Assignment 1: Network Security

Great Essays
to an extent through the encryption of data and proper access control management. Still even with these security measures in place, dubious attackers can breach the security measures and gain access to the data in the following ways [4].
• Cross-site scripting
• Cross-site request forgery
• Cookie manipulation
• OS and SQL injection
• Insecure storage
• Hidden field manipulation
Due to the vulnerabilities listed above, achieving data security in cloud remains a mammoth task.
1) Network Security: When using SaaS, the client transfer sensitive information to the application over the network. Hence, it is essential to secure the connection and provide proper network security. Currently, a majority of the SaaS vendor using Secure Socket Layer
…show more content…
As SaaS applications are available in a distributed environment, data integrity becomes an important issue. In distributed systems, the data integrity is achieved through a central transaction manager. But SaaS applications tend to be multi-tenant and run as services. These services often expose their functionality through an interface and serve data in the form of XML. Hence, the lack of clear transaction management and data integrity checks on these services can create serious vulnerabilities and provide unauthorized access to private data resulting in huge financial losses. Therefore, it is of utmost importance to ensure data integrity is not violated through the use of SaaS …show more content…
This can also be a source of security risk.
In addition to the above mentioned security flaws, PaaS inherits all the security risks present in SaaS model such as data security, network security etc.
B. Security challenges in Infrastructure as a Service
In IaaS, the vendor provides the customer with all the infrastructure necessary such as servers, storage, network and other computing resources primarily in the form of virtualized resources. Thus, provider is responsible for security only till the hypervisor and any other security issues above in the OS or application level should be handled by the customer. Thus, in IaaS the customers have greater control over the security policies implemented compared to other service models. However, this does not mean IaaS is not susceptible to security flaws. Some of sources of security flaws which are a cause for concern in IaaS are discussed

Related Documents

  • Decent Essays

    Nt1330 Unit 1 Study Guide

    • 573 Words
    • 3 Pages

    1. Software as a Service (SaaS) – Model of software deployment where an application is hosted as a service provided across the internet. 2. Outsourcing is the transfer of information systems development, operation, or maintenance to an outside firm that provides these services for a fee on a temporary or long-term basis. 3.…

    • 573 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Project Part 1 Task 1: Outline Security Policy First World Bank Savings and Loan; a financial institution that offers banking services (loans and deposits). The bank would like to provide online banking services to the customers, which includes online credit card use for loan applications. Recommendations are based on such factors as: ownership total cost, scalability, and reliability. Decisions and recommendations made need to be appropriate from the CIA triad perspective.…

    • 1249 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Summary: Capstone Project

    • 522 Words
    • 3 Pages

    These systems will be applied into a full functional virtualized environment by moving the older hardware OS systems to VM’s (Virtual Media), as well as migrate any and all legacy software onto these system. Than we will Identify and implement any and all potential security requirements needed for the internal network structure, both local and remote server access, any potential or required application access for client, and the encryption and storage of any given data. The final step will be to develop…

    • 522 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    The real preference of SSL is that it doesn't bother with any product introduced in light of the fact that it utilizes the web browser as the customer application. 6. MPLS…

    • 446 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    4. CORRESPONDING DUTIES: As a user of the company network you have the following obligations: 1) To answer for your personal account granted to you by CRI company. 2) To keep confidentiality of company’s information, maintaining its integrity and keeping information from being accessed by non-authorized users.…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Fm Pro Research Paper

    • 1838 Words
    • 8 Pages

    For example: Data Management - Setting reporting formats, specialized data formats, condition index customization. Contact DFC for a quotation on support service projects. 1.10 – SUBSCRIBER DATA Ownership Subscriber’s data (“Subscriber Data,” which shall also be known and treated by DFC as Confidential Information) shall include: (a) Subscriber’s data collected, used, processed, stored, or generated as the result of the use of the Services. Subscriber Data is and shall remain the sole and exclusive property of the Subscriber and all right, title, and interest in the same is reserved by Subscriber.…

    • 1838 Words
    • 8 Pages
    Great Essays
  • Brilliant Essays

    (2006, February). Special Publication 800-18 REV 1: Guide For Developing Security Plans For Information Technology Systems. Retrieved October 30, 2015 from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf NIST - National Institute of Standards and Technology. (2012, September). Special Publication 800-30 REV 1: Guide for Conducting Risk Assessments.…

    • 1450 Words
    • 6 Pages
    Brilliant Essays
  • Superior Essays

    Zillow Case Study Essay

    • 1460 Words
    • 6 Pages

    Introduction In this case study, the business of Zillow.com in providing real estate information to all users to its website is explored, and the use of business intelligence by Zillow.com in its offering to customer, and the way it uses a data mart to market its new product, are discussed. In addition, this case study includes a discussion of various characteristics of information quality as seen from Zillow’s perspective, and how Zillow is using a data-driven website. Analysis Background of Zillow.com Zillow.com is an online web-based real estate site helping homeonwers, buyers to find and share information about real estate and mortgages. It allows users to access information anonoyoumously and free of charge, using the kinds of tools…

    • 1460 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    VPN Security Risk Paper

    • 560 Words
    • 3 Pages

    Inevitably there is a security risk in accessing any database on the internet. The internet houses a variety of malware. Engineers attempt to discover security risks users experience and mitigate them. VPN connections can enable users and organizations dealing with confidential information the ability to avoid having their data observed or stolen. VPNs are not perfect, they do however, provide an avenue allowing the ability to transfer data more securely.…

    • 560 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Annotated Bibliography

    • 1797 Words
    • 8 Pages

    As seen with the case in which someone has to put a password to an Email account, confidentiality is a matter that is of great concern in many scenes of life . Cybersecurity is quite applicable as a tool that offers security when it comes to transfer of data though networks and between different people in one connection. For instance, cybersecurity is a tool used to ensure that the information shared among workers within an institution, through a connection of computers and computer systems, is not accessed by people who do not belong to this organization. In many cases, people will try to enter forcefully and access such confidential information without the consent of the organization. Cybersecurity helps such organizations in installing systems where access will be denied to non-members, and allowed to members since they make use of passwords and other security mechanisms installed within the computers and the connections .…

    • 1797 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Homeland Security

    • 1157 Words
    • 5 Pages

    Security systems both physical and virtual are utilized to safeguard information from being copied, stolen, or destroyed. This is complicated by the fact that cyber-attacks can originate from hundreds of miles away and the source can be complicated to determine (Kemp 2012, p. 33). This leads to more robust security systems and multiple layers of duplicated…

    • 1157 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    1. The message I would have received as a hospital administrator from this video would have been: The importance of keeping my organization's information secure from anyone else not permitted to have my knowledge, and more specifically the knowledge of my patient's care as well as their demographic information. It is my responsibility as a hospital administrator to keep my data secure, and whether that means hiring a IT security company or maintaining a high security software is my responsibility in order to stay within HIPPA guidelines. 2.…

    • 477 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    Hierarchal Database “In the network model, the data are represented by collections of records and relationships between data are represented by links. This structure holds for the hierarchical model as well. The only difference is that, in the hierarchical model, records are organized as collections of trees, rather than as arbitrary graphs. ”(http://codex.cs.yale.edu/avi/db-book/db6/appendices-dir/e.pdf, 17-10-2014) This database model use rules as each child has one parent and each parent can have many children nodes.…

    • 938 Words
    • 4 Pages
    Superior Essays