MAS65420
docx
keyboard_arrow_up
School
Australian National University *
*We aren’t endorsed by this school
Course
12558
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
13
Uploaded by JusticeWorldPenguin
CYBERSECURITY CHALLENGES
Table of Contents
Introduction
................................................................................................................................
2
Synopsis of the papers
................................................................................................................
3
Summary
................................................................................................................................
3
Author opinion
.......................................................................................................................
3
Solution of the issues
.............................................................................................................
4
Summary
................................................................................................................................
4
Author opinion
.......................................................................................................................
4
Solution of the issues
.............................................................................................................
5
Summary
................................................................................................................................
5
Author opinion
.......................................................................................................................
5
Solution of the issues
.............................................................................................................
6
Analysis of the three papers
.......................................................................................................
6
Future of the chosen issues
....................................................................................................
8
Recommendation of the approach
..........................................................................................
9
Need for accomplishment for further research
...........................................................................
9
Conclusion
................................................................................................................................
10
References
................................................................................................................................
10
Page
1
of
13
Introduction
The purpose of the study is to identify the security challenges in the utilization of public Wi-
Fi. Cloud Technology is considered to be one of the best ways for improving data security
and data storage. Public Wi-Fi is widely available in different oblique areas like cafe malls
and other traveling facilities. It is important to explore a significant and effective outcome in
the context of the workplace. The man in the middle is a major threat to security as there is a
constant attack using the common trick for hackers to divert the internet traffic. There is a
higher possibility of infection of the other user and it also results in criminal activity. The
public Wi-Fi is considered to be a rough network and there is a rough access point. The
security challenge that has been identified is associated with cloud storage while using the
public Wi-Fi. Public Wi-Fi is dangerous to use in public places.
Cloud storage is considered to be the most used and effective way of storing the data. It
ensures a better and effective management of the data and it also incorporates the major data
sources. There is a higher possibility of eavesdropping. The use of public Wi-Fi may affect
the security of the cloud system. The use of communication network connection Wi-Fi
program sensor gets and other devices store the data in the cloud and process the data from
the cloud internet communication framework. The cloud storage contains device data with
reliability, security and privacy. There is a higher possibility of communication security and
connectivity with the neighbourhood devices and allow the description of the data from the
cloud storage.
The issue is highly relevant to the scenario as a large number of users incorporate the data.
The loss of data is considered to be a highly sensitive issue for the organizations. Smart
devices utilize the data from the cloud storage and they also utilize the Wi-Fi networks. It
may allow the hacker to enter into the cloud storage system and affect the data system.
The challenge of data security is largely faced by the security system controller as they have
to focus more on transferring of the data in the right devices and absence of the right devices
connecting with the other devices and the data is transferred or collected from the wrong
device. The loss of data creates a complicated environment and it has a negative impact on
the business continuity.
Page
2
of
13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Synopsis of the papers
Artile 1:
S. Chandel, T.-Y. Ni, and G. Yang, “Enterprise cloud: Its Growth & Security
Challenges in China,”
2018 5th IEEE International Conference on Cyber Security and
Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge
Computing and Scalable Cloud (EdgeCom)
, 2018.
Summary
Cloud technology and data storage services have gained popularity as it is cost effective and
convenient in managing the data. It has been noted that the potential use of data sharing. It
has created a greater convenience for the internet user to improve the information sharing and
effective views of cloud Technology. There are several risks of security while using the cloud
Technology as it is not very trustful for the sensitive data storage as a result of lack of
transparency. It has a negative impact on the data storage. The study has been conducted in
Chinese Technology and systems where the data is completely controlled by the government.
China is known to be one of the top countries in the world with the biggest size of cloud-
based Technology market and it is also known to be a global leader in data intensive
computing that incorporates generator thing artificial intelligence online to offline virtual
reality and smart car and online payment system. The article has provided a significant
importance of cloud security and storage systems along with the challenges in the context of
China. It has also revealed the use of cloud storage in the financial sector gaming industry
and government sector medical sector. It has also provided a significant and effective solution
from cloud market leader. It has been noted that the article has identified the potential
companies that provide a more reliable and efficient system of managing the company using
cloud storage. It has included Alibaba cloud Hawaii enterprise cloud then send cloud system
security and ucloud. The article proposed these potential cloud storage organizations and
suggested the elimination of the challenges of storage in the context of the work environment.
The article has also identified the types of attack that takes place on the cloud is storage and
therefore it has also suggested the need for incorporating the security system to manage the
data. The article has also explored the new trends in the cloud market.
Author opinion
The opinion of the author is evident that there are several problems of cloud services security
and it has suggested the need for incorporating the cloud services from the top organization
Page
3
of
13
and they will provide the potential solution in managing the problems and security issues in
the cloud system and services. The author has further identified the industry joint moving to
the cloud platform.
Solution of the issues
The other has provided an effective solution of the cloud security issues with the avoidance of
the public Wi-Fi. There are several companies that provide tailor made packages of the
solution to avoid the tag from the hacker crackers and malwares. The solution of the security
problem is perfectly managed with the avoidance of cloud misuse. If the cloud company
takes the charge of a large number of customers it will help to prevent the attack on the data
and storage system.
Article 2
: T. Alam and M. Benaida, “CICS: Cloud–internet communication security
framework for the internet of smart devices,”
International Journal of Interactive
Mobile Technologies (iJIM)
, vol. 12, no. 6, p. 74, 2018.
Summary
The article has identified the value and importance of smart devices and utilization of
intelligent gadgets that use program sensors, Wi-Fi and communication network connection
systems. The major devices with sensor artificial intelligence and automation systems store
the data in the cloud storage system and process the cloud data. The device is capable of
communicating with the proposed framework and the challenges associated with the
communication security is inevitable. The study has Incorporated the communication security
and critical issues associated with cloud computing in the circumstances of constant growth
of the use of cloud Technology. Smart Technology has connected more than 50 billion smart
devices by the effective and efficient use of Wi-Fi technology and it offers better support to
the technology in managing the work environment over the period of time. Tracking and
monitoring the movable device is considered to be the most comprehensive issue and it may
have a negative impact on the organization. Technology like internet protocol connection
using computers have contributed to improving connectivity. The wireless sensor Technology
with mobility satellite and gadgets and storage in cloud have significant roles to play. There
are several kinds of cloud consisting of private cloud, public cloud, community cloud and
hybrid cloud. Wi-Fi based sensors became a part of internet performance.
Page
4
of
13
Author opinion
It has been not in that the author opinion that there are several layers of security and
encryption in the cloud Technology. The security layer and encryption system in the cloud
technology and storage system is quite efficient and the information send to the smart devices
has a potential security in the management of risks of the organization. It has been noted that
author is responsible for offline effectiveness of communication security challenges the role
of service provider that could help to ensure the management of the risk.
Solution of the issues
It has been noted that the author agreed with the integration of the role of service provider to
consider the responsibility of managing the workplace in a potentially effective way. The
effective use of cloud related security helps to improve the security system. The service
provider provides relevant information on the system and security and they help to manage
the scenario in a better way.
Article 3
: D. B. Knezevic and N. Kasunic, “Security challenges of Wi-Fi connected Beer
Cooler and serving Iiot Device,”
2020 5th International Conference on Smart and
Sustainable Technologies (SpliTech)
, 2020.
Summary
The article considered the internet of things to be the most valuable aspect in the different
industries and it has a considerable role in every industry with high frequency. One of the
major issues while using the internet of things is associated with the poor network security
and it has generated a question regarding the poor network security system and iot
implementation in the context of the workplace. The public Wi-Fi incorporates a range of
devices with sensors for collecting the data and the information is stored in the cloud storage
with the use of Wi-Fi connectivity. The paper explodes the potential threat vulnerabilities and
technique of mitigation in serving and cooling unit list. The article is found to have focused
more on growing use of industrial IoTs that has the market size of 87 billion in 2019 and it is
expected to grow by 318 million USD by 2023. The growing use of sensors and valuable
manufacturing devices. The article has included a cyber security survey that identified high
respect associated with the iot devices. It has included security settings, communication
settings and system design. The focus of the communication system is to connect with the
cloud services using https protocol. It has also revealed that there is a higher possibility of
attack on the cloud services from a viable attack vector.
Page
5
of
13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Author opinion
The author of the article is found to have revealed that iot devices has undergone a potential
changes and security threat. It has been found that the potential solution of the cloud security
issue from the Wi-Fi system is associated with the use of firmware update and patch. It has
also included an encryption system. The author has reviewed the need for protection and
manufacturing settings in the recommended best security system.
Solution of the issues
It is important for the organization to have a good firmware update and patch. It is important
to utilize encryption of authenticated data that prevents the security breach. A stronger control
over the authentication and authorisation along with the application security control and
physical device protection ensure better security to the cloud system.
Analysis of the three papers
Article 1
It has been noted that enterprise cloud Technology is considered to be highly effective and
efficient in the context of the growing use of IoT. The author has identified a major security
issue that is faced by the cloud storage user. The author has rightly identified the
responsibility of managing the safety and security of the user is already in the hand of the
enterprise cloud and it is the responsibility of the cloud storage company to maintain the risk
of data losses. There is a potential risk and challenges associated with the problem of security
to the user while using public Wi-Fi or connectivity. The author has provided sufficient
information regarding the global market for public cloud and private cloud that occupies 15%
and 12% [1]. The identification of the security and challenges issue in the cloud Technology
is prominent in the context of the public sector. The other has provided sufficient explanation
regarding the cyber security law and cyberspace securities strategy along with the policy is
regulation and legal system in the workplace environment. It has also provided sufficient
information regarding the local cloud market and its market. The cyber-criminal activities are
growing to be smarter and more professional and steal the information with great
sophistication and execute the attack on cyberspace. The major issue faced by the cloud
service provider is associated with the attacks from these professional and sophisticated
attackers passing the national cyber law with great technology and use of the devices.
Page
6
of
13
The author has effectively examined the impact of the security attacks on the finance sector
gaming industry, government sector medical sector and other associated sectors. One of the
most polluted sectors is the gaming industry that has potential changes with the integration of
a variety of attacks in the context of the working environment. The gaming industry is
potentially utilizing the cloud computing platform and where there is the higher possibility of
the loss of the data that has been chosen by the gaming application and hacker may utilize the
game application to cause an impact on the organization. Sufficiently given potential
information regarding the attack such as distributed Denial of services by sending the high
number of fake requests to the server.
Article 2
The author of the article has identified the use of the public Wi-Fi and security issues
associated with the smart devices connected to the cloud services and storage system. The
study has comprehensively examined the cloud internet communication framework and
rightly examines the challenges of communication security among the smart devices. The
author has indicated that the cloud has the capability to manage a large number of data
storage and communication security. It is the responsibility of the cloud service provider to
secure the devices connected with the cloud storage and manage the communication security
problem using the framework associated with the internet of things. The study has provided
sufficient information on the security challenges to the device user connected to the cloud
Technology [2]. It has also incorporated the technology that supported the growth and
development of smart devices. Communication security challenges is considered to be a
significant topic of importance and it has been analysed by the author more comprehensively
in the section of literature survey. The other has further identified the need for cloud internet
communication security framework that offer potential solutions regarding the problem of the
devices in the context of the workplace.
There is a significant and effective exploration of the problem related to the organization and
it is important to manage the workplace in a better and effective way. There is a significant
connection between the smart devices and cloud storage which are connected to each other by
the Wi-Fi system and other ways of connection. It is important to manage the challenging
security issue in the context of the workplace. Cloud computing is considered to be a
potential way of managing the workplace. The other has rightly identified the types of threat
and effective solutions for managing the attack using the variety of layers consisting of
Page
7
of
13
presentation layer communication security layer network layer and cloud layer. It develops a
potential and secured communication in the smart devices and ensures a significant and
effective outcome in the context of the smart devices.
Article 3
The article has introduced the problem of the smart devices when it is being perfectly
managed. The article has incorporated a large number of organizations in the management of
resources. The internet of things incorporates significant and effective outcomes in the
management of resources. The paper is to examine the challenges and risk to security of the
smart coffee devices sensor and cloud storage while using Wi-Fi connectivity. the author has
provided relevant information. The author has included the market size of IoTs. It is
important for the service provider to protect the cloud storage in the context of the workplace
over a period of time. Kaspersky IoTs has been mentioned in the context of the organization.
The sufficient information is to be managed in a proper and effective way over the period of
time. The communication setting is vital in the telemetry system architecture [3]. Internet
connectivity is considered to be the most potential way of managing the communication
between a smart devices and cloud storage system. The author has also explained security
setting that ensure the proper establishment of the connection and effective control over the
resources. Communication between cloud application and the unit is considered to be the
most effective approach towards the management of resources. The challenges of the security
have been effectively explained with the https vulnerability attack vectors and Wi-Fi network
vulnerability. There is an effective explanation of mitigation technique by the proper
utilization of firmware encryption system authorization control application security control
firewall implementation and physical device protection.
Future of the chosen issues
It has been noted the security threat to the data in the cloud storage may be growing as the
attackers are utilizing potential tools and smart software applications that continue to focus
on stealing the appropriate data. The use of wireless Technology in the public has a negative
impact on businesses. There are several vulnerabilities that are evident in the connectivity
between smart devices and cloud services in near future. The use of reverse engineering may
have a negative outcome within the organizational outcome. The issue may be more intense
and organizations may face more stronger challenges over the period of time. It is important
for the organization to maintain a significant effect in the context of the work environment. It
Page
8
of
13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
is a major challenge to the businesses when they are using cloud services with the Wi-Fi
network. The future of cloud services is responsible for managing the workplace the better
and effective way. It will also bring new challenges with it but it is the responsibility of the
service provider to incorporate enhanced Technology for managing the major issue of
security challenges in a better and effective way.
Recommendation of the approach
The three articles have provided relevant approaches to improve the risk two security
in a significant and effective way. It has been noted that there is an intensive growth
of cloud services over the period of time. It has been noted that the authors have
suggested to improve the security control and security system of the cloud service
provider while connecting with the management of the organization and smart
devices.
It is important to manage the organization in a better and effective way. The
management of security is essential within the context of the workplace. There is a
significant requirement to utilize the secured connectivity within the context of the
workplace over the period of time.
There is a significant requirement to improve the cloud services within the context of
the workplace. It is important to manage security problems regularly. A continuous
improvement approach is essential in the workplace.
The need for improving technology is essential within the context of the workplace. It
is important to ensure better management of resources within the context of the
workplace. There is a requirement of secured connectivity and service providers need
to enhance the better and effective outcome within the context of the workplace.
Need for accomplishment for further research
The focus of the modern researcher is to manage and improve the efficiency and
effectiveness over the period of time. It is essential for the modern researcher to manage and
explore a better outcome in the context of managing the security challenges associated with
the Wi-Fi technology and the use of cloud storage systems in public spaces. Strong research
is required in the area of managing the workplace in a constructive way by developing a
policy and procedure regarding Wi-Fi technology or connectivity in the public spaces to
secure the data and cloud storage. The research is to be conducted in the management of
resources over the period of time. The research is to be directed towards the improvement of
Page
9
of
13
resources in the context of the work environment. It has been noted that the researcher needs
to focus more on the improvement of the security system of the cloud storage. It is important
for the government to develop a potential regulation regarding the installation of Wi-Fi
systems and proper licensing and regulation is to be managed in the context of the work
environment. The tight regulatory control over the service provider public Wi-Fi installation
and cloud storage system will help to improve the security of the user and mitigate the risk of
managing the personal and professional data of the user. The loss of data is a major issue and
cloud storage systems need to be improved with better innovation so that cloud storage
service providers manage to protect the information in a better way.
Conclusion
It can be said that the use of smart devices on the Wi-Fi technology in the public area is not
free from risk as a result of an efficient cloud storage system and lack of innovation from the
service provider. The three articles have provided and presented the challenges of the security
in the cloud services while connecting it with the Wi-Fi technology but they have also
provided effective and efficient solutions in managing the cloud storage in a proper way
without any loss of personal data of the client.
Page
10
of
13
Bibliography
[1] S. Chandel, T.-Y. Ni, and G. Yang, “Enterprise cloud: Its Growth & Security Challenges
in China,”
2018 5th IEEE International Conference on Cyber Security and Cloud
Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing
and Scalable Cloud (EdgeCom)
, 2018.
[2]
T. Alam and M. Benaida, “CICS: Cloud–internet communication security framework for
the internet of smart devices,”
International Journal of Interactive Mobile Technologies
(iJIM)
, vol. 12, no. 6, p. 74, 2018.
[3] D. B. Knezevic and N. Kasunic, “Security challenges of Wi-Fi connected Beer Cooler and
serving Iiot Device,”
2020 5th International Conference on Smart and Sustainable
Technologies (SpliTech)
, 2020.
[4] H. Tabrizchi and M. Kuchaki Rafsanjani, “A survey on security challenges in cloud
computing: Issues, threats, and solutions,”
The Journal of Supercomputing
, vol. 76, no.
12, pp. 9493–9532, 2020.
[5]
T. Alam, “Cloud computing and its role in the information technology,”
IAIC
Transactions on Sustainable Digital Innovation (ITSDI)
, vol. 1, no. 2, pp. 108–115,
2020.
[6] M. Ali, “Cloud computing at a Cross Road: Quality and risks in Higher Education,” [3]
Advances in Internet of Things
, vol. 09, no. 03, pp. 33–49, 2019.
[7]
S. S. Gill, S. Tuli, M. Xu, I. Singh, K. V. Singh, D. Lindsay, S. Tuli, D. Smirnova, M.
Singh, U. Jain, H. Pervaiz, B. Sehgal, S. S. Kaila, S. Misra, M. S. Aslanpour, H. Mehta,
V. Stankovski, and P. Garraghan, “Transformative effects of IOT, blockchain and
Artificial Intelligence on Cloud Computing: Evolution, vision, trends and open
challenges,”
Internet of Things
, vol. 8, p. 100118, 2019.
[8]
P. J. Sun, “Security and privacy protection in cloud computing: Discussions and
challenges,”
Journal of Network and Computer Applications
, vol. 160, p. 102642,
2020.
Page
11
of
13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
[9]
A. Alam, “Cloud-based e-learning: Scaffolding the environment for adaptive E-learning
ecosystem based on cloud computing infrastructure,”
Lecture Notes in Networks and
Systems
, pp. 1–9, 2022.
[10]
Navale, V. and Bourne, P.E., 2018. Cloud computing applications for biomedical
science: A perspective.
PLoS computational biology
,
14
(6), p.e1006144.
Page
12
of
13