Analysis of Social Engineering, Host, and Cloud Security in IT Context

Verified

Added on  2022/09/29

|12
|4826
|26
Report
AI Summary
Document Page
Running head: REPORT ON INFORMATION TECHNOLOGY
REPORT
ON
INFORMATION TECHNOLOGY
Name of the Student
Name of the University
Author Note:
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1Information Technology
Assignment 2: Social Engineering
The aim of this paper is to discuss about social engineering. In order to briefly discuss
this aspect it will focus on discussing the definition of social engineering, impact of social
engineering as well as other fundamental aspects related to the application and the impact of
social engineering. Followed by this aspect this paper will also consist a detail elaboration on
the utilization of social engineering malicious attacks. Considering this it will also focus on
the ethical consideration of this aspect. Lastly, it will conclude by analysing the impact of
penetration testers with respect to the functionalities of social engineering.
Social Engineering-
In the field of computer security, malicious attacks caused by the human interaction is
termed as social engineering. In this case the criminals opt for manipulating the computer or
system users to make mistakes that must harm the security protocol of the system. Followed
by this aspect it has been noticed that occurrence of social engineering happens by
completing several steps which includes the determination of victim, analysis of victims
background and lastly it selects the most appropriate method to attack the victim.
Considering this aspect it has been noticed that social engineering it highly caused by
human mistakes as well as by the vulnerabilities of the computing systems.
Organizational Risk from social engineering-
After analysing the features and the functionalities of social engineering in the
organizational services it has been noticed that there it causes significant risk in the
organizational operations which includes the possibilities of data security vulnerability,
organizational data security as well as it holds a significant impact on the effectiveness of the
organizational services. Considering these aspects it has been noticed that in the corporate
environment or in another IT sectors the occurrence of social engineering attack will
significantly damage the working procedure as well as it will cause a huge risk related to the
organizational data security.
Social Engineering on data breach-
In the field of computing there is a significant risk of data breach present which is
caused by the leakage of confidential data as well as other important data. Those information
may include the leakage of bank data, military data or some data related to the government
operations which may have a huge impact on the population. Followed by this aspect it has
been noticed that the utilization of social engineering has a huge impact on the data breach,
since in the field of computing there are several social engineering attacks present which
invokes the data breach. Those attacks includes the phishing attack, pharming attacks as well
as the attacks via phone calls.
Reasons to fall for social engineering techniques-
After analysing the impact of social engineering in the organizational infrastructure it
has been noticed that there is a significant reason behind the success of social engineering
techniques. Considering this aspect it has been noticed that most of the social engineering
technique is based on the human interaction procedure hence, it has been noticed that there is
a huge impact of the human’s social obligation, curiosity as well as the naivety in which it
has been noticed that it is very easy to manipulate the victims with nice and humble
behaviour. Followed by this it has been also notice that as per the nature of human curiosity
and overconfidence due to which the hackers gets the success to manipulate people over an
interaction.
Prevention of social engineering attacks-
Document Page
2Information Technology
Considering the above mentioned aspects it has been also noticed that there are
several tips and tricks present which will help to reduce the possibilities of social engineering
attacks and will also help to prevent the computing field from those identified attacks. Those
tricks suggests not to open the malicious and unknown attachment or email, install
antimalware protection, utilize authenticate resources as well as consider all possible
protections while using internet.
Penetration testing on employ-
After analysing the impact as well as the functionalities of social engineering attacks
in the organisational field, it has been noticed that in this scope the penetration testing on the
employees plays an important role to detect whether an employ present in the organization
holds any possibilities of security breach. Followed by this aspect it can be stated that
considering the organizational aspect it is entirely fair as due to this they will get an idea
about the security vulnerabilities whereas, as per the aspects of the employ it is not fair
sometimes as due to application of pen testing a wrong person can be accused.
Ethics in penetration testing-
In case of the application of pen testing among the employ, it will be ethical if and
only if the pen tester followed the local law of individual’s security policy, it must not harm
any person or the assets of the organisation. Along with that it must follow the required
aspect as well as the employ must be aware of the fact that a pen testing is going to happen.
Considering the above aspects it has been also noticed that there is a huge impact of ethics in
a successful application of pen testing otherwise it will be considered as an unethical move.
Reflection-
As per the mentioned situation if I ever stuck into a situation where I have been
accused to violate the organizational rules and invoked the possibilities of social engineering
attacks I will surely try to explain my activities to the organizations higher authorities and I
will also explain my each and every activities present in the organizational network server.
Followed by this it will surely get rid of the accusation if I have done nothing wrong.
Grey hat hacker-
Followed by the above mentioned discussion it has been noticed that the in the
application of social engineering there is a huge impact of grey hat hacker as it has been
noticed that in the computing field grey hat hacker are violates the law of ethics however, it
does not holds the intention to significantly harm the victim. Followed by this aspect it has
been noticed that compared to the other hackers the impact of grey hat hackers are less
harmful.
Document Page
3Information Technology
Assignment 3: Host Security
After analysing the case scenario of MCTC it has been noticed that in this types of
educational institute there is huge impact of host security present as this institute has adopted
the IT infrastructure. Followed by this aspect it has been noticed that host security is highly
essential with the purpose to protect the network server from external threats, reduces the
impact of the attacks on the system as well as provides effective protection in case of any
problem occurs. Followed by this concern it has been noticed that a host based security layer
protects the departments from intrusion followed by which it will surely protect the digital
assets of MCTC. Considering this aspect a detail elaboration of the host security as well as
other fundamental practices on MCTC is provided in the list below:-
Security of Host computers at MCTC-
After investigation the IT infrastructure of the MCTC it has been noticed that the institute has
effectively incorporated the information technology infrastructure into the MCTC
infrastructure however, there are several security problems has been accounted which
includes the information security as well as the prevention from the external threats.
Followed by this aspect it has been noticed that in this case scenario the host computers are
not well secured as there is no such technology present which will prevent and protect the
host server present in the organizational server which holds the ability to protect the
organizational assets as well as the information present in the host from the external threats.
Followed by this aspect it has been also noticed that in this case there is a huge necessity of
utilizing the firewall protection and the other prevention methods to protect the MCTC’s host
server from data loss.
Host Security-
As mentioned in the above discussion in the IT infrastructure of the MCTC, the
network administrative has not provided effective solution to the host server after knowing
the fact that this may significantly damage the organizational data as well as the services.
Considering this aspect it has been noticed that in this scope the MCTC uses the basic
surveillance techniques to protect the host server however, considering the current growth of
technology it has been noticed that MCTC must uses effective host protection services with
the purpose to secure the services. Followed by this aspect it has been noticed that in this case
scenario there is a huge impact of security control processes in the host computers as it will
definitely help to enhance the security of MCTC as well as invoke the effectiveness of the IT
services.
Strength and weakness of MCTC host-
Considering the above mentioned discussion it has been noticed that in the MCTC
infrastructure there are several strength and weakness present with respect to the
organizations operations as well as the technological growth. After a thorough investigation a
detail of the strength and weaknesses of MCTC host computers are listed below:
Strength-
After analysing the IT infrastructure of MCTC it has been noticed that it holds of the
simplest institutional IT infrastructure which offers several services.
Followed by the above discussion it has been also noticed that MCTC has effectively
segregated its department with the purpose to minimize the complexity of the IT
services.
Weakness-
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4Information Technology
Followed by the above mentioned strengths there are several limitations present in the
operational field of MCTC host computers as it has been noticed that the host
computers does not have any effective security protocol which will reduce the
chances of external threats.
Along with the above aspects it has been also noticed that due to the less effective
host security protocol MCTC faces several significant issues related to the data loss as
well as less effective services of offered by the institute to its students.
Followed by this concern it has been also noticed that due to less effective host
security many time MCTC has experienced data loss. Hence, considering this aspect it
can be stated that being an educational institute the MCTC data server holds several
important information related to the students. However, due to less security those
information are on high security risk.
Information security controls-
Followed by the above discussion it has been noticed that there is a huge essentiality
of information security controls present in the IT infrastructure of MCTC. Considering this
aspect it has been noticed that there are three fundamental aspect of IT systems, those
includes the data integrity, availability as well as the confidentiality. In order to maintain
these three information fundamentals it has been noticed that it is essential to implement
effective intrusion detection protocols, along with this it has been noticed that there is a huge
necessity of data protection protocol as well as to avail effective data accessibility protocols
to the students. Followed by this aspect it can be stated that due to these incorporation the
data security of MCTC will be significantly increased.
Strength and weakness of present and absent host-
Followed by the above mentioned information protection controls it has been noticed
that due to these incorporation the Host server of MCTC will be protected from the external
threats as well as it protects the information transactions happens in the MCTC organizational
structure.
Recommendation-
Considering the above mentioned discussion it is recommended to adopt effective
host security technologies with the purpose to protect the operations of host servers. Followed
by this aspect it is recommend to implement effective network surveillance which will
monitor the network activities. Along with this it must incorporate effective IDS and IPS
systems which the purpose to detect and provides prevention to the suspicious activities of
MCTC host server. Followed by this aspect incorporation of firewall will also help to reduce
the IT threats present in this case scenario.
Document Page
5Information Technology
Assignment 4: Internet Content Filter
Internet content filter is a sort of practice blocking the access of web content which
holds the tendency to be dangerous, offensive as well as holds the inappropriate behaviour in
the organizational infrastructure. Followed by this aspect it has been noticed that in the field
of educational institute as well as other organizational aspect there is a huge necessity of
internet content filter with the purpose to enhance the productivity, safety as well as with the
purpose to enhance the appropriateness of the usage of internet content.
Internet content filter in educational institute and workplace-
Followed by the above mentioned aspect related to the application of internet content
filter in the educational institute like school, college, university as well as in the corporate
workplace it has been noticed that it holds a significant impact on the productivity as well as
in the appropriateness of the mentioned fields. Considering this aspect it has been noticed that
in the school, college, university they uses the features of internet content filters with the
purpose to restrict the pornographic contents as well as other content related to the
entertainment field. Along with this in the workplace it is also used to block the adult
contents, social media platforms as well as other contents related to the entertainment field
with the purpose to protect the resources, maintain the workplace environment as well as to
enhance the productivity.
Deplorers of the filters-
Considering the above mentioned application of the internet content filter it has been
noticed that there is a huge application of it in several operational fields. Followed by this
aspect it has been also noticed that the identified application is always deployed with the
concern of any authenticate sources which may include that administrator, principle as well
as other higher authorities who decides the contents which needs to be restricted as well as
followed by the permission of that authority the restriction will be applied to the internet
access.
Goals of the internet content filter-
Followed by the above discussion there is a significant goal present behind the
application of internet content filter into the infrastructure of the nominated operational field.
Those identified goals are listed below:
Restrict the internet access in some specific areas which will provide protection to the
organizational services as well as in the digital resources of the organization.
Followed by this aspect it has been also noticed that one of the most significant goal
present in the application of internet content filter is to invoke the productivity of the
organization which will significantly affect the effectiveness of the organization.
Along with this it holds the objective to protect the organizational infrastructure from
the other malicious activities in order to eliminate the possibilities of data breach.
Apart from the above mentioned goals, it has the objective to reduce the resource
usage with the purpose to maximize the utilization of organizational resources.
Security Advantages-
Considering the above mentioned benefits it has been noticed that there is huge
impact of internet content filter in the aspect of security. Those identified advantages are
listed below:
Enhances the internet security by reducing the access to the unknown websites.
Reduce the accessibilities to several irrelevant website which significantly reduces the
chances to attract threats in it.
Document Page
6Information Technology
Enhances the organizational data security by restricting the unauthorised access to the
organizational assets.
Benefits to the user-
Followed by the above aspects it has been also noticed that there are several benefits
of the internet content filter to its user which includes the aspect of providing the restriction
to waste required resources, provides enhancement in the organizational operation as well as
enhance the productivity of the organization. Considering this aspect it can be stated that it
holds a significant impact towards delivering most effective services to its users.
Disadvantages-
Followed by the above discussion it has been also noticed that along with the benefits
present in the features of internet content filter there are several other disadvantages has been
also accounted in this field. Those identified disadvantages are listed below:
Delay in the working process as it has been noticed that while applying the above
mentioned filter it will affect every one working in the workplace. Hence, it has been
noticed that it will cause a significant delay in work.
It bans banned as well as un-banned websites in the organizational infrastructure which
hampers the work flow of an organization.
In case of any accidental access there will be a significant delay.
Negative effects of the filters-
Followed by the above mentioned aspects it has been noticed that due to application
of internet content filter there are several user who will be negatively impacted. Those
includes the good employs present in the workplace as well as the bad workers. Considering
this aspect it can be stated that the good workers will suffer as their working speed will be
slow down and on the other hand the bad worker will suffer as they will not perform any
unethical activities into the organizational structure any more.
Responsible stakeholder-
Followed by the above discussion it has been noticed that the deciding factor is highly
important in the application of internet content filter as it will provide the accessibility limit
to the user of the organization. Hence, it is important to provide the authority to decide the
access limit to a responsible person. Considering this aspect it has been noticed that in the
field of educational institute the principle of the institute will have the authority to limit the
internet access and in the workplace the IT security manager will get the authority to limit the
internet access.
Internal and external factors-
The internal factors that affects the internet access limit are listed below:
Value of human resource.
Plans and the organizational policies.
Position of brand and corporate structure.
Organizational code of conduct.
The external factors that affects the internet access limit are listed below:
External security threats.
Enhancement in the productivity.
Enhancement in the security to the organizational data.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7Information Technology
Impact on the circumvent of the filters-
Considering this above aspects it has been noticed that if in case any individual avoids
the restriction of the internet content filters then the individual will be caught and the person
will get terminated or get punishment due to the violation of the internet access regulation.
Document Page
8Information Technology
Assignment 5: Cloud Security
Cloud Computing-
Cloud computing is one of the most trending services present in the recent computing
industries. Followed by this aspect it has been noticed that cloud computing offers several
services to the organizational through the utilization of internet. Followed by this aspect it has
been noticed that cloud computing holds the ability to provide the services to the private as
well as to private networks. Along with this feature it also offers several features like
information manipulation, accessibility, configuration as well as the effective data analysis.
Followed by this aspect it has been noticed that cloud computing works by proceeding with
the two different models which includes the cloud deployment model and the cloud service
models. In the cloud deployment model it has four classification that includes the public
cloud, private cloud, community cloud as well as the hybrid cloud. Whereas, in the service
models to cloud it holds the three types of deployment model that include the IaaS, PaaS and
the SaaS which helps to provide effective services to the user organization.
Security Advantages in cloud computing-
Followed by the above aspects it has been noticed that in the field of computing there
is a huge impact to cloud computing which offers effective advantages to the organizations
which enhances the security of the organization:
It protects the organization’s important information by increasing the security to the
information transactions as well as it provides the effective prevention from the third
party interruption to the organizational data.
Considering the above advantage offered by the cloud feature it has been noticed that
it provides effective solutions to protect the organizational data and the services from
the DDos attacks.
Followed by this aspect it also offers the effective security controls to the financial
data and the personal information of the organization as well, as it has the capability
to categorize the organizational data as per their level of priority.
Along with these features the scalability feature of cloud computing will help the
organization to increase the data protection as it has been noticed that due to storage
failure several cases of data loss happens.
Security risk in cloud computing-
Considering the above mentioned security feature of cloud computing, there are
several other aspect present in the application of cloud computing which impact the security
features of cloud infrastructure. Those identified features are the risk present in the cloud
infrastructure that are listed below:
However, there are several benefits offered by cloud computing it has been noticed
that cloud security it one of the most trending research topic which may hold a
significant impact on the data privacy.
Followed by the above mentioned risk it has been noticed that due to the adoption
of cloud computing into the organizational structure the possibilities of losing
intellectual property has been increased as after analysing several cloud
applications it has been observed that the cyber criminals get the access of the
important data vary easily.
Along with the above mentioned risks, the threat caused by the insider attack also
cannot be ignored.
Apart from the above mentioned risks it has been noticed that in the cloud
application field the impact of several malicious attacks has been significantly
Document Page
9Information Technology
increased which holds a major impact of the privacy and the security of the
organizational data.
Since, cloud computing utilizes the data analysis process hence sometimes the
confidentiality of the user data attracts high risk.
Cloud Computing failure:
After a thorough investigation on the cloud computing services it has been noticed
that there are several significant risk present in the application of cloud infrastructure.
Considering this aspect it has been noticed that in the previous year’s several cloud failure
has been noticed which holds a significant impact on the services of that nominated
organization. Followed by the above discussion the two of the most harmful cloud failure is
described below:
Salesforce Database failure- In the year 2016 Salesforce customers has faced an issue
while accessing their user account. Followed by this aspect it has been noticed that on the
9th day of May, the Salesforce database has got crashed and among those database centres
there is significance of cloud infrastructure. Considering this aspect it has been noticed
that it has been noticed that due to the cloud backup feature the organization was able to
restore the data however, due to major cloud database failure the data stored between the
time of 9:50 to 14:50 on the 9th day of May could be recovered as it during that period of
time the cloud infrastructure was not working. Followed by this concern it has been
noticed that due to this major data loss has been accounted which has impacted the data
protection of the Salesforce.
Followed by the above mentioned security vulnerability it has been also noticed that in the
year 2013 a huge data security vulnerability has been accounted which it has been noticed
that the application of cloud infrastructure into the health care services of US government
has significantly failed as after the implementation of the approached infrastructure as
users experienced several conflict related to the approached services offered by the
government of U.S. Considering this aspect it has been noticed that due to this conflict a
huge loss is entertained. After investigating the nominated case study it has been noticed
that due to less effective accountability as well as effective development the cloud system
failed which has also damages the important data of the patients as well as other
organizational data.
Hence, lastly it can be concluded that cloud computing offers several beneficial features to
the organizations however, in case of any conflict cloud may cause huge blunder to the
organizational services as well as with the organizational data. Thus, it is suggested to deploy
the cloud infrastructure with effective features as well as by maintaining the data security.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
10Information Technology
Bibliography:
Black, A., Pepper, S., & Bagshaw, K. (2017). Books, buildings and social engineering: Early
public libraries in Britain from past to present. Routledge.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing
and internet of things: a survey. Future generation computer systems, 56, 684-700.
Chen, X., Jiao, L., Li, W., & Fu, X. (2015). Efficient multi-user computation offloading for
mobile-edge cloud computing. IEEE/ACM Transactions on Networking, 24(5), 2795-
2808.
Fathollahi-Fard, A. M., Hajiaghaei-Keshteli, M., & Tavakkoli-Moghaddam, R. (2018). The
social engineering optimizer (SEO). Engineering Applications of Artificial
Intelligence, 72, 267-293.
Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Khan, S. U. (2015). The
rise of “big data” on cloud computing: Review and open research issues. Information
systems, 47, 98-115.
Hudis, E., Helman, Y., Malka, J., & Barash, U. (2015). U.S. Patent No. 8,959,568.
Washington, DC: U.S. Patent and Trademark Office.
Kester, H., Ruskin, D., Lee, C., & Anderson, M. (2016). U.S. Patent No. 9,503,423.
Washington, DC: U.S. Patent and Trademark Office.
Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering
attacks. Journal of Information Security and applications, 22, 113-122.
Document Page
11Information Technology
Lee, M., Song, J., Cho, K., Pack, S., Kangasharju, J., & Choi, Y. (2015). Content discovery
for information-centric networking. Computer Networks, 83, 1-14.
LOPEZ, C. V., & Royon, Y. (2017). U.S. Patent No. 9,762,490. Washington, DC: U.S.
Patent and Trademark Office.
Mogire, E. (2016). Victims as security threats: Refugee impact on host state security in
Africa. Routledge.
Nelms, T., Perdisci, R., Antonakakis, M., & Ahamad, M. (2016). Towards measuring and
mitigating social engineering software download attacks. In 25th {USENIX} Security
Symposium ({USENIX} Security 16) (pp. 773-789).
Rimmer, M. (2019). Australia's Stop Online Piracy Act: Copyright Law, Site-Blocking, and
Search Filters in an Age of Internet Censorship. The Canberra Law Review,
Forthcoming.
Rittinghouse, J. W., & Ransome, J. F. (2017). Cloud computing: implementation,
management, and security. CRC press.
Satyanarayanan, M., Simoens, P., Xiao, Y., Pillai, P., Chen, Z., Ha, K., ... & Amos, B.
(2015). Edge analytics in the internet of things. IEEE Pervasive Computing, 14(2),
24-31.
chevron_up_icon
1 out of 12
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]