UK
+44 203 8681 671
Get App :
Get the Biggest Deal Ever - Lowest guaranteed price across the globe. Get upto 50% off ! Book Now
Toll Free UK:+44 203 8681 671

Demonstration of a network security tool

  • Free Turnitin report
  • 4,00000 + Total Satisfied Students
  • 150+ Executives for Support Service
4.9

Get Assignments at the Lowest Price Guaranteed

A Concept Analysis of Network Security

1666 Downloads 4 Pages 1052 Words

Abstract

A growing concern of security is continually rising with a rising technical measure in the business operations of varied organizations. It is a principle agenda of most of the establishments who are merged with several online activities to maintain a safe and secured arrangement of transactions that will be carried out while the transition of goods and services (Viswanathan, 2017). The below report is based on a similar instance to overview a prime agenda of network security by referring to a realistic case study of Amazon. It is with a fundamental consent of discoursing upon their employed tact of cloud security to measure their affiliated services and risk on their projected cloud services. Amazon is a profound participant of UK's internet industry where they are successfully operating in the field of E-commerce since last 23 years.

Guarantees Beyond Your Imagination

ORDER NOW
  • Money-Back Guarantee
  • Unlimited Amendments
  • Ownership Guarantee
  • Individual Attention

LITERATURE

Cloud networking is a relative prospect of cloud computing where it tends to define the access of varied networking resources from a centralized third party provider by using yet another provision of wide area networking (WAN) or any other internet based techniques. Bradley (2014) has at this moment stated it to be an attentive tact in which the centralized resources of computing are at this moment shared for the clients and users. It at this moment requires a more urging trend of proposing some more administration of network functions into the overall system of cloud computing where it can, in turn, assist in referring to fewer customer devices for managing the entire set of the network. Rashid (2016) has at this moment emphasized upon some leading security threats while adopting the tact of cloud computing with a foremost danger of data breach. It is basically due to a vast storage of information on the cloud servers where such risks are also dependent on the sensitivity of the unprotected data. Such perils are evident to make a terrible impact on the brand image of the organizations where it is their chief responsibility to themselves safeguard their accessible data on the network.

In context to which, Westervelt (2013) have at this moment suggested them to implicate multi-factor modes of validation by together using certain measures of encryption to eliminate the possibility of data breaches. It is with an argued clause of its several assistive means where cloud computing is a cost-efficient way of storing limitless data with some proficient ways of backup and data retrieval. Bradley (2014) has argued over the relative pro's of cloud computing by illuminating its varied technical issues where it is much inclined to make extraneous attacks. It is thereby important for the enterprises adopting this method to deflect the storage of any sensitive information on their cloud networks. Apart from which, they are together advised to be extremely sincere about their passwords with a tactful use of user agreements to accurately determine the way in which the direction of storage in their cloud computing network is recommended.

BUSINESS CASE

This is mainly concerning an undertaken case study of Amazon where it has specified some pertinent measures of their undertaken cloud security by precisely outlining its related services and risks (Barron, Yu and Zhan, 2013). Concerning which, the cloud storage of Amazon is composed of total three distinct challenges regarding its security concerns that involve a foremost consideration of outsourcing, multi- tenancy and massive data with intensive computation. It is along with its four risks allied to its general server that are the denial of service (DOS), the Key loss that is also termed as data unencrypted, data or power loss and integrity of data.

A recent illustration of Amazon has been discussed over here where it has fallen into the prey of account hijacking. It was a fundamental cause of concern in the year 2010 when the hijackers were proven to execute a cross- site scripting which is also known as XSS attack (Mosca and et. al., 2014). This was done to acquire certain credentials of Amazon's site that was successfully attained by the hijackers with a subsequent infiltration of Amazon's Relational Database (RDS) to preserve the back-end of their system on losing their primary access. By which, the attackers have at this moment obtained the login information of all their clients and users on their first click on Amazon's homepage.

Running on a Low Budget?

Get 25% Flat Discount on Each Order + 5% Extra By Placing Through App

Place Your Order

ANALYSIS

This is on analyzing the above-referred case study of Amazon that has clearly indicated a serious peril of account hijacking on adopting the measures of cloud computing. On whose context, a reliable implication of Cloud Security Alliance (CSA) has been proposed over here as a mean of blocking any such violations (Ivey, 2013). It is along with some multi-factor requisitions of verifications that in turn makes a difficult usage of the system with an exceeding cost of such arrangements. It together makes the system relatively slower than the previous measures of usage with a leading burden of multi-factor certification on the users.

CONCLUSION

It is on summarizing the above-carried evaluation that has directly indicated the companies like Amazon and other analogous ventures like Facebook and Twitter, etc., to use some authentic measures to avoid any such possibility of risks in their employed systems. It is with a fundamental assistance of multi-factor authentication system that in turn postulates the organizations to either establish secure channels or refer to hire a third party to interact with the users and the service providers. Both these tactics represent an equally expensive undertaking to prohibit the users and service providers to directly share their credentials.

A recent illustration of Amazon has been discussed over here where it has fallen into the prey of account hijacking. It was a fundamental cause of concern in the year 2010 when the hijackers were proven to execute a cross- site scripting which is also known as XSS attack (Mosca and et. al., 2014). This was done to acquire certain credentials of Amazon's site that was successfully attained by the hijackers with a subsequent infiltration of Amazon's Relational Database (RDS) to preserve the back-end of their system on losing their primary access. By which, the attackers have at this moment obtained the login information of all their clients and users on their first click on Amazon's homepage.

Download Full Sample

ARE YOU READY? GET IT NOW

Please enter valid details to complete your request.

  • img
X
Instant Assignment Help is a renowned academic writing service provider that is committed to provide the best writing assistance to students around the globe at budget-friendly prices. Hundreds of students reach to us every day and ask for help with writing their assignments, dissertations, theses, case studies, essays, and other academic papers. Moreover, they seek our experts’ advice in choosing the best topics, structuring ideas, collecting relevant data, and revising their papers. Once you avail our writing services, you will notice a huge difference in your grades!
Most Downloaded Samples
 

Loading...
£ 5.29
Assignment Subject

Call Us for Live Assistance

It’s time to turn to our experts for assignment writing service.

Live Chat Order Now
No matter where you’re from, your dream of top grades will be achieved here!
Exciting Deals & offers on our AppInstall Now
Price Calculator