Wednesday, December 18, 2019

Analysis Of Cloud Computing And Cyber Security - 1695 Words

CLOUD COMPUTING AND NETWORK SECURITY ISSUES(Z5140305) Executive Summary In this fast-paced technology era, organizations are always looking for new innovative ways to increase productivity and efficiency. One emerging technology adopted by many organisations is cloud computing. Cloud computing is a model that uses internet and remote servers for maintaining data and applications (Association of Modern Technologies Professionals 2017). It replaces expensive infrastructure and need of maintenance. Cloud provides access to data anytime, anywhere over the internet. However, like any cyber technology cloud computing is vulnerable to various kinds of cyber-attacks (Amna Riaz 2017). The large scale of cloud computing and virtualization†¦show more content†¦HIDS and NIDS have their own strength and limitations. HIDS is not well suited to provide visibility in the Virtual machines (VMs) (Amna Riaz 2017). NIDS can be employed within the Virtual machines but would be incapable of detecting attacks occurring within the network (C. Modi 2013, p.49). Various other techniques have been studied where NIDS can be provided at the Virtual switch to collects inbound and outbound traffic from all VMs and log it. Use of security onion tools such as SNORT could help to detect DoS or DDoS attack. However, processing all packets in large virtual network could create issue and it may fail to detect attacks in time (Amna Riaz 2017). Using OSSEC as HIDS in the cloud computing could help to resolve analysing and integrating the huge log files. OSSEC is an open source host-based intrusion detection system (HIDS). It has a powerful association and analysis mechanism, active response and real-time alerting (C. Ambikavathi and S. K. Srivatsa 2016, p. 4). Software-defined networking (SDN) is next evolving technology for the cloud computing as it provides a centralized system to manage the network. Scalable monitoring and dynamic reconfiguration requirements of the network makes SDN a perfect choice (Amna Riaz 2017). Our aim in this document is to provide an informative primer on security issues of the cloud computing and various IDS tools to combat the security issues. We concluded the document after analysing that every process has itsShow MoreRelatedImpact Of Legislation On State Of Maryland1210 Words   |  5 Pagesthis paper is to research and evaluate the legislative drivers for information security programs of State of Maryland in order to improve the information security policy to prevent loss of the confidentiality, integrity and availability of agency operations, organizational assets or individuals with new amendments in legislation. This paper elaborates the objectives of five proposals that would impact the information security policy of the State of Maryland upon becoming legislation. State of MarylandRead MoreCyber Security : A New Form Of Crime1594 Words   |  7 Pages Cyber Security is considered to be one of the hot topics in modern era. It is a national security challenge that the United States and other countries face today. Cyber Security is an important factor to be considered if one is to be able to protect oneself from malicious people and software from the internet. While the Internet has been providing immense opportunities to individuals, organizations, and nations in diverse areas, at the same time it has also given birth to a new form of crime – cybercrimeRead MoreVirtual Machine Intrusions939 Words   |  4 Pagescontinues to work unaffectedly even in the presence of an intrusion. This capability is missing in HIDS and NIDS. In the case of a compromise, HIDS starts reporting falsely while NIDS has limited visibility (Amna Riaz 2017). Analysis of Intrusions Detection tools for Cloud Computing Each IDS technique has its own strengths and limitations. HIDS deployed on a virtual machine comes with the inherent flaw of low attack resistance (). It provides good visibility into the system; however, a HIDS on theRead MoreCloud Based Solutions for Computer Aided Engineering804 Words   |  3 PagesCloud Based Solutions for Computer Aided Engineering As cloud computing and services become increasing popular, companies like Autodesk and Ciespace are providing cloud based solutions for computer-aided engineering (CAE). The various computer software used to aid in engineering simulation and analysis tasks will be provided as a services. The cloud based CAE have various advantages over non-cloud based CAE. It is more convenient, cheaper and efficient. Cloud based CAE is more convenient, as it allowsRead MoreMarketing Analysis : Diamond Security1576 Words   |  7 Pages DIAMOND SECURITY CONSULTANTS Mohammad Iqbal Saint Leo University FL COM-514 EXECUTIVE SUMMARY Diamond Security Consultants provides Cyber Security training and Education to companies specifically in User Awareness training against the social engineering attacks and mechanism in ten countries across the world and expanding specifically in the Middle East. Our offices need to communicate through the professional email account with our business domain and video conferencing onRead MoreInternal Controls And Audit Procedures For Cloud Computing1350 Words   |  6 PagesIntroduction The popularity of cloud computing has dramatically increased because it is so easy to implement and can be a more cost effective way to provide remote access to corporate data. Since the hardware and software is owned by a third party, the upgrade and maintenance costs are the responsibility of the third party and this can be a significant gain for business that no longer have to absorb those costs. Even though cloud computing seems to be more cost effective than having those servicesRead MoreGovernmental Support For Cyber Physical System Research1006 Words   |  5 PagesGovernmental Support for Cyber Physical System Research Cyber Physical Systems research has garner support from several sectors within the public and private sector. NITRD has supported CPS SSG ( Senior Steering Groups) that supports Research and development (RD), budgets , policy endorsements, Joint planning program, and training CPS works in coordination with academia. Other activities perform with CP SSG is recommendation for Federal CPS RD priorities. CPS coordinate with otherRead MoreCloud Computing1303 Words   |  6 PagesCloud Computing CIS 500 August 28, 2012 Introduction The world is turning to cloud computing to manage data. Businesses are at the forefront of this new trend with companies such as Google, Amazon, Microsoft, and others leading the way by providing these services. What exactly is cloud computing? According to Turban amp; Volonino (2011), cloud computing is Internet- based computing in which shared resources (such as hard drives for storage) and software apps are provided to computers andRead MoreSecurity Enhancement Strategies And Strategies1660 Words   |  7 Pages VI. SECURITY ENHANCEMENT STRATEGIES: Some of the strategies and defensive measures that can be incorporated in the cloud environment to overcome the threats and challenges mentioned in the above section are as follows. In order to provide protection to the computer system and to the network, Intrusion Detection System (IDS) could be employed, which will detect hostile activities in the host or network and generates alerts to provide notifications regarding such malicious intrusions. IDS also hasRead MoreRisk Assessment Is The Top Priority For Any Type Is Impenetrable1671 Words   |  7 Pagesare very vulnerable to any holes that are within its infrastructure. In fact, many may believe that they have the best security measures in place, but no system or network of any type is impenetrable (Trim Lee, 2014). Risk assessments are extremely necessary so that corrective countermeasures can be applied and overall security can be enhanced (Broder Tucker, 2011). Security should ensure that this is the top priority for any company or organization. A detailed risk assessment shows which policies

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.