Module 5
Module 5
When data are stored in digital form, they are more vulnerable than when they exist in
manual form.
Security refers to the policies, procedures, and technical measures used to prevent
unauthorized access, alteration, theft, or physical damage to information systems.
Controls consist of all the methods, policies, and organizational procedures that ensure
the safety of the organization's assets; the accuracy and reliability of its accounting
records; and operational adherence to management standards.
The Internet poses additional problems because it was explicitly designed to be easily
accessed by people on different computer systems. Information traveling over
unsecured media can be intercepted and misused. Fixed IP addresses serve as fixed
targets for hackers, and Internet software has become a means for introducing viruses
and malicious software to otherwise secure networks.
Wireless networks are even more vulnerable because radio frequency bands are easy to
scan. LANs that use the Wi-Fi (802.11b) standard can be easily penetrated by outsiders
with laptops, wireless cards, external antennae, and freeware hacking software. Service
set identifiers (SSID) identifying access points in a Wi-Fi network are broadcast multiple
times and can be picked up fairly easily by sniffer programs. In war driving,
eavesdroppers drive by buildings or park outside and try to intercept wireless network
traffic. The initial security standard developed for Wi-Fi, called Wired Equivalent
Privacy (WEP), is not very effective. WEP is built into all standard 802.11 products, but
users must turn it on, and many neglect to do so, leaving many access points
unprotected.
Many Wi-Fi networks can be penetrated easily by intruders using sniffer programs to
obtain an address to access the resources of a network without authorization.
Malicious software, or malware, includes threats such as computer viruses and worms,
and Trojan horses. A computer virus is rogue software that attaches itself to other
programs or data files in order to be executed, and may be highly destructive to files,
computer memory, and hard drives. Viruses are typically designed to spread from
computer to computer through e-mail attachments or copied files.
Worms are independent computer programs that copy themselves to computers over a
network independently from other computer programs or files, and therefore spread
more rapidly. A Trojan horse is an apparently benign program that actually performs
some hidden action such as installing malicious code or compromising the security of a
computer.
Spyware can also act as malicious software by obtaining information about users'
buying habits and infringing on privacy. Keyloggers record keystrokes made on a
computer to discover steal serial numbers for software and passwords.
In computer crime, the computer can be either the target of or the instrument of a crime.
The most economically damaging kinds of computer crime are DoS attacks, introducing
viruses, theft of services, and disruption of computer systems.
The U.S. Congress responded to the threat of computer crime in 1986 with the
Computer Fraud and Abuse Act. This act makes it illegal to access a computer system
without authorization. Most U.S. states and European nations have similar legislation.
Congress also passed the National Information Infrastructure Protection Act in 1996 to
make virus distribution and hacker attacks to disable Web sites federal crimes.
One concern is that terrorists or foreign intelligence services could exploit network or
Internet vulnerabilities to commit cyber terrorism or cyber warfare and cripple
networks controlling essential services such as electrical grids and air traffic control
systems.
The largest financial threats to businesses actually come from insiders, either through
theft and hacking or through lack of knowledge. Malicious intruders may sometimes
trick employees into revealing passwords and network access data through social
engineering. Employees can also introduce faulty data or improperly process data.
Software errors are also a threat to information systems and cause untold losses in
productivity. Hidden bugs or program code defects, unintentionally overlooked by
programmers working with thousands of line of programming code, can cause
performance issues and security vulnerabilities. Software vendors create lines of code
called patches to repair flaws without disrupting the software's operation.
The dictionary definition of the term professional ethics is: "Rules of conduct and ethics
obligating persons engaged in liberal professions." Indeed, in the most general terms, it
can be said that professional ethics is an applied term relating to the ways these
individuals and groups operate.
However, when dealing with the issue of "professional ethics", one must first define, or
at least clarify, the term "ethics" as a term existing in its own right. This article cannot
encompass the full scope of an in-depth philosophical definition; we will confine
ourselves to a practical clarification of the term, which will comprise the foundation of
this discussion.
Ethics
The origin of the term "ethics" is in the Greek language (ethos), and its meaning: "the
doctrine of morality" or "the doctrine of qualities." This is the title of a branch of
philosophy dealing with the moral value of man's conduct and with the rules and
principles that are intended to guide it. In other words: "a set of rules determining
appropriate and desirable conduct." The manner in which an individual conducts
himself in society is characterized by behavior based on accepted standards, or by
behavior that deviates from the norms of the society he belongs to, or operates in.
With respect to relations between individuals, the phrase: "do unto others as you would
have them do unto you" reflects the entire concept of ethics in one verse.
Notwithstanding, society will generally require a broad system of "values" in order to
phrase the rules of ethics that will guide its conduct.
"Qualities" are the attributes guiding the conduct of an individual, as he relates to the
world surrounding him (and to himself). The discussion on "man's good qualities" is as
long as the history of humankind, and is expressed in the Bible, in the literature of
various religions, in philosophy and in general literature along the ages.
"Values" are the tools we use for phrasing; they comprise a compass of sorts for
examining moral or ethical behavior. "Values" are a "yardstick for distinguishing
between good and bad."
The most important aspect for understanding the ethical issue lies in the fact that values
exist in unison, and not separately, or individually. Simplistically, we can say that the
greater the complexity of an individual's character, the 'denser' the set of values guiding
him when confronted with a moral or ethical dilemma. Such a dilemma is also created
when his aspirations, feelings, urge and personal needs clash with values. Generally
speaking, the resolution of ethical dilemmas will be based on grading the values.
The basic question at the core of the issue addressed in this article is: Does work in the
field of security qualify as a profession? Without relating to the regulatory aspect of this
issue, this question has a definite, unequivocal answer: Security is a profession, without
a doubt!
In the second half of the last century, threats of terrorism, increased violence and crime
generated the need to protect society, its organizations and assets, and the information
that is essential for its existence, as well as to enable the members of society to maintain
a normal daily routine. This need led to the development, in Israel and worldwide, of a
professional discipline that includes all the processes characterizing a profession.
Security is integrated into the activities of all the governmental systems and most of the
public and large private organizations, and plays an active role in ensuring that they are
able to fulfill their missions and goals.
Uniformity is still deficient in the civilian, business and public sectors in Israel. While
some organizations have security systems that are quite effective, the effectiveness of
others leaves much to be desired, when taking into consideration the resources placed
at their disposal. We identify cases in which the level of security does not correspond to
the level of the threat, or in which the security plan is not fully compatible with the
organization's goals and/or manner of operation.
Numerous persons work in the field of security – throughout the country, in all its
organizations – is they in the governmental, public or business sectors. They should
share a common language and undergo training that will provide them with the
knowledge and tools to plan, design, establish and manage effective security systems
that will properly address the relevant threats, within the constraints of the allocated
budget and resources, and the frameworks they operate in.
An organization whose security personnel undergo training will be the first to gain
from this process: in addition to being better prepared for emergencies, it will benefit
from enhanced management and more effective utilization of its resources, and will be
able to better serve the organization's employee population and of its guests and
visitors.
The first ethical rule of security should be not to employ a person who has not been
properly and officially trained, and who has not been certified. Indeed, the Security
Division of the Israel Police is presently taking action to formalize compulsory rules
governing the training of security managers.
The definition of security is: "The full range of proactive, preplanned and coordinated
activities that are carried out in a secured body with the aim of foiling attempts made
by hostile elements to plan and carry out malicious acts."
The work of a member of the security staff, and certainly that of a security manager, is
filled with ethical dilemmas resulting from the high level of friction with the various
units of the organization, from the security handling of those arriving at its gates, from
exposure to organizational and personal information, from handling irregular incidents
and suspicious persons and from the need to be vigilant and prepared to deal with any
threat, at any time.
We train security managers and senior security officers on a regular basis, and are also
frequently confronted with ethical issues, when analyzing past incidents, in discussions
and in exercises, when dealing with the reciprocal relations of the security manager and
even with the professional content relating to planning, routine activities and
emergencies.
Although the necessity to deal with ethical issues is not new, we have identified an
increasing need to develop an ethical code for security.
The news of late has been rich with stories of security breaches and ethical lapses that
have led to criminal behavior.
Consider the case of Bradley Manning, a United States Army soldier who was arrested
and charged in July, 2010 for transferring classified data onto his personal computer
and communicating national defense information to an unauthorized source, the
notorious WikiLeaks. The leaked material included 250,000 U.S. diplomatic cables. The
U.S. military has filed 22 charges against Manning which can carry the death sentence.
"These are criminal actions that perhaps go back to the failure of not acting on a certain
code of ethics," says Dorsey Morrow, general counsel and corporate secretary for (ISC)
2, a not-for-profit IT security training and certifying organization. "You cannot set what
is good ethical behavior in every scenario, but providing guidelines and relating
consequences can lead them to the right path."
IT security professionals are the custodians of information, says Frank Smith, CIO at
Booz Allen Hamilton, a leading IT security and management consulting firm.
"Therefore, they need to be made of the highest ethical fiber to effectively safeguard this
information and operate on decisions and judgment calls that are in the best interest of
the firm."
If a security professional fails to handle data in a manner that is expected, both the
organization and the practitioner can experience serious legal and criminal
consequences.
Ethics Defined
"Ethics have always been important in the past; it's however, the awareness of ethics
that is becoming more critical now,"
The danger with emerging technologies such as social media is that security
professionals can easily get into discussions about their work, which may divulge
confidential or non-public information. On one hand, security practitioners need to
participate in these discussions for the cause of promoting information security
management globally. And yet they have to avoid these discussions for fear of
information going viral or on record.
For example, Booz Allen Hamilton has implemented a code of ethics and training
program that highlight clear expectations of employee behavior in terms of the
organization's core values and adhered standards.
"These guidelines basically enable security professionals to recognize how they need to
act in circumstances that require an ethics decision," Smith says. For example: Someone
borrows an ID card because they forgot theirs. What could go wrong? How should
employees behave? What's the correct action to take?
This document should clearly outline expected behavior of employees based on the
values and standards of the organization. In the case of Booz Allen, these codes clearly
spell out what is acceptable employee behavior, for instance, in the event an employee
receives personally identified information from a client, or how the employee can
protect confidential client information.
"Employee Personal Data: Each of us must exercise extra caution when handling an
employee's personal data. We do not disclose current or former employee's personal
data to third parties other than confirmation of employment dates and position without
prior written consent from the employee or former employee unless the information is
required to fulfill a legitimate business need- such as employee benefits or as required
by law..."
Ethical Training
Security and control have become a critical, although perhaps unappreciated, area of
information systems investment. The longer computer systems are down, the more
serious the consequences for the firm. With increasing reliance on the Internet and
networked systems, firms are more vulnerable than ever to disruption and harm.
Businesses must protect not only their own information assets but also those of
customers, employees, and business partners. Recent U.S. government regulations
mandate the protection of data from abuse, exposure, and unauthorized access, and
include:
The Health Insurance Portability and Accountability Act (HIPAA) of 1996, which
requires members of the healthcare industry to retain patient information for six
years and ensure the confidentiality of those records
The Gramm-Leach-Bliley Act, which requires financial institutions to ensure the
security and confidentiality of customer data
The Sarbanes-Oxley Act, which imposes responsibility on companies and their
management to use internal controls to safeguard the accuracy and integrity of
financial information
Firms face new legal obligations for electronic records management and document
retention as well as for privacy protection. Electronic records management
(ERM) consists of policies, procedures, and tools for managing the retention,
destruction, and storage of electronic records.
Security, control, and electronic records management have become essential for
responding to legal actions. Much of the evidence today for stock fraud, embezzlement,
theft of company trade secrets, computer crime, and many civil cases is in digital form.
Legal cases today increasingly rely on evidence represented as computer data stored on
portable floppy disks, CDs, and computer hard disk drives, as well as in e-mail, instant
messages, and e-commerce transactions over the Internet. E-mail is currently the most
common type of electronic evidence.
Various tools and technologies used to help protect against or monitor intrusion include
authentication tools, firewalls, intrusion detection systems, and antivirus and
encryption software.
Access control consists of all the policies and procedures a company uses to prevent
improper access to systems by unauthorized insiders and
outsiders. Authentication refers to the ability to know that a person is who he or she
claims to be. Access control software is designed to allow only authorized persons to
use systems or to access data using some method for authentication. New
authentication technologies include:
Token: A physical device similar to an identification card that is designed to
prove the identity of a single user.
Smart card: A device about the size of a credit card that contains a chip formatted
with access permission and other data.
Biometric authentication: Compares a person's unique characteristics, such as
fingerprints, face, or retinal image, against a stored set profile.
A firewall is a combination of hardware and software that controls the flow of incoming
and outgoing network traffic and prevents unauthorized communication into and out
of the network. The firewall identifies names, Internet Protocol (IP) addresses,
applications, and other characteristics of incoming traffic. It checks this information
against the access rules programmed into the system by the network administrator.
There are a number of firewall screening technologies:
Packet filtering examines fields in the headers of data packets flowing between
the network and the Internet, examining individual packets in isolation.
Stateful inspection determines whether packets are part of an ongoing dialogue
between a sender and a receiver.
Network Address Translation (NAT) conceals the IP addresses of the
organization's internal host computer(s) to protect against sniffer programs
outside the firewall.
Application proxy filtering examines the application content of packets. A proxy
server stops data packets originating outside the organization, inspects them,
and passes a proxy to the other side of the firewall. If a user outside the company
wants to communicate with a user inside the organization, the outside user first
"talks" to the proxy application and the proxy application communicates with the
firm's internal computer.
A CORPORATE FIREWALL
The firewall is placed between the firm’s private network and the public Internet or
another distrusted network to protect against unauthorized traffic.
Intrusion detection systems feature full-time monitoring tools placed at the most
vulnerable points of corporate networks to detect and deter intruders continually.
Scanning software looks for patterns indicative of known methods of computer attacks,
such as bad passwords, checks to see if important files have been removed or modified,
and sends warnings of vandalism or system administration errors.
Antivirus software is designed to check computer systems and drives for the presence
of computer viruses. However, to remain effective, the antivirus software must be
continually updated.
Vendors of Wi-Fi equipment have developed stronger security standards. The Wi-Fi
Alliance industry trade group's 802.11i specification tightens security for wireless LAN
products.
Data is encrypted by applying a secret numerical code, called an encryption key, so that
the data are transmitted as a scrambled set of characters. To be read, the message must
be decrypted (unscrambled) with a matching key. There are two alternative methods of
encryption:
Symmetric key encryption: The sender and receiver create a single encryption
key that is shared.
Public key encryption: A more secure encryption method that uses two different
keys, one private and one public.
A public key encryption system can be viewed as a series of public and private keys
that lock data when they are transmitted and unlock the data when they are received.
The sender locates the recipient’s public key in a directory and uses it to encrypt a
message. The message is sent in encrypted form over the Internet or a private network.
When the encrypted message arrives, the recipient uses his or her private key to decrypt
the data and read the message.
Digital signatures and digital certificates help with authentication. A digital signature is
a digital code attached to an electronically transmitted message that is used to verify the
origin and contents of a message. Digital certificates are data files used to establish the
identity of users and electronic assets for protection of online transactions. A digital
certificate system uses a trusted third party known as a certificate authority (CA) to
validate a user's identity. The digital certificate system would enable, for example, a
credit card user and a merchant to validate that their digital certificates were issued by
an authorized and trusted third party before they exchange data. Public key
infrastructure (PKI), the use of public key cryptography working with a certificate
authority, is a principal technology for providing secure authentication of identity
online.
DIGITAL CERTIFICATES
Digital certificates help establish the identity of people or electronic assets. They protect
online transactions by providing secure, encrypted, online communication.
In today’s connected world, almost everyone has at least one Internet-connected device.
With the number of these devices on the rise, it is important to implement a security
strategy to minimize their potential for exploitation. Internet-connected devices may be
used by nefarious entities to collect personal information, steal identities, compromise
financial data, and silently listen to—or watch—users. However, taking a few
precautions in the configuration and use of your devices can help prevent this type of
activity.
Whether it’s a home or business network, the risks to an unsecured wireless network
are the same. Some of the risks include:
Piggybacking
If you fail to secure your wireless network, anyone with a wireless-enabled computer in
range of your access point can utilize your connection. The typical indoor broadcast
range of an access point is 150 – 300 feet. Outdoors, this range may extend as far as 1,000
feet. So, if your neighborhood is closely settled, or if you live in an apartment or
condominium, failure to secure your wireless network could potentially open your
internet connection to many unintended users. These users may be able to conduct
illegal activity, monitor and capture your web traffic, or steal personal files.
Wardriving
In an evil twin attack, an adversary gathers information about a public network access
point, and then sets up their system to impersonate it. The adversary uses a broadcast
signal stronger than the one generated by the legitimate access point, then,
unsuspecting users connect using the stronger signal. Because the victim is connecting
to the internet through the attacker’s system, it’s easy for the attacker to use specialized
tools to read any data the victim sends over the internet. This data may include credit
card numbers, username and password combinations, and other personal information.
Always confirm the name and password of a public Wi-Fi hotspot prior to use. This will
ensure you are connecting to a trusted access point.
Wireless Sniffing
Many public access points are not secured and the traffic they carry is not encrypted.
This can put your sensitive communications or transactions at risk. Because your
connection is being transmitted “in the clear,” malicious actors could use sniffing tools
to obtain sensitive information such as passwords or credit card numbers. Ensure that
all the access points you connect to use at least WPA2 encryption.
An unsecured public wireless network combined with unsecured file sharing could
allow a malicious user to access any directories and files you have unintentionally made
available for sharing. Ensure that when you connect your devices to public networks
that you deny sharing files and folders. Only allow sharing on recognized home
networks, and only while it is necessary to share items. When not needed, ensure that
file sharing is disabled. This will help prevent an unknown attacker from accessing your
device’s files.
Shoulder Surfing
In public areas malicious actors can simply glance over your shoulder as you type. By
simply watching you, they can steal sensitive or personal information. Screen protectors
which prevent shoulder-surfers from seeing your device screen can be purchased for
little money. For smaller devices, such as phones, be cognizant of your surroundings
while viewing sensitive information or entering passwords.
Not all attackers rely on gaining access to your data via wireless means. By physically
stealing your device, attackers could have unrestricted access to all of its data, as well as
any connected cloud accounts. Taking measures to protect your devices from loss or
theft is important, but should the worst happen, a little preparation may protect the
data inside. Most mobile devices, including laptop computers, now have the ability to
fully encrypt their stored data—making devices useless to attackers who cannot
provide the proper password or PIN. In addition to encrypting device content, it is also
advisable to configure your device’s applications to request login information before
allowing access to any cloud-based information. Lastly, individually encrypt or
password-protect files that contain personal or sensitive information. This will afford
yet another layer of protection in the event an attacker is able to gain access to your
device.
ENCRYPTION
In computing, encryption is the method by which plaintext or any other type of data is
converted from a readable form to an encoded version that can only be decoded by
another entity if they have access to a decryption key. Encryption is one of the most
important methods for providing data security, especially for end-to-end protection of
data transmitted across networks.
Encryption is widely used on the internet to protect user information being sent
between a browser and a server, including passwords, payment information and other
personal information that should be considered private. Organizations and individuals
also commonly use encryption to protect sensitive data stored on computers, servers
and mobile devices like phones or tablets.
Symmetric-key ciphers, also referred to as "secret key," use a single key, sometimes
referred to as a shared secret because the system doing the encryption must share it
with any entity it intends to be able to decrypt the encrypted data. The most widely
used symmetric-key cipher is the Advanced Encryption Standard (AES), which was
designed to protect government classified information.
Symmetric-key encryption is usually much faster than asymmetric encryption, but the
sender must exchange the key used to encrypt the data with the recipient before the
recipient can perform decryption on the cipher text. The need to securely distribute and
manage large numbers of keys means most cryptographic processes use a symmetric
algorithm to efficiently encrypt data, but use an asymmetric algorithm to securely
exchange the secret key.
Asymmetric cryptography, also known as public key cryptography, uses two different
but mathematically linked keys, one public and one private. The public key can be
shared with everyone, whereas the private key must be kept secret. The RSA encryption
algorithm is the most widely used public key algorithm, partly because both the public
and the private keys can encrypt a message; the opposite key from the one used to
encrypt a message is used to decrypt it. This attribute provides a method of assuring
not only confidentiality, but also the integrity, authenticity and no reputability of
electronic communications and data at rest through the use of digital signatures.
Benefits of encryption
The primary purpose of encryption is to protect the confidentiality of digital data stored
on computer systems or transmitted via the internet or any other computer network. A
number of organizations and standards bodies either recommend or require sensitive
data to be encrypted in order to prevent unauthorized third parties or threat actors from
accessing the data. For example, the Payment Card Industry Data Security
Standard requires merchants to encrypt customers' payment card data when it is both
stored at rest and transmitted across public networks.
Modern encryption algorithms also play a vital role in the security assurance of IT
systems and communications as they can provide not only confidentiality, but also the
following key elements of security:
Types of encryption
Traditional public key cryptography depends on the properties of large prime numbers
and the computational difficulty of factoring those primes. Elliptical curve
cryptography (ECC) enables another kind of public key cryptography that depends on
the properties of the elliptic curve equation; the resulting cryptographic algorithms can
be faster and more efficient and can produce comparable levels of security with shorter
cryptographic keys. As a result, ECC algorithms are often implemented in internet of
things devices and other products with limited computing resources.
Some applications tout the use of end-to-end encryption (E2EE) to guarantee data being
sent between two parties cannot be viewed by an attacker that intercepts the
communication channel. Use of an encrypted communication circuit, as provided by
Transport Layer Security (TLS) between web client and web server software, is not
always enough to insure E2EE; typically, the actual content being transmitted is
encrypted by client software before being passed to a web client, and decrypted only by
the recipient.
Encryption was almost exclusively used only by governments and large enterprises
until the late 1970s when the Diffie-Hellman key exchange and RSA algorithms were
first published -- and the first personal computers were introduced. By the mid-1990s,
both public key and private key encryption were being routinely deployed in web
browsers and servers to protect sensitive data.
Encryption is now an important part of many products and services, used in the
commercial and consumer realms to protect data both while it is in transit and while it
is stored, such as on a hard drive, Smartphone or flash drive (data at rest).
Devices like modems, set-top boxes, smartcards and SIM cards all use encryption or
rely on protocols like SSH, S/MIME, and SSL/TLS to encrypt sensitive data. Encryption
is used to protect data in transit sent from all sorts of devices across all sorts of
networks, not just the internet; every time someone uses an ATM or buys something
online with a Smartphone, makes a mobile phone call or presses a key fob to unlock a
car, encryption is used to protect the information being relayed. Digital rights
management systems, which prevent unauthorized use or reproduction of copyrighted
material, are yet another example of encryption protecting data.
Encryption is usually a two-way function, meaning the same algorithm can be used to
encrypt plaintext and to decrypt cipher text. A cryptographic hash function can be
viewed as a type of one-way function for encryption, meaning the function output
cannot easily be reversed to recover the original input. Hash functions are commonly
used in many aspects of security to generate digital signatures and data integrity
checks. They take an electronic file, message or block of data and generate a short
digital fingerprint of the content called a message digest or hash value. The key
properties of a secure cryptographic hash function are:
The ciphers in hash functions are optimized for hashing: They use large keys and
blocks, can efficiently change keys every block and have been designed and vetted for
resistance to related-key attacks. General-purpose ciphers used for encryption tend to
have different design goals. For example, the symmetric-key block cipher AES could
also be used for generating hash values, but its key and block sizes make it nontrivial
and inefficient.
For any cipher, the most basic method of attack is brute force; trying each key until the
right one is found. The length of the key determines the number of possible keys, hence
the feasibility of this type of attack. Encryption strength is directly tied to key size, but
as the key size increases so, too, do the resources required to perform the computation.
Attackers may also attempt to break a targeted cipher through cryptanalysis, the
process of attempting to find a weakness in the cipher that can be exploited with a
complexity less than a brute-force attack. The challenge of successfully attacking a
cipher is easier if the cipher itself is already flawed. For example, there have been
suspicions that interference from the National Security Agency weakened the Data
Encryption Standard algorithm, and following revelations from former NSA analyst
and contractor Edward Snowden, many believe the NSA has attempted to subvert other
cryptography standards and weaken encryption products.
More recently, law enforcement agencies such as the FBI have criticized technology
companies that offer end-to-end encryption, arguing that such encryption prevents law
enforcement from accessing data and communications even with a warrant. The FBI has
referred to this issue as "Going Dark," while the U.S. Department of Justice has
proclaimed the need for "responsible encryption" that can be unlocked by technology
companies under a court order.
What is cloud computing?
Conventional business programs have always been very complicated and costly. The
quantity and wide range of hardware and software required to conduct them are
daunting. You want a whole team of specialists to set up, configure, test, conduct,
protected, and update them.
When you multiply this effort across dozens or hundreds of programs, it's easy to see
why the biggest businesses with the best IT departments are not getting the programs
they want. Small and midsize companies don't stand a opportunity.
With cloud computing, you eliminate those headaches that come with storing your own
data, as you are not handling software and hardware -- that becomes the responsibility
of an experienced vendor like Sales force. The shared infrastructure means it works just
like a utility: You only pay for what you need, updates are automatic, and scaling up or
down is simple.
Cloud-based apps may be up and running in weeks or days, and they cost less. Using a
cloud app, you simply open a browser, log in, personalize the program, and begin
using it.
Businesses are running all sorts of programs in the cloud, such as customer relationship
management (CRM), HR, accounting, and much more. Some of the world's largest
companies moved their software to the cloud using Sales force after rigorously testing
the security and reliability of our infrastructure.
Constantly dig deeper when evaluating cloud offerings and keep in mind that if you
have to buy and manage software and hardware, what you're taking a look at is not
actually cloud computing but a cloud that is false.
The branch of cloud computing which allows users to develop, run, and manage
applications without having to get caught up in code, infrastructure, storage and so
forth.
There are lots of types of PaaS. Every PaaS alternative is public, private, or a hybrid
combination of both. Public PaaS is hosted at the cloud, and its infrastructure is handled
by the supplier. Private PaaS, on the other hand, is placed in on site servers or personal
networks, and is maintained by the consumer. Hybrid PaaS uses elements from the
public and private, and is capable of executing applications from several cloud
infrastructures.
When picking a PaaS alternative, the most significant considerations beyond how it's
hosted are how it integrates with existing data systems, which programming languages
it supports, and what application-building tools it offers, how customizable or
configurable it is, and how effectively it's supported by the provider.
As digital technology grow ever more powerful and accessible, programs and mobile
platforms are becoming nearly universally prevalent. Businesses are benefiting from
new PaaS abilities to further outsource jobs that would have otherwise relied on
neighborhood solutions. This is made possible through improvements in computing.
Traditional business applications have always been quite complex and costly. The
amount and variety of hardware and software necessary to conduct them are daunting.
You want a whole team of experts to set up, configure, test, run, protected, and update
them.
If you multiply this effort across dozens or hundreds of programs, it's easy to see why
the biggest companies with the best IT departments aren't getting the apps they need.
Little and mid-sized businesses don't stand a chance. The significance of cloud-hosted
information makes it an essential tool for these kinds of situations.
Adaptable
Cloud computing permits for flexible applications and software which are
customizable, while allowing owners control over the center code.
Multitenant
Reputable
Because it is hosted by a third party, businesses and other users have greater assurance
of reliability, and if there are issues, easy access to customer support.
Scalable
With the Web of Things, it is essential that applications functions across every device
and integrates with other programs. Cloud software can provide this.
Safe
The woes of Security, Data Loss, Performance & Cost in the Cloud
Although the title of this article may look ambiguous to the untutored, it will strike a
chord with those acquainted with cloud computing fundamentals. They are trending
topics in the realm of cloud computing and are actively debated in forums and social
circles. The crux of this article would be to ascertain the accuracy of these so called
“inherent drawbacks” of cloud computing.
1- Security
The most compelling challenge for someone attempting to switch from their existing
computing module to the cloud is to ascertain how secure cloud computing is.
Aficionados of conventional computing often allege that the extensive use of
virtualization, which is a fundamental tenant of cloud computing, only adds viable
security risks. Virtualization software might be compromised which could jeopardize
the entire infrastructure which includes cloud computing, storage and networking.
2- Performance
3- Cost
Cloud computing environments irrespective of their flavor provide stringent data loss
prevention and disaster recovery measures. Client’s data hosted in the cloud is
routinely backed up and stored safely so it can be readily accessed in case of emergency.
Thanks to the virtualization aspect (which is uselessly criticized by conventional
computing proponents) it is possible to maintain an identical copy of the entire setup
including the operating system, applications, patches and data.
When processing takes place in the cloud, accountability and responsibility for
protection of sensitive data still reside with the company owning that data.
Understanding how the cloud computing provider organizes its services and manages
the data is critical. The Interactive Session on Technology describes how even
sophisticated Web-based firms can experience security breakdowns. Cloud computing
is highly distributed. Cloud applications reside in large remote data centers and server
farms that supply business services and data management for multiple corporate
clients. To save money and keep costs low, cloud computing providers often distribute
work to data centers around the globe where work can be accomplished most
efficiently. When you use the cloud, you may not know precisely where your data are
being hosted.
If mobile devices are performing many of the functions of computers, they need to be
secured like desktops and laptops against malware, theft, accidental loss, unauthorized
access, and hacking attempts. Mobile devices accessing corporate systems and data
require special protection. Companies should make sure that their corporate security
policy includes mobile devices, with additional details on how mobile devices should
be supported, protected, and used. They will need mobile device management tools to
authorize all devices in use; to maintain accurate inventory records on all mobile
devices, users, and applications; to control updates to applications; and to lock down or
erase lost or stolen devices so they can’t be compromised. Firms should develop
guidelines stipulating approved mobile platforms and software applications as well as
the required software and procedures for remote access of corporate systems.
Companies should encrypt communication whenever possible. All mobile device users
should be required to use the password feature found in every smart phone. Mobile
security products are available from Kaspersky, Lookout, and Droid Security. Some
companies insist that employees use only company-issued smart phones. BlackBerry
devices are considered the most secure because they run within their own secure
system. But, increasingly, companies are allowing employees to use their own smart
phones, including iPhones and Android phones, for work, to make employees more
available and productive (see the Chapter 5 discussion of BYOD). Protective software
products, such as the tools from Good Technology, are now available for segregating
corporate data housed within personally owned mobile devices from the device’s
personal content.
Good testing begins before a software program is even written by using a walkthrough
a review of a specification or design document by a small group of people carefully
selected based on the skills needed for the particular objectives being tested. Once
developers start writing software programs, coding walkthroughs also can be used to
review program code. However, code must be tested by computer runs. When errors
are discovered, the source is found and eliminated through a process called debugging.
You can find out more about the various stages of testing required to put an
information system into operation