Auric Enterprise conducts metallurgical and mining operation in Australia. They want to move to the cloud to enhance their business activities for good. They should adopt the cloud platform provided by Microsoft Office 365 to carry out their business activities on the cloud.
This report will highlight the threats and the vulnerabilities that Auric can face while moving to the cloud platform. Also, the control measures to mitigate those risks will be showcased.
Auric Enterprises want to move to the Cloud as they want to enhance the business activities and also want to carry out their business activities in a secure manner [4]. They use IPv4 internet connectivity and a strong up-to-date firewall, however, if they migrate to the cloud they will have to face threats which must be addressed. At first, there is a chance of getting data breaches.
They use the MSSQL databases for storing the sensitive secretive data of their customers in their database. After migrating to the cloud, their cloud database will be controlled by third-party cloud vendor, if their database gets compromised then Auric will have to face devastating consequences [7]. Auric will have to pay fines of about $10,000,000. The data breach will also affect their brand name. They will lose reputation; they will lose the brand name. They will lose the customer base as well. Since they are opting to move to Microsoft Azure cloud platform, Auric will not have total control over their data, Microsoft even has the privilege to access the data, so the data is not cent percent authenticated [3]. Even though they use strong up-to-date firewall the risks still reside within.
Other than the data breaches there is still a chance of losing credentials. The enterprise’s systems use various kinds of authentication measures to safeguard their system and the database [6]. The authentication systems which is used widely applied and are quite popular are passwords and phone-based authentication. The passwords must be strong enough otherwise the data can be breached. But the enterprises use weak passwords in general which can be guessed easily and are easily recognizable. That makes the system more vulnerable to threats. Auric must implement a strong password to protect their database from the data breaches. Also, they must use two-way verification system to enhance the security of the database [8]. Auric CEO’s assistant must be aware of this fact and should not share the password and since every action is carried out online the password leaks will prove very costly to them. Often the insiders are great threats to the organization.
The hackers and the intruders can attack Auric system and can make the whole system vulnerable. Auric needs to use updated hardware, software and application programs, the outdated systems are more vulnerable to threats. Auric also needs to keep a backup of data. The malware attack can lead to havoc; the intruders can steal data can also delete data permanently [6]. Again the DDoS attack or ransomware attack can lead to vulnerabilities. The attackers hijacked one’s system and then disallow the authorized to gain access to their own system. The authorized users can only gain access to their system if they are willing to pay some handsome amount of money. Also after getting access to their system, there is no guarantee the data will be retrieved back [9]. That is why the intruders is a big threat to cloud technology.
The employees of Auric are not aware of the cloud technology and the cloud services, also the management team are not much knowledgeable, they need professional assistance and also need time to learn the cloud technology from scratch [1]. Initially, they will make blunders and thus they can face huge losses initially, they can lose the market share. That is why this is a great threat for the company.
The data breaches generally occur accidentally or they are carried out by the intruders. He breaches are quite difficult to recognise, thus to stay at the safe side Auric Enterprise must install antivirus software at their premises, the antivirus can protect Auric from any kind of threats and vulnerabilities [15]. The malware and the virus attack can be mitigated to a large extent simply by installing this software. The software can cater real-time protection. Auric can stay in peace by simply updating the antivirus software. The finance data of the database can be well secured.
The CEO of Auric Enterprise should be careful of the malicious insiders. It may happen that his assistant shares the passwords with others, and the CEO is completely unaware of that. He must monitor the system and the database regularly and should keep track of any unscrupulous activities within the system. Instead he gives full responsibility to his assistant [16]. Again, he should hire an assistant that knows English, in this way he can communicate well with his assistant.
The intruder attack can be mitigated or can be controlled by applying certain encryption procedures alongside firewall while conducting business activities on the cloud platform [13]. The data can be encrypted by Advanced Encryption Standard (AES) 256. Again, the network must be secure enough to carry out the cloud computing activities. All the data must be transmitted via secured HTTP success utilizing SSL [5]. Only the managers must be given the permission to access the entire database and the rest of the employees must be given control over certain areas of the database.
Auric must hire a professional who is knowledgeable about all the products of the cloud platform and who is expert in accessing the cloud platform [2]. The managers should learn all the aspects of the cloud technology and should help the subordinates and also encourage the subordinates so that they can learn the cloud technology as soon as possible and can use the technology in agile effective manner [13]. Though they will face issues initially, will make blunders, however they should adopt the cloud technology for good and this will certainly help them in long run.
SCADA system can be protected and secured if the system is well monitored by the managers and admins of Auric. The hardware and the software must be updated simultaneously the SCADA system should be built keeping in mind the software must comply with the hardware configuration [14]. Also in this case the managers should hire a professional who will assist the managers and his subordinates to apply the SCADA systems in an efficient way. Besides they should know the traffic type which is transmitting through network and analyzing the traffic the managers can take effective decisions [8]. Only the authorized users must be given the control to access the SCADA system completely. In this way the SCADA system can be secured.
5. Conclusion
It can be concluded from the above discourse that Auric can be greatly benefitted from the cloud technology and Microsoft cloud platform. Microsoft 365 Office Suite has the capabilities to offer them the best cloud solutions to scale up the business. Thus they should adopt the cloud technology for good. The threats associated with adopting the cloud technology have been discussed in this report. Also the vulnerabilities or the weakness of the cloud technology has been detailed in the report as well. The threats like data breaches, intruders attack, inadequate diligence have been elaborated. Again, the threats associated with SCADA systems have been showcased thus a detailed insight or the overview of the company’s business activities can be received. At last, the control measures to mitigate those five threats have been detailed.
6. References
[1] Hashizume, Keiko, David G. Rosado, Eduardo Fernández-Medina, and Eduardo B. Fernandez. “An analysis of security issues for cloud computing.” Journal of Internet Services and Applications 4, no. 1, 2013: 5.
[2] Islam, Tariqul, D. Manivannan, and Sherali Zeadally. “A classification and characterization of security threats in cloud computing.” Int. J. Next-Gener. Comput 7, no. 1, 2016.
[3] Chou, Te-Shun. “Security threats on cloud computing vulnerabilities.” International Journal of Computer Science & Information Technology 5, no. 3, 2013: 79.
[4] AlZadjali, Amira M., Ali H. Al-Badi, and Saqib Ali. “An Analysis of the Security Threats and Vulnerabilities of Cloud Computing in Oman.” In Intelligent Networking and Collaborative Systems (INCOS), 2015 International Conference on, pp. 423-428. IEEE, 2015.
[5] Xiao, Zhifeng, and Yang Xiao. “Security and privacy in cloud computing.” IEEE Communications Surveys & Tutorials 15, no. 2, 2013: 843-859.
[6] Zhang, Su, Xinwen Zhang, and Xinming Ou. “After we knew it: empirical study and modeling of cost-effectiveness of exploiting prevalent known vulnerabilities across iaas cloud.” In Proceedings of the 9th ACM symposium on Information, computer and communications security, pp. 317-328. ACM, 2014.
[7] Khalil, Issa M., Abdallah Khreishah, and Muhammad Azeem. “Cloud computing security: a survey.” Computers 3, no. 1, 2014: 1-35.
[8] Tari, Zahir. “Security and privacy in cloud computing.” IEEE Cloud Computing1, no. 1, 2014: 54-57.
[9] Rasheed, Hassan. “Data and infrastructure security auditing in cloud computing environments.” International Journal of Information Management34, no. 3, 2014: 364-368.
[10] Lin, Guoyuan, Danru Wang, Yuyu Bie, and Min Lei. “MTBAC: a mutual trust based access control model in cloud computing.” China Communications 11, no. 4, 2014: 154-162.
[11] Latif, Rabia, Haider Abbas, Saïd Assar, and Qasim Ali. “Cloud computing risk assessment: a systematic literature review.” In Future Information Technology, pp. 285-295. Springer, Berlin, Heidelberg, 2014.
[12] Jula, Amin, Elankovan Sundararajan, and Zalinda Othman. “Cloud computing service composition: A systematic literature review.” Expert Systems with Applications 41, no. 8, 2014: 3809-3824.
[13] Hutchings, Alice, Russell G. Smith, and Lachlan James. “Criminals in the Cloud: Crime, Security Threats, and Prevention Measures.” Cybercrime Risks and Responses: Eastern and Western Perspectives 2015: 146.
[14] Ali, Mazhar, Samee U. Khan, and Athanasios V. Vasilakos. “Security in cloud computing: Opportunities and challenges.” Information Sciences 305, 2015: 357-383.
[15] Mi, Qing, Zhen-tao Ni, and Xiao-duan Wang. “Research on security threats and Countermeasures for Cloud Computing.” 2015.
[16] McGrath, Michael P., Matthew Hicks, Thomas Wiest, and Daniel C. McPherson. “Controlling utilization in a multi-tenant platform-as-a-service (PaaS) environment in a cloud computing system.” U.S. Patent 8,850,432, issued September 30, 2014.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download