Question

In: Computer Science

Assume that you are given a task to design a system for a vehicular network (or...

Assume that you are given a task to design a system for a vehicular network (or any cloud computing system). Briefly discuss security requirements for such a system. Outline a security architecture that could achieve the specified security goals in the scenario. You must include in your discussion of the security limitations of your approach. Note that this is intended to be an open-ended problem and your alternative security architecture may or may not exist as a specific product or system, so you are expected to think creatively about this solution. It is likely that you will need to undertake some research to assist in answering this part of the problem.

Component marks

Discussion of security problems

• Who could be the potential adversaries?

• What could be the security requirements for the above system?

15%

Description of security architecture

• A system framework for the vehicular network or cloud computing system. Describe how the proposed system works.

• How to achieve the security requirements? Apply techniques you learned in this unit.

• Should be described with enough details to be understood and subject to a basic analysis.

35%

Analysis of limitations

• Unless your architecture is perfect, explain what its weaknesses are.

10%
Clarity and quality of writing, including organisation and evidence of research where necessary. 5%

Solutions

Expert Solution

What is Cloud Security?

Cloud cybersecurity is simply the software and hardware you use to keep your cloud-stored data safe. It has become one of the keys to keeping your business not just healthy, but also competitive in the modern business environment.

As we’ve seen the security landscape evolve, the security needs for all businesses have changed. Cloud security monitors and protects the data stored in the cloud, along with the accounts used to login and gain access to the data.

Why is Cloud Security So Important?

Without cloud security, you're risking all of the data you use, and ultimately the integrity of your business. Why would a client continue to work with you after their data was stolen thanks to your lack of security?

There's also the unfortunate statistic that 60% of breaches involve vulnerabilities for which a patch is available but not applied. You need to have a team constantly monitoring for potential threats, and making sure that your systems are always up-to-date.

Here are the 6 best ways you can improve cloud security:

1. Deploy Multi-Factor Authentication (MFA)

The traditional username and password combination is often insufficient to protect user accounts from hackers, and stolen credentials is one of the main ways hackers get access to your on-line business data.

Once they have your user credentials, they can log into all those cloud-based applications and services that you use every day to run your business.

Protect yourself with multi-factor authentication - also known as two-factor authentication - to ensure that only authorized personnel can log in to your cloud apps and access that sensitive data.

MFA is one of the cheapest yet most effective ways of keeping would-be hackers from accessing your cloud applications. In fact, most security experts will tell you that its now considered negligent if you DON'T implement MFA.

2. Manage Your User Access to Improve Cloud Computing Security

Most employees don't need access to every application, every piece of information, or every file.

Setting proper levels of authorization ensures that each employee can only view or manipulate the applications or data necessary for him or her to do their job.

Assigning user access rights not only helps prevent an employee from accidentally editing information that he or she isn't authorized to access, but also protects you from hackers who have stolen an employee's credentials.

If an employee who has access to EVERYTHING gets tricked by a phishing email and inadvertently provides their log in information - well, now the hacker has the keys to all your kingdoms!

If you don't have the in-house time or talent to do this yourself, be sure to work with a qualified IT consultant to help you get this set up properly.

You can also explore on-going management of all your cloud IT services by signing up with a Managed Service Provider who can completely take the burden of user access and management off your plate.

3. Monitor, Log, and Analyze User Activities With Automated Solutions to Detect Intruders

Real-time monitoring and analysis of user activities can help you spot irregularities that deviate from normal usage patterns, e.g., log in from a previously unknown IP or devices.

These abnormal activities could indicate a breach in your system so catching them early on can stop hackers in their tracks and allow you to fix security issues before they cause mayhem.

There are many solutions that can help you out with this, starting with automated 24/7 networking monitoring and management and moving up to advanced cyber security solutions such as:

Intrusion Detection & Response
Vulnerability Scanning and Remediation
Endpoint Detection and Response
Every business has varying needs for different levels of cyber security services, so be sure to get a third party risk assessment before making any large investments.

4. Create a Comprehensive Off-boarding Process to Protect against Departing Employees

When employees leave your company, make sure they can no longer access your systems, data, customer information, and intellectual properties.

Since each employee would likely have access to many different cloud applications and platforms, you need a systemized deprovisioning process to ensure that all the access rights for each departing employee are revoked.

Again, if you can't manage this internally, don't hesitate to outsource this task to someone who knows how to properly set up, implement and maintain this process.

5. Provide Anti-Phishing Training for Employees on a Regular Basis

Hackers can gain access to secure information by stealing employees' login credentials through social engineering techniques such as phishing, spoofing websites, and social media spying. As an example, the rapid expansion of Microsoft Office 365 has made it a very attractive target for hackers - more and more threats are emerging, specifically the frequency of phishing attacks.

Offering ongoing training is the best way to prevent employees from falling victims to these scams and compromising your company's sensitive data.

Keep in mind we said "ongoing" - phishing training is not one and done, it's a continual process that needs be managed by someone within the organization in order to make it effective!

6. Consider Cloud to Cloud Back Up Solutions

There are legitimate risks associated with any cloud application suite or platform.

As mentioned, the odds of you losing data because of your cloud provider's mistake is very low - but losing that data due to human error is high.

Let's use Microsoft Office 365 as an example.

If an employee should accidentally delete data, a hacker obtains an account password and corrupts the data, or a rogue employee cleans out his inbox and folders - there is nothing Microsoft can do past a certain time period.

Note that most cloud providers, including Microsoft, do store deleted data for a short period of time, including your Office 365 data.

But be sure to check with your cloud provider to determine what this time frame is, and if there are fees to restore that data (when possible to retrieve it.)

Companies that must abide by strict regulations or are concerned with being held liable due to missing or corrupted data, are turning to cloud-to-cloud back up solutions.

There are many of these solutions on the market today that can help protect you and reputable IT consulting companies can help you determine which solution is best for your business.

Minimize Your Cloud Computing Security Risks

In general, cloud computing is a much more cost effective option and it's definitely more secure if you take the right precautions.

Following industry best practices in selecting, installing, provisioning, and managing cloud services can help you get the most out of cloud computing, while still maintaining a high level of security to protect your sensitive data.

Experienced IT professionals can help you design a comprehensive cloud computing strategy that ties all the pieces together, and even provide ongoing management to make sure you're protected. Reach out to us if you would like more information on how we can help!

If you're interested in learning more about this topic, take a look at our white paper "Understanding Backup and Data Protection." This paper provides valuable information on the importance of choosing the right back up and recovery solution for your business, including your cloud-based data!

THANK YOU!; PLEASE VOTE


Related Solutions

Please design the network and draw the network diagram. You have the freedom to assume the...
Please design the network and draw the network diagram. You have the freedom to assume the internal network structure. In the diagram, in addition to the 2 servers, you should also include a few desktop computers and a printer. Please explain the rationale on why you put a computer or a printer in its designated location, 1 example for each location. A subnet (or a segment) is regarded as the same location. (hint: a firewall or a few firewalls, depending...
Assume you are given a task to design either Side-view mirror and  Front grill in your first...
Assume you are given a task to design either Side-view mirror and  Front grill in your first job in automotive industry. In order to design a component or a system you need to satisfy the design criteria. Moreover, the interaction of the component or a system with neighboring component and/or system may pose additional design challenges. Before you begin your design work, answering the following question will help you make right decision and convince the management that your design meet all...
Assume you are given a task to design either Side-view mirror (students with even ID number)...
Assume you are given a task to design either Side-view mirror (students with even ID number) or Front grill (students with odd ID number) in your first job in automotive industry. In order to design a component or a system you need to satisfy the design criteria. Moreover, the interaction of the component or a system with neighboring component and/or system may pose additional design challenges. Before you begin your design work, answering the following question will help you make...
To complete this task you are required to design an information system for Fashion clothing store...
To complete this task you are required to design an information system for Fashion clothing store to assist with their business. You have discussed Porter’s Value Chain in class and you should understand the Primary and support activities within businesses. For this task you need to concentrate on Marketing and Sales only. The development of your professional skills includes researching information systems to assist with organisational issues that are encountered in contemporary business. You will be learning important ‘agile’ skills...
You are given task to design an experiment to convert 1 kg of water in ice...
You are given task to design an experiment to convert 1 kg of water in ice phase at 253 K and 100 kPa into vapor instantaneously. 1.  List down possible assumptions (with justification) to ease your experimental setup idea. 2. Sketch a schematic diagram of your experimental setup 3. Construct one experiment method (with step by step methodology) based on the collected diagram and selected apparatus and items used.
Network Design proposal for a University Problem: Suppose you are asked to design of a network...
Network Design proposal for a University Problem: Suppose you are asked to design of a network infrastructure for a university. The university has 7 departments namely, IT, Finance, HR, Management, Faculty, students and R&D. The university also has an ADSL internet connection which is shared for the different departments. It is required that all the departments should have intercommunication. The R&D department should not have access to the internet. Each of the department contain 50-100 users. Explain your design giving...
Design your home network.  Experiment. Go beyond your home network. Design the network you want. Pick a...
Design your home network.  Experiment. Go beyond your home network. Design the network you want. Pick a networking problem from the internet and design the networking solution. Use lucidchart or vision.
You have been given the task of evaluating and recommending a viable accounting information system for...
You have been given the task of evaluating and recommending a viable accounting information system for the accounting and financial data of your company. As you begin to research this system, you realize that many departments are involved in the information system. You decide that selecting a team to assist you with your research would be the most beneficial approach for the company. This module, you begin your course project by selecting a team to assist you in finding an...
imagine you are a network engineer who has been hired to design a network for a...
imagine you are a network engineer who has been hired to design a network for a small company consisting of a headquarters office in Indianapolis, Indiana, and a branch office in Minneapolis, Minnesota. The company has hired you to design and build the network infrastructure from the ground up. Following is a brief summary of the business structure: Indianapolis, IN This office is the headquarters for the company. It has 61 employees divided across the following three departments: • Administration:...
Activity 1 - Network Design Proposal In this section, you are required to write a Network...
Activity 1 - Network Design Proposal In this section, you are required to write a Network Design Proposal. You will need to: 1. Describe the network design scenario that needs to be addressed. 2. Provide a network design solution. 3. Write a complete network design proposal. 4. Develop (implement) a high‐level solution showing important components of the solution using a virtualization tool.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT