Network Security Tool Demonstration

Verified

Added on  2020/02/12

|6
|1288
|45
Report
AI Summary
This report discusses the importance of network security, particularly in the context of cloud computing, using Amazon as a case study. It highlights various security threats, including account hijacking, and suggests measures such as multi-factor authentication to mitigate risks. The report emphasizes the need for organizations to adopt robust security practices to protect sensitive data in cloud environments.
Document Page
Demonstration of a
network security tool
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
TABLE OF CONTENT
ABSTRACT.....................................................................................................................................1
LITERATURE.................................................................................................................................1
BUSINESS CASE...........................................................................................................................2
ANALYSIS......................................................................................................................................2
CONCLUSION................................................................................................................................3
REFERENCES................................................................................................................................4
Document Page
ABSTRACT
A growing concern of security is continually rising with a rising technical measure in the
business operations of varied organizations. It is a principle agenda of most of the establishments
who are merged with several online activities to maintain a safe and secured arrangement of
transactions that will be carried out while the transition of goods and services (Viswanathan,
2017). The below report is based on a similar instance to overview a prime agenda of network
security by referring to a realistic case study of Amazon. It is with a fundamental consent of
discoursing upon their employed tact of cloud security to measure their affiliated services and
risk on their projected cloud services. Amazon is a profound participant of UK's internet industry
where they are successfully operating in the field of E-commerce since last 23 years.
LITERATURE
Cloud networking is a relative prospect of cloud computing where it tends to define the access
of varied networking resources from a centralized third party provider by using yet another
provision of wide area networking (WAN) or any other internet based techniques. Bradley
(2014) has at this moment stated it to be an attentive tact in which the centralized resources of
computing are at this moment shared for the clients and users. It at this moment requires a more
urging trend of proposing some more administration of network functions into the overall system
of cloud computing where it can, in turn, assist in referring to fewer customer devices for
managing the entire set of the network. Rashid (2016) has at this moment emphasized upon some
leading security threats while adopting the tact of cloud computing with a foremost danger of
data breach. It is basically due to a vast storage of information on the cloud servers where such
risks are also dependent on the sensitivity of the unprotected data. Such perils are evident to
make a terrible impact on the brand image of the organizations where it is their chief
responsibility to themselves safeguard their accessible data on the network.
In context to which, Westervelt (2013) have at this moment suggested them to implicate
multi-factor modes of validation by together using certain measures of encryption to eliminate
the possibility of data breaches. It is with an argued clause of its several assistive means where
cloud computing is a cost-efficient way of storing limitless data with some proficient ways of
backup and data retrieval. Bradley (2014) has argued over the relative pro's of cloud computing
by illuminating its varied technical issues where it is much inclined to make extraneous attacks.
1
Document Page
It is thereby important for the enterprises adopting this method to deflect the storage of any
sensitive information on their cloud networks. Apart from which, they are together advised to be
extremely sincere about their passwords with a tactful use of user agreements to accurately
determine the way in which the direction of storage in their cloud computing network is
recommended.
BUSINESS CASE
This is mainly concerning an undertaken case study of Amazon where it has specified some
pertinent measures of their undertaken cloud security by precisely outlining its related services
and risks (Barron, Yu and Zhan, 2013). Concerning which, the cloud storage of Amazon is
composed of total three distinct challenges regarding its security concerns that involve a
foremost consideration of outsourcing, multi- tenancy and massive data with intensive
computation. It is along with its four risks allied to its general server that are the denial of service
(DOS), the Key loss that is also termed as data unencrypted, data or power loss and integrity of
data.
A recent illustration of Amazon has been discussed over here where it has fallen into the prey of
account hijacking. It was a fundamental cause of concern in the year 2010 when the hijackers
were proven to execute a cross- site scripting which is also known as XSS attack (Mosca and et.
al., 2014). This was done to acquire certain credentials of Amazon's site that was successfully
attained by the hijackers with a subsequent infiltration of Amazon's Relational Database (RDS)
to preserve the back-end of their system on losing their primary access. By which, the attackers
have at this moment obtained the login information of all their clients and users on their first
click on Amazon's homepage.
ANALYSIS
This is on analyzing the above-referred case study of Amazon that has clearly indicated a
serious peril of account hijacking on adopting the measures of cloud computing. On whose
context, a reliable implication of Cloud Security Alliance (CSA) has been proposed over here as
a mean of blocking any such violations (Ivey, 2013). It is along with some multi-factor
requisitions of verifications that in turn makes a difficult usage of the system with an exceeding
cost of such arrangements. It together makes the system relatively slower than the previous
measures of usage with a leading burden of multi-factor certification on the users.
2
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
CONCLUSION
It is on summarizing the above-carried evaluation that has directly indicated the companies like
Amazon and other analogous ventures like Facebook and Twitter, etc., to use some authentic
measures to avoid any such possibility of risks in their employed systems. It is with a
fundamental assistance of multi-factor authentication system that in turn postulates the
organizations to either establish secure channels or refer to hire a third party to interact with the
users and the service providers. Both these tactics represent an equally expensive undertaking to
prohibit the users and service providers to directly share their credentials.
3
Document Page
REFERENCES
Barron, C., Yu. H. and Zhan. J., 2013. Cloud Computing Security Case Studies and Research.
[PDF]. Available through:
<http://www.iaeng.org/publication/WCE2013/WCE2013_pp1287-1291.pdf> [Accessed
on 06th February 2017].
Bradley, T., 2014. Insecure.org Top 100 Network Security Tools. [Online]. Available through:
<https://www.lifewire.com/insecure-org-top-100-network-security-tools-2487293>
[Accessed on 06th February 2017].
Ivey, V., 2013. 5 Tips to Keep Your Data Secure on the Cloud. [Online]. Available through:
<http://www.cio.com/article/2380182/cloud-security/5-tips-to-keep-your-data-secure-on-
the-cloud.html> [Accessed on 06th February 2017].
Mosca, P. and et. al., 2014. Cloud Security: Services, Risks, and a Case Study on Amazon Cloud
Services. [PDF]. Available through:
<http://file.scirp.org/pdf/IJCNS_2014122416030507.pdf> [Accessed on 06th February
2017].
Rashid, F. Y., 2016. The dirty dozen: 12 cloud security threats. [Online]. Available through:
<http://www.infoworld.com/article/3041078/security/the-dirty-dozen-12-cloud-security-
threats.html> [Accessed on 06th February 2017].
Viswanathan, P., 2017. Cloud Computing and Is it Really All That Beneficial? [Online].
Available through: <https://www.lifewire.com/cloud-computing-explained-2373125>
[Accessed on 06th February 2017].
Westervelt, R., 2013. Protecting Data In The Cloud: 10 Top Security Measures. [Online].
Available through: <http://www.crn.com/slide-shows/security/240157708/protecting-
data-in-the-cloud-10-top-security-measures.htm/pgno/0/2?itc=refresh> [Accessed on 06th
February 2017].
4
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]