerability. [5]
After analyzing the above mentioned research paper it can stated that the topic of the
research is trending, however the researcher has not effectively elaborated the key aspect that
are present in the security feature of cloud computing. Followed by this aspect it has been
also noticed several research has stated that the limitation present in cloud computing can be
mitigated by the application of firewall protection as well as by the incorporation of IDS and
IPS. Whereas, this paper has not elaborated the mitigation approaches which will help to
reduce the possibilities of the identified risk. [6] Thus, after analyzing the paper it can be
stated that the researcher must has have provide more focus on the risks as well as the
research paper should consist a detail elaboration of mitigation approaches which may help to
reduce the possibilities of security vulnerabilities.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4IT Security
Conclusion:
After completion of the above discussion it can be stated that this report has
effectively discussed the aspect of information technology security risk which holds a
significant impact on the services of an organization. In order to investigate the above
mentioned aspect it has been noticed that considering the current industrial growth the
application of cloud computing is on trend. Followed by this concern a research paper based
on the cloud computing security issues and the encryption techniques has been selected. With
the purpose to effectively elaborate the research this report consist a detail elaboration of the
selected article based on the key findings that has been addressed by the researcher. Followed
by this aspect it has also investigated the methodologies as well as the procedures by which it
has conducted the research. After the completion of the analysis of the nominated paper it can
be concluded that this report has effectively analysed the paper and identified the limitations
as well as provided suggestions for further research. Hence, it can be stated that this paper has
met all the desire requirement.
Conclusion:
After completion of the above discussion it can be stated that this report has
effectively discussed the aspect of information technology security risk which holds a
significant impact on the services of an organization. In order to investigate the above
mentioned aspect it has been noticed that considering the current industrial growth the
application of cloud computing is on trend. Followed by this concern a research paper based
on the cloud computing security issues and the encryption techniques has been selected. With
the purpose to effectively elaborate the research this report consist a detail elaboration of the
selected article based on the key findings that has been addressed by the researcher. Followed
by this aspect it has also investigated the methodologies as well as the procedures by which it
has conducted the research. After the completion of the analysis of the nominated paper it can
be concluded that this report has effectively analysed the paper and identified the limitations
as well as provided suggestions for further research. Hence, it can be stated that this paper has
met all the desire requirement.

5IT Security
Reference:
[1] “Cloud Computing: Security Challenges & Encryption Practices”, Dr. A. Padmapriya,
P.Subhasri, International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 3, March 2013, ISSN: 2277 128X, pp 225 – 229.
[2] "IEEE Cloud Computing Call for Papers Connecting Fog and Cloud Computing", IEEE
Cloud Computing, vol. 3, no. 4, pp. c2-c2, 2016. Available: 10.1109/mcc.2016.83.
[3] Rittinghouse, J.W. and Ransome, J.F., 2017. Cloud computing: implementation,
management, and security. CRC press.
[4] Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Applications, 75, pp.200-222.
[5] Rao, R.V. and Selvamani, K., 2015. Data security challenges and its solutions in cloud
computing. Procedia Computer Science, 48, pp.204-209.
[6] Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing:
Opportunities and challenges. Information sciences, 305, pp.357-383.
Reference:
[1] “Cloud Computing: Security Challenges & Encryption Practices”, Dr. A. Padmapriya,
P.Subhasri, International Journal of Advanced Research in Computer Science and Software
Engineering, Volume 3, Issue 3, March 2013, ISSN: 2277 128X, pp 225 – 229.
[2] "IEEE Cloud Computing Call for Papers Connecting Fog and Cloud Computing", IEEE
Cloud Computing, vol. 3, no. 4, pp. c2-c2, 2016. Available: 10.1109/mcc.2016.83.
[3] Rittinghouse, J.W. and Ransome, J.F., 2017. Cloud computing: implementation,
management, and security. CRC press.
[4] Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues,
threats, and solutions. Journal of Network and Computer Applications, 75, pp.200-222.
[5] Rao, R.V. and Selvamani, K., 2015. Data security challenges and its solutions in cloud
computing. Procedia Computer Science, 48, pp.204-209.
[6] Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing:
Opportunities and challenges. Information sciences, 305, pp.357-383.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.




