NIT5140 Information Security: Apple iCloud Cloud Network Breach

Verified

Added on  2023/06/03

|3
|675
|267
Case Study
AI Summary
This case study delves into the high-profile cloud security breach suffered by Apple's iCloud, focusing on the compromise in the storage area of its cloud network. The breach led to the leakage of users' private documents, significantly impacting the service's reputation and user trust. The analysis highlights the critical importance of data security in cloud networks and emphasizes that security breaches, whether inevitable or due to negligence, can have severe consequences. The organization's response included recommending stronger passwords and implementing a notification system for suspicious activities. The study concludes that consistent monitoring and proper utilization of security measures are essential to prevent such breaches, reinforcing the need for ongoing research and development in cloud network security. Desklib offers a wealth of resources, including past papers and solved assignments, to aid students in understanding complex topics like cloud security.
Document Page
Cloud Network
*Note: Sub-titles are not captured in Xplore and should not be used
XXX-X-XXXX-XXXX-X/XX/$XX.00 ©20XX IEEE
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Abstract— The case study which would be focused is the
Apple iCloud case which had directly suffered a high profile
clouds security breach due to the different victim involved
into the concept. The security breach which was conducted
in the cloud network due to the compromise in the storage
area which was used by the organization. The event had
majorly impacted the data which would save in the concept
which lead to security breach. The security of the data can
be considered as a crucial factor which play a vital role in
the working of the organization.
Keywords—cloud security, data, mitigation plan
I. LITERATURE REVIEW
According to ([1]) the concept of the cloud
computing can be stated as one of the area of
implementation within the working of the organization.
There are different types of breaches which can occur within
the concept of the data which is saved within the concept.
As stated by ([2]) there can be two types of breaches one is
the inevitable and other is due to the lack of engagement
into the concept. The cloud network has some predefined
security aspects involved into the working but it can be
stated that security breaches cannot be pre identified and
ignored. In the ([3]) it is stated that the concept of the
identification of risk factor is very much crucial and it
should be focused that the risk factor do not get included
into the network of the cloud so that security of the data and
the integrity of the data would be prevailing into the
concept.
II. BUSINESS CASE
The main case study instance which can be seen is related to
the concept of the cloud computing breach relating to the
organization Apple. The main impact which is related to the
case study is that various private document of the user were
leaked which impacted the overall service which was given
to the users.
III. ANALYSIS OF THE CASE STUDY
According to the event which can be seen in the
case study it was thought that the user’s device was hacked
which had leaked different data which was stored in it ([4].)
But the main event which lead to the sector of the data
leakage was the iCloud service which was the organization
used for the storage was compromised. The main solution
which was given from the end of the organization towards
the user was the deployment of a stronger password and
introduction of a system of notification that would be
directly sending alerts whenever there would be a suspicious
activity detected within the working of the system.
IV. CONCLUSION
The report can be concluded on a note that security
breaches in different sector of network can be ignored if
proper utilization of the different factors and monitoring of
the system is done properly. The cloud network is in the
verge of research and in the near future it would be
definably playing a more secured role.
REFERENCES
[1] Almorsy, Mohamed, John Grundy, and Ingo Müller. "An
analysis of the cloud computing security problem." arXiv
preprint arXiv:1609.01107 (2016).
[2] He, Xiangjian, et al. "Improving cloud network security
using the Tree-Rule firewall." Future generation computer
systems30 (2014): 116-126.
[3] Perlman, Radia, Charlie Kaufman, and Mike
Speciner. Network security: private communication in a
public world. Pearson Education India, 2016.
[4] aRittinghouse, John W., and James F. Ransome. Cloud
computing: implementation, management, and security.
CRC press, 2016.
Document Page
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]