Lowest guaranteed price across the globe. Get upto 50% off ! Book Now

Demonstration of a network security tool

Abstract

A growing concern of security is continually rising with a rising technical measure in the business operations of varied organizations. It is a principle agenda of most of the establishments who are merged with several online activities to maintain a safe and secured arrangement of transactions that will be carried out while the transition of goods and services (Viswanathan, 2017). The below report is based on a similar instance to overview a prime agenda of network security by referring to a realistic case study of Amazon. It is with a fundamental consent of discoursing upon their employed tact of cloud security to measure their affiliated services and risk on their projected cloud services. Amazon is a profound participant of UK's internet industry where they are successfully operating in the field of E-commerce since last 23 years.

Guarantees Beyond Your Imagination

ORDER NOW
  • Money-Back Guarantee
  • Unlimited Amendments
  • Ownership Guarantee
  • Individual Attention

LITERATURE

Cloud networking is a relative prospect of cloud computing where it tends to define the access of varied networking resources from a centralized third party provider by using yet another provision of wide area networking (WAN) or any other internet based techniques. Bradley (2014) has at this moment stated it to be an attentive tact in which the centralized resources of computing are at this moment shared for the clients and users. It at this moment requires a more urging trend of proposing some more administration of network functions into the overall system of cloud computing where it can, in turn, assist in referring to fewer customer devices for managing the entire set of the network. Rashid (2016) has at this moment emphasized upon some leading security threats while adopting the tact of cloud computing with a foremost danger of data breach. It is basically due to a vast storage of information on the cloud servers where such risks are also dependent on the sensitivity of the unprotected data. Such perils are evident to make a terrible impact on the brand image of the organizations where it is their chief responsibility to themselves safeguard their accessible data on the network.

In context to which, Westervelt (2013) have at this moment suggested them to implicate multi-factor modes of validation by together using certain measures of encryption to eliminate the possibility of data breaches. It is with an argued clause of its several assistive means where cloud computing is a cost-efficient way of storing limitless data with some proficient ways of backup and data retrieval. Bradley (2014) has argued over the relative pro's of cloud computing by illuminating its varied technical issues where it is much inclined to make extraneous attacks. It is thereby important for the enterprises adopting this method to deflect the storage of any sensitive information on their cloud networks. Apart from which, they are together advised to be extremely sincere about their passwords with a tactful use of user agreements to accurately determine the way in which the direction of storage in their cloud computing network is recommended.

BUSINESS CASE

This is mainly concerning an undertaken case study of Amazon where it has specified some pertinent measures of their undertaken cloud security by precisely outlining its related services and risks (Barron, Yu and Zhan, 2013). Concerning which, the cloud storage of Amazon is composed of total three distinct challenges regarding its security concerns that involve a foremost consideration of outsourcing, multi- tenancy and massive data with intensive computation. It is along with its four risks allied to its general server that are the denial of service (DOS), the Key loss that is also termed as data unencrypted, data or power loss and integrity of data.

A recent illustration of Amazon has been discussed over here where it has fallen into the prey of account hijacking. It was a fundamental cause of concern in the year 2010 when the hijackers were proven to execute a cross- site scripting which is also known as XSS attack (Mosca and et. al., 2014). This was done to acquire certain credentials of Amazon's site that was successfully attained by the hijackers with a subsequent infiltration of Amazon's Relational Database (RDS) to preserve the back-end of their system on losing their primary access. By which, the attackers have at this moment obtained the login information of all their clients and users on their first click on Amazon's homepage.

Running on a Low Budget?

Get 25% Flat Discount on Each Order + 5% Extra By Placing Through App

Place Your Order

ANALYSIS

This is on analyzing the above-referred case study of Amazon that has clearly indicated a serious peril of account hijacking on adopting the measures of cloud computing. On whose context, a reliable implication of Cloud Security Alliance (CSA) has been proposed over here as a mean of blocking any such violations (Ivey, 2013). It is along with some multi-factor requisitions of verifications that in turn makes a difficult usage of the system with an exceeding cost of such arrangements. It together makes the system relatively slower than the previous measures of usage with a leading burden of multi-factor certification on the users.

CONCLUSION

It is on summarizing the above-carried evaluation that has directly indicated the companies like Amazon and other analogous ventures like Facebook and Twitter, etc., to use some authentic measures to avoid any such possibility of risks in their employed systems. It is with a fundamental assistance of multi-factor authentication system that in turn postulates the organizations to either establish secure channels or refer to hire a third party to interact with the users and the service providers. Both these tactics represent an equally expensive undertaking to prohibit the users and service providers to directly share their credentials.

A recent illustration of Amazon has been discussed over here where it has fallen into the prey of account hijacking. It was a fundamental cause of concern in the year 2010 when the hijackers were proven to execute a cross- site scripting which is also known as XSS attack (Mosca and et. al., 2014). This was done to acquire certain credentials of Amazon's site that was successfully attained by the hijackers with a subsequent infiltration of Amazon's Relational Database (RDS) to preserve the back-end of their system on losing their primary access. By which, the attackers have at this moment obtained the login information of all their clients and users on their first click on Amazon's homepage.

Download Full Sample
Cite This Work To export references to this Sample, select the desired referencing style below:
Copy to Clipboard
Copy to Clipboard
Copy to Clipboard
Copy to Clipboard
Instant Assignment Help. [Internet]. Instant Assignment Help.(2024), Retrieved from: https://www.instantassignmenthelp.com/free-samples/computer-science/demonstration-of-a-network-security-tool
Copy to Clipboard
Boost Grades & Leave Stress

Share Your Requirements Now for Customized Solutions.

Lowest Price

USD6.27

    FOR FIRST ORDER GET EXTRA 25% OFF

    Seasonal seasonal-mobile

    Our unique Features

    24/7 Customer Support

    100% Customer Satisfaction

    No Privacy Infringement

    Quick Services

    Subject Experts

    Innovative Documents

    100+ Qualified Writers

    For Best (Accounting) Assignment Help

    Rupert Radcliff
    321 - Completed Orders
    Rupert RadcliffView Profile Hire Me
    David Hamilton
    315 - Completed Orders
    David HamiltonView Profile Hire Me
    Kylie Novak
    1789 - Completed Orders
    Kylie NovakView Profile Hire Me
    Ashly James
    2453 - Completed Orders
    Ashly JamesView Profile Hire Me
    View All Writers
     
    IAH whatsapp

    Limited Time Offer

    Exclusive Library Membership + FREE Wallet Balance