MAS65420

docx

School

Australian National University *

*We aren’t endorsed by this school

Course

12558

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

13

Uploaded by JusticeWorldPenguin

Report
CYBERSECURITY CHALLENGES
Table of Contents Introduction ................................................................................................................................ 2 Synopsis of the papers ................................................................................................................ 3 Summary ................................................................................................................................ 3 Author opinion ....................................................................................................................... 3 Solution of the issues ............................................................................................................. 4 Summary ................................................................................................................................ 4 Author opinion ....................................................................................................................... 4 Solution of the issues ............................................................................................................. 5 Summary ................................................................................................................................ 5 Author opinion ....................................................................................................................... 5 Solution of the issues ............................................................................................................. 6 Analysis of the three papers ....................................................................................................... 6 Future of the chosen issues .................................................................................................... 8 Recommendation of the approach .......................................................................................... 9 Need for accomplishment for further research ........................................................................... 9 Conclusion ................................................................................................................................ 10 References ................................................................................................................................ 10 Page 1 of 13
Introduction The purpose of the study is to identify the security challenges in the utilization of public Wi- Fi. Cloud Technology is considered to be one of the best ways for improving data security and data storage. Public Wi-Fi is widely available in different oblique areas like cafe malls and other traveling facilities. It is important to explore a significant and effective outcome in the context of the workplace. The man in the middle is a major threat to security as there is a constant attack using the common trick for hackers to divert the internet traffic. There is a higher possibility of infection of the other user and it also results in criminal activity. The public Wi-Fi is considered to be a rough network and there is a rough access point. The security challenge that has been identified is associated with cloud storage while using the public Wi-Fi. Public Wi-Fi is dangerous to use in public places. Cloud storage is considered to be the most used and effective way of storing the data. It ensures a better and effective management of the data and it also incorporates the major data sources. There is a higher possibility of eavesdropping. The use of public Wi-Fi may affect the security of the cloud system. The use of communication network connection Wi-Fi program sensor gets and other devices store the data in the cloud and process the data from the cloud internet communication framework. The cloud storage contains device data with reliability, security and privacy. There is a higher possibility of communication security and connectivity with the neighbourhood devices and allow the description of the data from the cloud storage. The issue is highly relevant to the scenario as a large number of users incorporate the data. The loss of data is considered to be a highly sensitive issue for the organizations. Smart devices utilize the data from the cloud storage and they also utilize the Wi-Fi networks. It may allow the hacker to enter into the cloud storage system and affect the data system. The challenge of data security is largely faced by the security system controller as they have to focus more on transferring of the data in the right devices and absence of the right devices connecting with the other devices and the data is transferred or collected from the wrong device. The loss of data creates a complicated environment and it has a negative impact on the business continuity. Page 2 of 13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Synopsis of the papers Artile 1: S. Chandel, T.-Y. Ni, and G. Yang, “Enterprise cloud: Its Growth & Security Challenges in China,” 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) , 2018. Summary Cloud technology and data storage services have gained popularity as it is cost effective and convenient in managing the data. It has been noted that the potential use of data sharing. It has created a greater convenience for the internet user to improve the information sharing and effective views of cloud Technology. There are several risks of security while using the cloud Technology as it is not very trustful for the sensitive data storage as a result of lack of transparency. It has a negative impact on the data storage. The study has been conducted in Chinese Technology and systems where the data is completely controlled by the government. China is known to be one of the top countries in the world with the biggest size of cloud- based Technology market and it is also known to be a global leader in data intensive computing that incorporates generator thing artificial intelligence online to offline virtual reality and smart car and online payment system. The article has provided a significant importance of cloud security and storage systems along with the challenges in the context of China. It has also revealed the use of cloud storage in the financial sector gaming industry and government sector medical sector. It has also provided a significant and effective solution from cloud market leader. It has been noted that the article has identified the potential companies that provide a more reliable and efficient system of managing the company using cloud storage. It has included Alibaba cloud Hawaii enterprise cloud then send cloud system security and ucloud. The article proposed these potential cloud storage organizations and suggested the elimination of the challenges of storage in the context of the work environment. The article has also identified the types of attack that takes place on the cloud is storage and therefore it has also suggested the need for incorporating the security system to manage the data. The article has also explored the new trends in the cloud market. Author opinion The opinion of the author is evident that there are several problems of cloud services security and it has suggested the need for incorporating the cloud services from the top organization Page 3 of 13
and they will provide the potential solution in managing the problems and security issues in the cloud system and services. The author has further identified the industry joint moving to the cloud platform. Solution of the issues The other has provided an effective solution of the cloud security issues with the avoidance of the public Wi-Fi. There are several companies that provide tailor made packages of the solution to avoid the tag from the hacker crackers and malwares. The solution of the security problem is perfectly managed with the avoidance of cloud misuse. If the cloud company takes the charge of a large number of customers it will help to prevent the attack on the data and storage system. Article 2 : T. Alam and M. Benaida, “CICS: Cloud–internet communication security framework for the internet of smart devices,” International Journal of Interactive Mobile Technologies (iJIM) , vol. 12, no. 6, p. 74, 2018. Summary The article has identified the value and importance of smart devices and utilization of intelligent gadgets that use program sensors, Wi-Fi and communication network connection systems. The major devices with sensor artificial intelligence and automation systems store the data in the cloud storage system and process the cloud data. The device is capable of communicating with the proposed framework and the challenges associated with the communication security is inevitable. The study has Incorporated the communication security and critical issues associated with cloud computing in the circumstances of constant growth of the use of cloud Technology. Smart Technology has connected more than 50 billion smart devices by the effective and efficient use of Wi-Fi technology and it offers better support to the technology in managing the work environment over the period of time. Tracking and monitoring the movable device is considered to be the most comprehensive issue and it may have a negative impact on the organization. Technology like internet protocol connection using computers have contributed to improving connectivity. The wireless sensor Technology with mobility satellite and gadgets and storage in cloud have significant roles to play. There are several kinds of cloud consisting of private cloud, public cloud, community cloud and hybrid cloud. Wi-Fi based sensors became a part of internet performance. Page 4 of 13
Author opinion It has been not in that the author opinion that there are several layers of security and encryption in the cloud Technology. The security layer and encryption system in the cloud technology and storage system is quite efficient and the information send to the smart devices has a potential security in the management of risks of the organization. It has been noted that author is responsible for offline effectiveness of communication security challenges the role of service provider that could help to ensure the management of the risk. Solution of the issues It has been noted that the author agreed with the integration of the role of service provider to consider the responsibility of managing the workplace in a potentially effective way. The effective use of cloud related security helps to improve the security system. The service provider provides relevant information on the system and security and they help to manage the scenario in a better way. Article 3 : D. B. Knezevic and N. Kasunic, “Security challenges of Wi-Fi connected Beer Cooler and serving Iiot Device,” 2020 5th International Conference on Smart and Sustainable Technologies (SpliTech) , 2020. Summary The article considered the internet of things to be the most valuable aspect in the different industries and it has a considerable role in every industry with high frequency. One of the major issues while using the internet of things is associated with the poor network security and it has generated a question regarding the poor network security system and iot implementation in the context of the workplace. The public Wi-Fi incorporates a range of devices with sensors for collecting the data and the information is stored in the cloud storage with the use of Wi-Fi connectivity. The paper explodes the potential threat vulnerabilities and technique of mitigation in serving and cooling unit list. The article is found to have focused more on growing use of industrial IoTs that has the market size of 87 billion in 2019 and it is expected to grow by 318 million USD by 2023. The growing use of sensors and valuable manufacturing devices. The article has included a cyber security survey that identified high respect associated with the iot devices. It has included security settings, communication settings and system design. The focus of the communication system is to connect with the cloud services using https protocol. It has also revealed that there is a higher possibility of attack on the cloud services from a viable attack vector. Page 5 of 13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Author opinion The author of the article is found to have revealed that iot devices has undergone a potential changes and security threat. It has been found that the potential solution of the cloud security issue from the Wi-Fi system is associated with the use of firmware update and patch. It has also included an encryption system. The author has reviewed the need for protection and manufacturing settings in the recommended best security system. Solution of the issues It is important for the organization to have a good firmware update and patch. It is important to utilize encryption of authenticated data that prevents the security breach. A stronger control over the authentication and authorisation along with the application security control and physical device protection ensure better security to the cloud system. Analysis of the three papers Article 1 It has been noted that enterprise cloud Technology is considered to be highly effective and efficient in the context of the growing use of IoT. The author has identified a major security issue that is faced by the cloud storage user. The author has rightly identified the responsibility of managing the safety and security of the user is already in the hand of the enterprise cloud and it is the responsibility of the cloud storage company to maintain the risk of data losses. There is a potential risk and challenges associated with the problem of security to the user while using public Wi-Fi or connectivity. The author has provided sufficient information regarding the global market for public cloud and private cloud that occupies 15% and 12% [1]. The identification of the security and challenges issue in the cloud Technology is prominent in the context of the public sector. The other has provided sufficient explanation regarding the cyber security law and cyberspace securities strategy along with the policy is regulation and legal system in the workplace environment. It has also provided sufficient information regarding the local cloud market and its market. The cyber-criminal activities are growing to be smarter and more professional and steal the information with great sophistication and execute the attack on cyberspace. The major issue faced by the cloud service provider is associated with the attacks from these professional and sophisticated attackers passing the national cyber law with great technology and use of the devices. Page 6 of 13
The author has effectively examined the impact of the security attacks on the finance sector gaming industry, government sector medical sector and other associated sectors. One of the most polluted sectors is the gaming industry that has potential changes with the integration of a variety of attacks in the context of the working environment. The gaming industry is potentially utilizing the cloud computing platform and where there is the higher possibility of the loss of the data that has been chosen by the gaming application and hacker may utilize the game application to cause an impact on the organization. Sufficiently given potential information regarding the attack such as distributed Denial of services by sending the high number of fake requests to the server. Article 2 The author of the article has identified the use of the public Wi-Fi and security issues associated with the smart devices connected to the cloud services and storage system. The study has comprehensively examined the cloud internet communication framework and rightly examines the challenges of communication security among the smart devices. The author has indicated that the cloud has the capability to manage a large number of data storage and communication security. It is the responsibility of the cloud service provider to secure the devices connected with the cloud storage and manage the communication security problem using the framework associated with the internet of things. The study has provided sufficient information on the security challenges to the device user connected to the cloud Technology [2]. It has also incorporated the technology that supported the growth and development of smart devices. Communication security challenges is considered to be a significant topic of importance and it has been analysed by the author more comprehensively in the section of literature survey. The other has further identified the need for cloud internet communication security framework that offer potential solutions regarding the problem of the devices in the context of the workplace. There is a significant and effective exploration of the problem related to the organization and it is important to manage the workplace in a better and effective way. There is a significant connection between the smart devices and cloud storage which are connected to each other by the Wi-Fi system and other ways of connection. It is important to manage the challenging security issue in the context of the workplace. Cloud computing is considered to be a potential way of managing the workplace. The other has rightly identified the types of threat and effective solutions for managing the attack using the variety of layers consisting of Page 7 of 13
presentation layer communication security layer network layer and cloud layer. It develops a potential and secured communication in the smart devices and ensures a significant and effective outcome in the context of the smart devices. Article 3 The article has introduced the problem of the smart devices when it is being perfectly managed. The article has incorporated a large number of organizations in the management of resources. The internet of things incorporates significant and effective outcomes in the management of resources. The paper is to examine the challenges and risk to security of the smart coffee devices sensor and cloud storage while using Wi-Fi connectivity. the author has provided relevant information. The author has included the market size of IoTs. It is important for the service provider to protect the cloud storage in the context of the workplace over a period of time. Kaspersky IoTs has been mentioned in the context of the organization. The sufficient information is to be managed in a proper and effective way over the period of time. The communication setting is vital in the telemetry system architecture [3]. Internet connectivity is considered to be the most potential way of managing the communication between a smart devices and cloud storage system. The author has also explained security setting that ensure the proper establishment of the connection and effective control over the resources. Communication between cloud application and the unit is considered to be the most effective approach towards the management of resources. The challenges of the security have been effectively explained with the https vulnerability attack vectors and Wi-Fi network vulnerability. There is an effective explanation of mitigation technique by the proper utilization of firmware encryption system authorization control application security control firewall implementation and physical device protection. Future of the chosen issues It has been noted the security threat to the data in the cloud storage may be growing as the attackers are utilizing potential tools and smart software applications that continue to focus on stealing the appropriate data. The use of wireless Technology in the public has a negative impact on businesses. There are several vulnerabilities that are evident in the connectivity between smart devices and cloud services in near future. The use of reverse engineering may have a negative outcome within the organizational outcome. The issue may be more intense and organizations may face more stronger challenges over the period of time. It is important for the organization to maintain a significant effect in the context of the work environment. It Page 8 of 13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
is a major challenge to the businesses when they are using cloud services with the Wi-Fi network. The future of cloud services is responsible for managing the workplace the better and effective way. It will also bring new challenges with it but it is the responsibility of the service provider to incorporate enhanced Technology for managing the major issue of security challenges in a better and effective way. Recommendation of the approach The three articles have provided relevant approaches to improve the risk two security in a significant and effective way. It has been noted that there is an intensive growth of cloud services over the period of time. It has been noted that the authors have suggested to improve the security control and security system of the cloud service provider while connecting with the management of the organization and smart devices. It is important to manage the organization in a better and effective way. The management of security is essential within the context of the workplace. There is a significant requirement to utilize the secured connectivity within the context of the workplace over the period of time. There is a significant requirement to improve the cloud services within the context of the workplace. It is important to manage security problems regularly. A continuous improvement approach is essential in the workplace. The need for improving technology is essential within the context of the workplace. It is important to ensure better management of resources within the context of the workplace. There is a requirement of secured connectivity and service providers need to enhance the better and effective outcome within the context of the workplace. Need for accomplishment for further research The focus of the modern researcher is to manage and improve the efficiency and effectiveness over the period of time. It is essential for the modern researcher to manage and explore a better outcome in the context of managing the security challenges associated with the Wi-Fi technology and the use of cloud storage systems in public spaces. Strong research is required in the area of managing the workplace in a constructive way by developing a policy and procedure regarding Wi-Fi technology or connectivity in the public spaces to secure the data and cloud storage. The research is to be conducted in the management of resources over the period of time. The research is to be directed towards the improvement of Page 9 of 13
resources in the context of the work environment. It has been noted that the researcher needs to focus more on the improvement of the security system of the cloud storage. It is important for the government to develop a potential regulation regarding the installation of Wi-Fi systems and proper licensing and regulation is to be managed in the context of the work environment. The tight regulatory control over the service provider public Wi-Fi installation and cloud storage system will help to improve the security of the user and mitigate the risk of managing the personal and professional data of the user. The loss of data is a major issue and cloud storage systems need to be improved with better innovation so that cloud storage service providers manage to protect the information in a better way. Conclusion It can be said that the use of smart devices on the Wi-Fi technology in the public area is not free from risk as a result of an efficient cloud storage system and lack of innovation from the service provider. The three articles have provided and presented the challenges of the security in the cloud services while connecting it with the Wi-Fi technology but they have also provided effective and efficient solutions in managing the cloud storage in a proper way without any loss of personal data of the client. Page 10 of 13
Bibliography [1] S. Chandel, T.-Y. Ni, and G. Yang, “Enterprise cloud: Its Growth & Security Challenges in China,” 2018 5th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2018 4th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom) , 2018. [2] T. Alam and M. Benaida, “CICS: Cloud–internet communication security framework for the internet of smart devices,” International Journal of Interactive Mobile Technologies (iJIM) , vol. 12, no. 6, p. 74, 2018. [3] D. B. Knezevic and N. Kasunic, “Security challenges of Wi-Fi connected Beer Cooler and serving Iiot Device,” 2020 5th International Conference on Smart and Sustainable Technologies (SpliTech) , 2020. [4] H. Tabrizchi and M. Kuchaki Rafsanjani, “A survey on security challenges in cloud computing: Issues, threats, and solutions,” The Journal of Supercomputing , vol. 76, no. 12, pp. 9493–9532, 2020. [5] T. Alam, “Cloud computing and its role in the information technology,” IAIC Transactions on Sustainable Digital Innovation (ITSDI) , vol. 1, no. 2, pp. 108–115, 2020. [6] M. Ali, “Cloud computing at a Cross Road: Quality and risks in Higher Education,” [3] Advances in Internet of Things , vol. 09, no. 03, pp. 33–49, 2019. [7] S. S. Gill, S. Tuli, M. Xu, I. Singh, K. V. Singh, D. Lindsay, S. Tuli, D. Smirnova, M. Singh, U. Jain, H. Pervaiz, B. Sehgal, S. S. Kaila, S. Misra, M. S. Aslanpour, H. Mehta, V. Stankovski, and P. Garraghan, “Transformative effects of IOT, blockchain and Artificial Intelligence on Cloud Computing: Evolution, vision, trends and open challenges,” Internet of Things , vol. 8, p. 100118, 2019. [8] P. J. Sun, “Security and privacy protection in cloud computing: Discussions and challenges,” Journal of Network and Computer Applications , vol. 160, p. 102642, 2020. Page 11 of 13
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
[9] A. Alam, “Cloud-based e-learning: Scaffolding the environment for adaptive E-learning ecosystem based on cloud computing infrastructure,” Lecture Notes in Networks and Systems , pp. 1–9, 2022. [10] Navale, V. and Bourne, P.E., 2018. Cloud computing applications for biomedical science: A perspective. PLoS computational biology , 14 (6), p.e1006144. Page 12 of 13