Free Samples
NIT5140 Information Security
.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}
NIT5140 Information Security
0 Download3 Pages / 565 Words
Course Code: NIT5140
University: Victoria University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Question:
To develop skills to independently think of a situation and apply skills to analyze complex problems in network security under supervision. In this task, students will analyze a recent case in a chosen field. Based on his/her analysis, the student will find out the causes of the breach and will provide a plausible theoretical solution to resolve the case
Answer:
The case study which would be focused is the Apple iCloud case which had directly suffered a high profile clouds security breach due to the different victim involved into the concept. The security breach which was conducted in the cloud network due to the compromise in the storage area which was used by the organization. The event had majorly impacted the data which would save in the concept which lead to security breach. The security of the data can be considered as a crucial factor which play a vital role in the working of the organization.
Keywords—cloud security, data, mitigation plan
Literature review
According to ([1]) the concept of the cloud computing can be stated as one of the area of implementation within the working of the organization. There are different types of breaches which can occur within the concept of the data which is saved within the concept. As stated by ([2]) there can be two types of breaches one is the inevitable and other is due to the lack of engagement into the concept. The cloud network has some predefined security aspects involved into the working but it can be stated that security breaches cannot be pre identified and ignored. In the ([3]) it is stated that the concept of the identification of risk factor is very much crucial and it should be focused that the risk factor do not get included into the network of the cloud so that security of the data and the integrity of the data would be prevailing into the concept.
Business case
The main case study instance which can be seen is related to the concept of the cloud computing breach relating to the organization Apple. The main impact which is related to the case study is that various private document of the user were leaked which impacted the overall service which was given to the users.
Analysis of the case study
According to the event which can be seen in the case study it was thought that the user’s device was hacked which had leaked different data which was stored in it ([4].) But the main event which lead to the sector of the data leakage was the iCloud service which was the organization used for the storage was compromised. The main solution which was given from the end of the organization towards the user was the deployment of a stronger password and introduction of a system of notification that would be directly sending alerts whenever there would be a suspicious activity detected within the working of the system.
Conclusion
The report can be concluded on a note that security breaches in different sector of network can be ignored if proper utilization of the different factors and monitoring of the system is done properly. The cloud network is in the verge of research and in the near future it would be definably playing a more secured role.
References
[1] Almorsy, Mohamed, John Grundy, and Ingo Müller. “An analysis of the cloud computing security problem.” arXiv preprint arXiv:1609.01107 (2016).
[2] He, Xiangjian, et al. “Improving cloud network security using the Tree-Rule firewall.” Future generation computer systems30 (2014): 116-126.
[3] Perlman, Radia, Charlie Kaufman, and Mike Speciner. Network security: private communication in a public world. Pearson Education India, 2016.
[4] aRittinghouse, John W., and James F. Ransome. Cloud computing: implementation, management, and security. CRC press, 2016.
Free Membership to World’s Largest Sample Bank
To View this & another 50000+ free samples. Please put
your valid email id.
Yes, alert me for offers and important updates
Submit
Download Sample Now
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
UploadUnique Document
DocumentUnder Evaluation
Get Moneyinto Your Wallet
Total 3 pages
PAY 2 USD TO DOWNLOAD
*The content must not be available online or in our existing Database to qualify as
unique.
Cite This Work
To export a reference to this article please select a referencing stye below:
APA
MLA
Harvard
OSCOLA
Vancouver
My Assignment Help. (2020). Information Security. Retrieved from https://myassignmenthelp.com/free-samples/nit5140-information-security/cloud-computing.html.
“Information Security.” My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/nit5140-information-security/cloud-computing.html.
My Assignment Help (2020) Information Security [Online]. Available from: https://myassignmenthelp.com/free-samples/nit5140-information-security/cloud-computing.html[Accessed 18 December 2021].
My Assignment Help. ‘Information Security’ (My Assignment Help, 2020)
My Assignment Help. Information Security [Internet]. My Assignment Help. 2020 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/nit5140-information-security/cloud-computing.html.
×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}
×
Thank you for your interest
The respective sample has been mail to your register email id
×
CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.
Account created successfully!
We have sent login details on your registered email.
User:
Password:
Get the best essays written exclusively at MyAssignmenthelp.com. Irrespective of whether you have a school essay to complete on time, or college application essay topics to deal with, hire us for flawless solutions. From compare and contrast essay topics to analytical essay topics; our team of writers are available to work on a myriad of essay genres. If you don’t know how to write a reflection essay paper, or in case you are yet to figure out how to write a persuasive essay, ask us to “write my essay paper”. We will send across the best solutions, much ahead of the deadline.
Latest Management Samples
div#loaddata .card img {max-width: 100%;
}
MPM755 Building Success In Commerce
Download :
0 | Pages :
9
Course Code: MPM755
University: Deakin University
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More
SNM660 Evidence Based Practice
Download :
0 | Pages :
8
Course Code: SNM660
University: The University Of Sheffield
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration
BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20
Course Code: BSBHRM513
University: Tafe NSW
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More
MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5
Course Code: MKT2031
University: University Of Northampton
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: United Kingdom
Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration
MN506 System Management
Download :
0 | Pages :
7
Course Code: MN506
University: Melbourne Institute Of Technology
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
Country: Australia
Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology
Next