Saturday, December 7, 2019

Cloud Computing Risk Assessment in Aztec

Question: Discuss about the Cloud Computing Risk Assessment in Aztec. Answer: Introduction: Aztec is an Australia based organisation. This organisation operates in the financial services sector. It wishes to deploy all its business critical application and data to a third-party cloud vendor. The report includes the review of migrating business-critical applications and their associated data sources to an external cloud hosting solution along with the risks associated with it. The review is done based on the financial service sector. It is obvious that implementing a technology has an effect on the present security controls (Latif et al., 2014). There are ten steps, which has been discussed in the study, helpful for migrating the risks of cloud computing. The study also holds the process of mitigating the risks. Data and information are the most crucial assets of any business (Furuncu Sogukpinar, 2015).. Review of Project: The project is assessed regarding the money related administration area, and it incorporates enterprises that have effectively sent the project in their business hone and picking up advantage from the project. The below process are the steps for successfully completing the project. Appropriate deployment mode selection: Contingent upon the way of the business application, one can pick between Software as a Service (Saas) or Platform as a Service (PaaS). If the application is a non-specific business application that could practically be a piece of a bigger business then paying little mind to the way of business, accounting is a utilitarian range that is a basic part of any business. Take, for example, accounting. On the off chance that the application meets this prerequisite, it is perfect to convey it as a SaaS application (Shahzad, 2014). Factoring cloud application for working seamlessly: The application is an accounting module, it is in all likelihood required to acknowledge information from outside applications. These could either be sent to the cloud, or they would be a project application (Almorsy, Grundy Muller, 2016). If the application gives a hearty arrangement of connectors/APIs to acknowledge such information trade then the best approach is to accept that Aztek's application WILL cooperate with outsider applications, and manufacture connectors for them from the outline organise itself. Whether SaaS or PaaS, build for failure: This guarantees the cloud application improvement is powerful in the case of disappointment. There are a few ways how we could consider disappointments the plan: Automating move down and recoup techniques Developing the cloud application with strings that resume on reboot Develop the cloud application as an arrangement of coupled modules, rather than building them as an arrangement of firmly incorporated modules (Anselmi, Ardagna Passacantando, 2014) Accumulate application database on the cloud through its utility: Where the application needs to get to information from a social database, it is perfect to store the social database additionally in the cloud. This maintains a strategic distance from the cost of delivery gigantic measures of information to and from the cloud, aside from affecting reaction time because of unresponsiveness (Almorsy, Grundy Muller, 2016). The best general guideline here is: progressive information is kept nearer to the application, and static information is kept nearer to the client eco-framework. Handling security: Aztek's cloud application occurrence should be an individual from at least one security aggregates as gave by the foundation supplier. These security gatherings are named sets of tenets that determine which entrance arrange activity ought to be conveyed to Aztek's application occasion. Aztek can indicate TCP and UDP ports, ICMP sorts and codes, and source addresses while overseeing security (Djemame et al., 2016). Security is without anyone else an endless point, however, a wide assortment of devices/methodologies achievable Software based firewalls Regular download of patches from any third party components utilised as a part of Aztek's application Developing test scripts that occasionally test the security settings of the application Cloud application improvement administrations should consider the above variables, to have an effective and adaptable usage. Conveying applications in the cloud calls for cautious contemplations of the variables above. In this period of 'tera', the advantages of cloud computing have achieved the doorstep of organisations both of all shapes and sizes (Drissi, Houmani Medromi, 2013). Applications on the cloud will see singing development in the years to come, an open door that application designers cannot stand to miss. Impact on Present Security Posture: The security posture or overall security plans for the cloud computing is completely different from the existing one. The organisations need to have additional elements in the security posture for securing the cloud access. Vormetric Data: One key differentiator is that Vormetric works with cloud suppliers and endeavours to secure information paying little mind to whether it is situated in physical, virtual, or cloud situations (Ahmed Saeed, 2014). This engineering empowers undertakings to control access to the information itself, even as the virtual machine relocates to the virtual and cloud world. Aztek can build up to get to arrangements and accomplish finish control of information in private, open, or cross breed cloud situations. By giving an answer that ensures both information and encryption keys, Vormetric Data Security gives the fundamental shields to shield organisations from confronting rupture warnings and ensures their most significant business resources their clients, image, and the main issue (Khan Al-Yasiri, 2016). Digital Certificate: A digital signature is an electronic connection connected to a program, database, or other electronic archive. The computerised endorsement orders the individual or substance that cloud it and the date and times that it was the cloud. The declaration can likewise recognise the reason of the authentication and the motivation behind the program, database, or electronic report to which it applies (Zissis Lekkas, 2012). In this way, a digital signature is a way to apply a computerised endorsement to projects, databases, or other electronic records so that a client of that program, database, or archive can affirm that the report originated from the underwriter and that it has not been adjusted since it was agreed upon. In the event that the program, database, or record is changed after it has been carefully marked, the mark is quickly expelled. This perspective implies that a client is guaranteed that no one can dispatch infections after the mark is connected (Manjus ha Ramachandran, 2015). A client should gain a computerised endorsement keeping in mind the end goal to give his or her database a digital signature. Hash Digest: A hash or message digest is a capacity that takes a subjectively measured message and profits a number based on the message's substance. Hash digest are in some cases utilised as a part of a blend with the private key or open key cryptography. This is a kind of one-way encryption, which applies a calculation to a message, to such an extent that the message itself cannot be recuperated (Yin, Liu Lee, 2014). Not at all like key-based cryptography, is the objective of the hash capacity not to encode information for later decryption, but rather to create some degree computerised unique mark of a message. The esteem coming about because of applying the hash capacity can be re-ascertained at the less than a desirable end, to verify that the message has not been altered amid transmission (Patel, Singh Jaiswal, 2015). At that point, key-based cryptography is connected to translate the message. Data Security in Cloud Computing: Aztec utilizes database assurance/review, Security Information and Event Management or SIEM solutions in terms of bringing data together about on-going activity. However, occasion connection and checking alone do not translate into security of information. At that time when consistency and direction issues are at an intact position, it is risky for accepting that gathering, checking, and putting away logs may provide shield the organization from cyber attacks, because those are responsive controls (Sookhak et al., 2017). In present environment, both information security and information firewalls approaching are essential to satisfactorily protect the project from fresh and various kinds of attacks. It is significant that CISOs actualize an ISS or information security system that provides a absolute firewall around the information itself in terms of completing assurance. Risk Assessment: Risk Name Description Mitigation Process Multi-tenancy It can be referred to sharing of computational assets, stockpiling, administrations, database, physical and intelligent access with different occupants dwelling on same physical or coherent stage at supplier's premises. This sharing of assets abuses the classification of occupants IT resources which prompt to the need of secure multi tenure. To convey secure multi-occupancy there ought to be a level of separation among inhabitant information and also area straightforwardness where occupants might not know about where their information is found as well as their procedure is inhabitant To have secure multitenancy stage, disconnection among occupants information and area straightforwardness where inhabitants have no learning or control over the particular area of assets to evade arranged attacks (AlJahdali et al., 2014). Always keep information at different area so that regardless of the possibility that at one place attack happens to go down is in other place isolation on PAAS ought to be done on running administrations and API, isolation on SAAS separate among exchange completed on the same occasion by various inhabitants, isolation on IAAS is on VM storage, memory system and reserve memory. Elasticity Recommends that purchasers can scale up or down assets allotted to assets in light of current request. The answer for this can is that information area ought to be inside the inhabitant's nation limits (Herbst, Kounev Reussner, 2013). Furthermore, the situation motors incorporate relief methodology where administrations are moved from logical or physical host then onto the next or starting with one cloud supplier then onto the next in order to meet requests and proficient use of the assets. DoS A DoS attack is an endeavour to make the administration's doled out to the authorised clients inaccessible. In such an attack, the server giving the administration is overflowed by a substantial number of solicitations, and thus the administration gets to be distinctly inaccessible to the authorised client. Here and there, when we attempt to get to a site we see that because of over-burdening of the server with the solicitations to get to the site, we cannot get to the site and watch errors Utilisation of an Intrusion Detection System (IDS) is the most well known strategy for guard against this kind of attacks. A barrier alliance is utilised as a part of for guarding against such attacks (Jaber et al., 2015). Every cloud is stacked with particular IDS. The distinctive interruption discovery frameworks work on the premise of information trade. If a particular cloud is under attack, the agreeable IDS alarms the entire framework. A choice on trustworthiness of a cloud is taken by voting, and the general framework performance is not hampered Cookie poisoning Cookie poisoning is the change of a cookie (individual information in a Web client's PC) by an assailant to increase unauthorised information about the client for purposes, for example, identity theft. This can be avoided either by performing regular cookie cleanup or implementing an encryption scheme for the cookie data. This can be achieved by the scheme introduced in (Ramachandran, Chang Li, 2015). The introduced scheme seem to act reasonably in confronting cookie poisoning attack. Google hacking Google App engine is one of the prestigious arrangement suppliers in the extent of cloud computing. This motor uses a circulated engineering named as Google geo-appropriated design. In Google Hacking attack, The programmer looks all the conceivable frameworks with an escape clause and discovers those having the provisos he wishes to hack upon. With a specific end goal to keep away from these dangers, application security ought to be surveyed at the different levels of the three administration conveyance models in the cloud: IaaS, PaaS and SaaS. If there should be an occurrence of an IaaS conveyance, demonstrate, cloud suppliers are for the most part not worried with the security arrangements connected with the client and the application's administration (Rahaman Islam, 2015). The accompanying focuses ought to be dealt with while outlining the application: Standard safety efforts must be actualized to defend against the basic vulnerabilities connected with the web. Custom usage of approval and verification plans ought not to be actualized unless they are tried appropriately. Move down strategies, for example, Continuous Data Protection (CDP) ought to be executed to stay away from issues with information recuperation if there should arise an occurrence of a sudden attack DDoS DDoS might be called a propelled form of DoS as far as denying the imperative administrations running on a server by flooding the goal separate with expansive quantities of parcels to such an extent that the objective server is not ready to deal with it. In DDoS, the attack is handed-off from various element systems which have as of now been bargained not at all like the DoS attack A swarm-based rationale for guarding against the DDoS attack. The utilisation of IDS in the virtual machine is proposed into shield the cloud from DDoS attacks. A SNORT like interruption discovery system is stacked onto the virtual machine for sniffing all traffics, either approaching or active (Jaber et al., 2015). Another strategy ordinarily used to prepare for DDoS is to have interruption location frameworks on all the physical machines which contain the client's virtual machines. This plan had been appeared to perform sensibly well in a Eucalyptus cloud Malicious Insiders The malicious insider risk is one that additions in significance the same number of suppliers still do not uncover how they procure individuals, how they give them access to resources or how they screen them. Straightforwardness is, for this situation, indispensable to a safe cloud offering, alongside consistence revealing and break warning. To stand up to this risk, one ought to Enforce strict store network administration and lead a complete provider evaluation (Modi et al., 2013). Another strong measure is to specify individual asset prerequisites as a major aspect of legitimate contracts, and require straightforwardness into general data security and additionally consistence announcing. Another helpful stride to take is to determine security break notice forms. Data Security: Data Security Methods: Authentication: Authentication in cloud computing guarantees that the correct substance or individual is accessing the given information from the cloud innovation supplier. At the point when verification is guaranteed in the cloud computing, it implies that the client's personality is demonstrated to the cloud specialist co-op while getting to the stored information in the cloud. Open and private sorts of the cloud are utilising different plans for verification with RSA. RSA cryptosystem acknowledged diverse models for validation like two-factor verification, knowledge-based confirmation, and versatile validation (Nagaraju Parthiban, 2016). Taken as an example, AWS or Amazon Web Services is focused on the classified information exchange between the web server and the program including virtual private cloud. In this setting distinctive validation plans are actualized, for example, multifactor confirmation, get to administration, AWS character. Figure 1 introduces the multifactor conf irmation method from AWS. There is likewise a system for verification that is permitting clients to utilise only one password in order to verify themselves to numerous administrations (Zhou et al., 2015). With this strategy, the clients are inclined to the honeypot and word reference attacks. The most acclaimed IT organisations are utilising this system like Google, Microsoft, and Facebook. Confidentiality: Confidentiality is a standout amongst the most imperative security components for clients' information assurance in the cloud. It incorporates encryption of the plaintext in figure message before the information is put away in the cloud. This system ensures the clients' information and even cloud specialist organisations cannot adjust or read the substance that is put away along these lines in the cloud. This sort of assurance is offered from Dell information security and encryption where clients' information is ensured when it is put away on the outer drive or media (Ryan, 2013). Encryption should be possible either utilising programming or equipment. Extraordinary advantage of this sort of security is that clients don't have to trouble with the authorise arrangements of Dell information assurance and encryption. Dell additionally utilises Transparent File Encryption to control the clients that are getting to the information. Wuala cloud is another seller that empowers encryption for the information in the cloud. Encryption is empowered here before PCs are sending the information to the cloud. This is phenomenal insurance because even the supplier can't get to the information. Creators in are proposing encryption strategy for cloud computing that depends on progressive quality. This proposed security procedure for privacy in cloud computing gives superior exhibitions, and awesome get to control (Almorsy, Grundy Muller, 2016). Creators in are proposing encryption technique where proprietors can control the information they have in the cloud. Confidentiality is additionally given by the merchant Online Tech which gets privacy in the cloud computing utilising encryption techniques (like Full Disk Encryption) that encode put away information on the hard plate all through the booting procedure. Entire Disk Encryption is additionally utilised for encoding the information with the notable AES (Advanced Encrypti on Standard) calculation. If the gadget that is utilising cloud computing innovation is lost or stolen there is additionally a bit locker secret key which ensures the information on the lost or stolen gadget. Access Control: Access control is imperative security instrument for empowering information insurance in the cloud computing. It guarantees that exclusively approved clients have entry to the asked for information that is put away in the cloud. There are diverse security methods that empower legitimate access control in the cloud computing. Interruption recognition frameworks, firewalls and isolation of commitments could be actualized on various system and cloud layers (Zhou et al., 2015). Firewall is empowering just substance that is shifted to go through the cloud structure. Firewall is normally arranged agreeing characterised security strategies set by the clients. Firewalls are identified with Demilitarised Zones (DMZ) which give extra security of the information. Authorizations: Authorization in the Cloud computing is critical for the clients when they log in to some cloud benefit since it empowers demonstrate off their personalities. Along these lines, approval is utilised after the verification. Oracle Database Vault is a case of a security strategy that empowers approval in the cloud. The vendor Oracle offers this security system. Application information from various managerial clients is ensured with this approval technique. Like this clients are shielding their information in the successful path from unapproved access. Authorizations in the cloud are additionally offered by VMware which coordinates specialist organisations' approaches with the corporate registries and diverse strategies (Ryan, 2013). Declarations or delicate tokens are utilised for approval of the end clients in a secure way. OASIS Cloud approval empowers security procedures given administration of approvals. Clients logs are kept up with this technique which gives area of the clients and data about the utilised gadgets from the clients. Conclusion: Through transmitting traditional business processes into cloud computing, the organisation can decrease the size of its data centre and reduce the cost of the operations. Despite all the cost related advantages, the cloud computing is beneficial for only a short time span. As the data needs to be transmitted to the cloud vendors server through the open internet connection, there are several risks that make this computing vulnerable to the cyber attacks. The hackers are continuously exploiting the security holes in the cloud computing. DoS and DDoS are the most severe threats. The mitigation technique for the threats are perfect and are able to make the organisation capable of avoiding most of the risks. Elasticity and multi-tenancy are two kinds of vulnerabilities and needed to be avoided as soon as possible. Data breach is one of the most fatal outcome of a cyber attack. As the data is completely stored in a different location, the inexperience of the cloud vendor can be a burden fo r Aztec. The hackers can remain in the cloud application for months and collect data without being noticed. That is why it is essential for Aztec to acquire the cloud computing rights from a renowned third party vendor. In terms of providing data security, Aztec must consider the provided components of data security. Providing data most security is one of the most crucial objective of could computing. Reference List: Aazam, M., Khan, I., Alsaffar, A. A., Huh, E. N. (2014). A cloud of Things: Integrating Internet of Things and cloud computing and the issues involved. InApplied Sciences and Technology (IBCAST), 2014 11th International Bhurban Conference on(pp. 414-419). IEEE. Ahmed, E. S. A., Saeed, R. A. (2014). A survey of big data cloud computing security.International Journal of Computer Science and Software Engineering (IJCSSE),3(1), 138-145. AlJahdali, H., Albatli, A., Garraghan, P., Townend, P., Lau, L., Xu, J. (2014). Multi-tenancy in cloud computing. InService Oriented System Engineering (SOSE), 2014 IEEE 8th International Symposium on(pp. 344-351). IEEE. Almorsy, M., Grundy, J., Muller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. Almorsy, M., Grundy, J., Mller, I. (2016). An analysis of the cloud computing security problem.arXiv preprint arXiv:1609.01107. AlZain, M. A., Soh, B., Pardede, E. (2013). A survey on data security issues in cloud computing: From single to multi-clouds.Journal of Software,8(5), 1068-1078. Anselmi, J., Ardagna, D., Passacantando, M. (2014). Generalized nash equilibria for saas/paas clouds.European Journal of Operational Research,236(1), 326-339. Djemame, K., Armstrong, D., Guitart, J., Macias, M. (2016). A risk assessment framework for cloud computing.IEEE Transactions on Cloud Computing,4(3), 265-278. Drissi, S., Houmani, H., Medromi, H. (2013). Survey: risk assessment for cloud computing.International Journal of Advanced Computer Science and Applications (IJACSA),4(12). Furuncu, E., Sogukpinar, I. (2015). Scalable risk assessment method for cloud computing using game theory (CCRAM).Computer Standards Interfaces,38, 44-50. Herbst, N. R., Kounev, S., Reussner, R. H. (2013). Elasticity in Cloud Computing: What It Is, and What It Is Not. InICAC(pp. 23-27). Jaber, A. N., Mohamad Fadli, Z., Ahmed, D., Ahmed, F. D., Mazlina, A. M. (2015). Security Everywhere Cloud: An Intensive Review of DoS and DDoS Attacks in Cloud Computing.Journal of Advanced Applied Sciences (JAAS),3(5), 152-158. Khan, N., Al-Yasiri, A. (2016). Framework for cloud computing adoption: A road map for Smes to cloud migration.arXiv preprint arXiv:1601.01608. Latif, R., Abbas, H., Assar, S., Ali, Q. (2014). Cloud computing risk assessment: a systematic literature review. InFuture Information Technology(pp. 285-295). Springer Berlin Heidelberg. Manjusha, R., Ramachandran, R. (2015). Secure authentication and access system for cloud computing auditing services using associated digital certificate.Indian Journal of Science and Technology,8(S7), 220-227. Modi, C., Patel, D., Borisaniya, B., Patel, A., Rajarajan, M. (2013). A survey on security issues and solutions at different layers of Cloud computing.The Journal of Supercomputing,63(2), 561-592. Nagaraju, S., Parthiban, L. (2016). SecAuthn: Provably secure multi-factor authentication for the cloud computing systems.Indian Journal of Science and Technology,9(9). Patel, S. C., Singh, R. S., Jaiswal, S. (2015). Secure and privacy enhanced authentication framework for cloud computing. InElectronics and Communication Systems (ICECS), 2015 2nd International Conference on(pp. 1631-1634). IEEE. Rahaman, M., Islam, M. M. (2015). A review on progress and problems of Quantum Computing as a Service (QCaaS) in the perspective of cloud computing.Global Journal of Computer Science and Technology,15(4). Ramachandran, M., Chang, V., Li, C. S. (2015). The improved cloud computing adoption framework to deliver secure services. InProceedings of ESaaSA 2015-2nd International Workshop on Emerging Software as a Service and Analytics, In conjuction with the 5th International Conference on Cloud Computing and Services Science-CLOSER 2015(pp. 73-79). Ryan, M. D. (2013). Cloud computing security: The scientific challenge, and a survey of solutions.Journal of Systems and Software,86(9), 2263-2268. Shahzad, F. (2014). State-of-the-art survey on cloud computing security Challenges, approaches and solutions.Procedia Computer Science,37, 357-362. Sookhak, M., Gani, A., Khan, M. K., Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing.Information Sciences,380, 101-116. Yin, X. C., Liu, Z. G., Lee, H. J. (2014). An efficient and secured data storage scheme in cloud computing using ECC-based PKI. InAdvanced Communication Technology (ICACT), 2014 16th International Conference on(pp. 523-527). IEEE. Zhou, J., Lin, X., Dong, X., Cao, Z. (2015). PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributedm-healthcare cloud computing system.IEEE Transactions on Parallel and Distributed Systems,26(6), 1693-1703. Zissis, D., Lekkas, D. (2012). Addressing cloud computing security issues.Future Generation computer systems,28(3), 583-592.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.