Question 20201116
Your Research Project on “Cloud computing” topic the surveillance state consists of two parts:
1 a Powerpoint presentation consisting of at least 12 slides not including title and references.
2. 750 word research paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.
Do not double space.
You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line.
There should be no lists – bulleted, numbered or otherwise.
Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.
Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software.
Date: November, 17 2020
PLAGIARISM SCAN REPORT
36%
Plagiarised
64%
Unique
910
Words
6767
Characters
Exclude Url : None
Content Checked For Plagiarism
Cloud Computing Abhilash Sangem New England Collage 11-17-2020 ? Cloud computing entails the delivery of computing resources and
other hosted services via the internet. Over recent years more companies are moving to cloud services and preferring to rent the cloud
services by paying for what they use only as opposed to owning their computing infrastructure. In return, the companies benefit by avoiding
upfront costs associated with owning and maintaining their information technology infrastructure. Alternatively, cloud service providers get
to benefit from large economies of scale through the provision of the same services to a wide range of customers. This paper will look at the
cloud service available, benefits, security risks, and available solutions for the same. There are three service models associated with cloud
computing. They include “software as a service, Platform as a Service, and Infrastructure as a Service.” Software as a service model
represents the largest market share regarding cloud computing with a report by Robert et al., (2020) projecting its sales to reach $117
billion by 2021. Software as a Service uses the internet to deliver applications to users directly. The applications are usually managed by a
third-party vendor hence upon seeking such services an organization avoids the need to download and install the software but instead runs
the program directly. Platform as a Service provides a platform that users can use for developing and delivering applications without the
need for working with Integrated Development Environments or installing development programs. Infrastructure as a Service provides
computing resources such as storage facilities, virtual private servers, processing power, and networks over the web. According to Kumar
et al., (2018) “the major benefits associated with cloud computing include cots, availability, flexibility, automation, reduced carbon footprint,
disaster recovery, and security.” Cloud computing provides an alternative way for accessing computing resources hence organizations save
on cost acquiring and maintaining computing infrastructure. Cloud services are usually available full-time hence ensuring continuity in
operations for organizations. In addition, cloud computing offers flexibility in terms of capacity as organizations can upscale or downscale
easily hence promoting efficiency. Automated solutions associated with cloud computing ensures continuous automatic update on software
and security hence workers can focus on other important things. Cloud computing also promotes sustainable efforts through the reduction
of carbon footprints by minimizing wastage of resources as organizations make use of only what they need. Cloud computing is faced with
several challenges regarding security. According to Robert et al., (2020) “some of the biggest security issues associated with cloud involve
misconfigurations, unauthorized access, hijacking accounts, and insecure interfaces.” Cloud misconfigurations are now a major security risk
for organizations adopting or moving to the cloud. They involve security risks that arise when cloud configuration is not done properly hence
exposing assets of the organization to possible security breaches. Currently, cloud misconfiguration represents the biggest threat that is
facing enterprise cloud security. The human factor in such misconfigurations is a concern for many with human error accounting for most
misconfigurations when it comes to cloud solutions. According to the 2018, IBM X-Force Report “data breaches with regard to cloud
misconfigurations increased by 424% due to human error.” Some of the challenges associated with misconfigurations include permission
controls, access restrictions, and AWS security misconfigurations. AWS security group involves misconfigurations with regard to EC2 server
instances which offers security between the port and protocol access level. A misconfiguration related to this group would allow an attacker
to gain access to the servers that are based in the cloud and have unauthorized access to the data. Access restrictions misconfigurations
happen when there are inadequate access restrictions that can prevent unauthorized access to the cloud infrastructure putting most
organizations around the world at risk. Permission controls misconfigurations come about when the organization fails to apply the least
privilege principle hence creating many security risks (Xu, 2017). As of such permissions relating to accounts of individuals are not limited
hence users or individuals can perform unrestricted actions that may not relate to the service they seeking on the platform hence ending up
compromising the security of the organization as a result. In conclusion, combating cloud security issues requires a shared effort between
both the customer and the cloud service provider. With regard to customers, strong access privileges ought to be enforced, strong
password policy and encryption solutions adopted. The service provider on the other end ought to ensure they avoid misconfigurations and
provide patching solutions. In addressing misconfigurations organizations need to adopt automation solutions. With more automated
information technology security tasks an organization is better placed and prepared to see to it that hybrid cloud complexities are reduced
and improved network visibility which will prevent any misconfigurations from happening. Additionally use of embedded security processes
and a mixture of human-controlled and fully autonomous methods in validating policy settings and conducting real-time network testing
should see to it that an organization has consistent security in its cloud platforms (Subramanian & Jeyaraj, 2018). ? References 2018 IBM X-
Force Report: Shellshock Fades, Gozi Rises, and Insider Threats Soar. (2018, April 4). Security Intelligence.
https://securityintelligence.com/2018-ibm-x-force-report-shellshock-fades-gozi-rises-and-insider-threats-soar/ Kumar, P. R., Raj, P. H., &
Jelciana, P. (2018). Exploring Data Security Issues and Solutions in Cloud Computing. Procedia Computer Science, 125, 691–697.
https://doi.org/10.1016/j.procs.2017.12.089 Robert, A., Gupta, A., Shenoy, V., Sitaram, D., & Kalambur, S. (2020). Predicting Hadoop
misconfigurations using machine learning. Software: Practice and Experience, 50(7), 1168–1183. https://doi.org/10.1002/spe.2790
Subramanian, N., & Jeyaraj, A. (2018). Recent security challenges in cloud computing. Computers & Electrical Engineering, 71, 28–42.
https://doi.org/10.1016/j.compeleceng.2018.06.006 Xu, T. (2017). Hardening Cloud and Datacenter Systems against Misconfigurations:
Principles and Tool Support. Escholarship.org. https://escholarship.org/uc/item/46h596p3
3% Plagiarised
https://en.wikipedia.org/wiki/IT_as_a_service
28% Plagiarised
… homework help>CC Final Project. 6/5/2020 Originality Report. https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?
https://www.homeworkmarket.com/files/plagrismreport-pdf-6129271
3% Plagiarised
2018 IBM X-Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar. The IBM X-Force team examined numerous
cyberthreats that shaped the threat landscape in 2017 and will continue to have an impact in 2018.
2018 IBM X-Force Report: Shellshock Fades, Gozi Rises and Insider Threats Soar
3% Plagiarised
Jan 15, 2018 — Exploring Data Security Issues and Solutions in Cloud Computing. January 2018; Procedia Computer Science 125:691-
697.
https://www.researchgate.net/publication/322350078_Exploring_Data_Security_Issues_and_Solutions_in_Cloud_Computing