TLS stands for transport layers security, it is a kind of cryptographic protocol that assures that communication over network is secure. All the website over internet make use of TLS to make sure that secure connection take place between the servers and web browsers. The main motive of TLS is to maintain confidentiality and privacy of data packets. The data is transmitted by encrypting it so that sensitive data is read only by the valid user. The also make use of public key cryptography to assure that communication take place between valid parties (Turner, 2014). It assures that connection is reliable as the message is transmitted by checking the authentication of data.
TLS is basically used to ensure that secure communication take place thus it make use of various methods for exchanging keys or data. It works on two protocols that are TLS handshake and TLS record. The major advantage of TLS is that it encrypts the information so that it is read only by valid user. It eliminates the issue of cybercrime and security breach. It make sure that even in some case is information is lot it is not read by the third party user. It offers authentication by validating the user. The valid users are certified and only they are allowed to access the information (Lennox & Holmberg, 2017). It is used in accepting payments and other sensitive data. There are various challenges that are faced due to TLS, if implantation is not proper than there are files that can be accessed without any permission. In such cases, it can causes security breach. The other problem is proxy caching, that is it is difficult to catch the encrypted data. Thus, this issue can be overcome by performing the encryption before the catching server. The cost of this is quiet high which is not acquired by everyone (Sheffer,Holz & Saint-Andre, 2015). TLS is proved to be beneficial as it prevents fraud attacks over the network. It also helps the organisation to rank their website at higher rank as it assures that website is secure, encrypted and confidential. It does not affect the speed of the website or it degrades the rank in case of certificate expiration (Santesson & Tschofenig, 2016). It is implemented over the OSI model , it has three main components that are used by TLS is Encryption, Authentication, and Integrity. It makes sure that data is visible only to valid user and hides the data from third party user. It also assures that data is transmitted to only authenticated user (Szymanski,. 2017). It also assures that integrity of data is maintained. The challenge that is faced due to TLS is that it is a complex process that affects the load time and computational power of the network (Wang, Shankar, Highland, Koduri & Odnert, 2016). Thus, the main issue is speed of operations somewhere decreases this problem can be mitigated by using TLS handshake. It also makes use of TLS session resumption to boost up the overall speed.
From the overall analyses, it was found that transport layer security is a security protocol that is used by the entire organisation that website to assure that privacy and security of data packet will be maintained. It secures all the communication that is taking place over the network, communication can be in the form of email, messaging and voice over IP. It is used to protect the system from all the attacks that might cause security breach and can affect the security and privacy of data. There are various advantages that are faced due to TLS, that is it boost up the overall security by making sure that Encryption, Authentication, and Integrity is maintained. On the other hand, some challenges that are faced due to TLS is increasing the computational power and load on the server. The speed of the network is also affected by TLS. Transport layer protocol is used to assure security of the network. Additionally, it assures that communication takes place between valid and authenticated user only.
HTTPS stands for Hypertext Transfer Protocol Secure. It is a variation of HTTP as it adds a security layer with HTTP so that secure transmission takes place over the network. HTTPS assure that a secure communication takes place between primary user and remote user (Felt, Barnes, King, Palmer, Bentzel & Tabriz, 2017). It provides security over the unsecured HTTP protocol. It assures that sensitive data can be transmitted over the network without any issue of security breach. HTTPS works in collaboration with various certified authorities to evaluate the overall security of the network (Kranch & Bonneau, 2015). In short, it can be said as an extended version of HTTP that maintains a secure connection on the internet.
The advantage of using HTTPS, is that whenever data passes to http the referral information is sacked. It preserves the sensitive information before passing it over the network. It cross checks that the website is one about which web server is talking (Anderson, Chi, Dunlop & McGrew, 2018). It makes the website more secure by eliminating the consequences of man in the middle attack or any other attack. It also safeguards all the gateways so that website is secured.
When moving a website to HTTPS various things need to be looked like blocking of some urls or displaying warning messages (Deering & Hinden, 2017). Some of the challenges that are faced in HTTPS are that it requires extra communication handshake protocols, which generally slow down the website. If user logs in to some wrong site it will make the website unsafe.
HTTPS and HTTP are different from each other in many terms. The data that is transmitted over web through http is not secured as anyone between the browser and server can read it easily (Lin, Fei, Zhu & Shi, 2014). On the other hand, Https make sure that communication is secure. The default port used by http is 80 and on the other hand the default port used by https is 443. The other difference is that http works at application layer and https works at transport layer (Lin, Fei, Zhu & Shi, 2014). Http does not require nay certification to operate and on the other hand https require SSL certification.
The server be set up for HTTPS transactions by following certain steps that include hosting a website with a unique IP address, buying a certificate, activating the certificate, installing the certificate and then updating the site so that it can make use of HTTPs.
HTTPS also protect a person for using public Wi-Fi at any local store as the website that is accessed mat not be secured. HTTPS allow a person to use only those websites that is secure enough and there are no chances of security threats (Economic times, 2017).
Yes, all Web traffic should use HTTPS as it guarantees to have a secure connection. It is used by all eth banking system so that transactions and information remain sensitive and confidential (Economic times, 2017). The entire website should make use of HTTPS it assures that information is not intercepted, manipulated or even stolen by hackers or any third party user.
Thus, it can be clearly stated that usage of https in increasing as compared to the use of http. The reason behind this is security offered by https platform.
The use of HTTPS has increased in all the past years due to its secure connection. It ensures the overall data security by encrypting the entire data and allows access to information to only valid users. The encryption of data packet is done between client and server only so that only actual user can access the information. It has some limitation too like it do not encrypt some information like host address and port numbers. Thus, the difference between http and https is analysed and it was found that https is a secure version of http. In aces of https all the communication that exists between browser and website is secured but in case of http the communication is not secure. Thus, in present time https is used to keep all the sensitive data confidential by maintain its integrity and availability.
Open source data loss prevention is strategies that make sure that end user are not allowed to send sensitive data or information outside the critical network (Danezis, et. al, 2015). It is basically used to control the data transfer by defining the administration control over the network. They undertake basic business rules so that all the confidential information is not accessed by nay third party user (Todkari, Deshpande & Bagwan, 2018). The concept of open data loss prevention came due to the increasing threats and need of data protection. Various tools are used to filter the information so that data remains protected.
In today’s era, organisations are focused on storing the data digitally this has increased the consequence of keeping track on large amount of data. It is a kind of security technology that assures that data remains sensitive and is used by the valid user. It allow user to send sensitive information from one location to another without having authentication (Hong, Pasman, Sachdeva, Markowski & Mannan, 2016). Open source data prevention is a way of blacklisting the access control of few server and users in order to maintain the confidentiality. Various policies were implemented to deal with the data loss, some of the policies and technology that were used are encryption, device control, DRM, identity & access management.
Features- The main features of using open source data protection is protection of personal information that requires securing all the confidential data. It is basically used to identify, classify and monitor all the basic activities (Staniforth, 2016). It also offers IP protection to an organisation by offering DLP solutions so that data can be protected against all the unwanted gateways. The other feature is data visibility as it helps the user to track the data over the network.
The use of open source data protection is increasing due to increase in data breaches. The benefit of using open data loss protection is increasing security over the network and assuring that no invalid user can access the data (Staniforth, 2016). It makes sure that sensitive data is protected and is not allowed to go in wrong hands.
Architecture- the DLP is placed between LAN and WAN so that traffic could be monitored. DLP policy creation is one of the few tasks in DLP architecture as it involves the whole company and not just the IT department. It looks at all the existing policies so that data is secured and remain confidential. The LAN connection is secured by a firewall. There are various attributes in the part of DLP like it has a management console, discovery appliance that finds out the error, DLP agents that keep record of all the sources and DLP gateways through which all the presses takes place.
Weakness that is faced due to open source data prevention is that it sometimes overlaps with the security features of firewall, intrusion detection and other security systems. The licence offered is also applicable for a limited duration and price is comparatively high.
Leakage of data is one of the major problems these days, to overcome this barrier open sources data leakage prevention is used. Thus in this case study, the major weakness that is faced due to the open sources data loss prevention product is discussed. Along with that, the architecture and its features are identified and discussed. Data loss prevention system is a way that blocks all the network and links through which security breach could occur. This is possible by analysing the network and then fixing up the bugs (Boucher, Wright, Cranny,Nault & Smith, 2015). It is a way of blacklisting the access control of few server and users in order to maintain the confidentiality
Cloud computing offers an opportunity to use other software’s and hardware’s by using their own desktop. It allows accessing all the services over internet. Cloud computing allows access to the services irrespective of the location of users. In terms of IT, cloud computing can be seen as a way of outsourcing the services over network (Rittinghouse & Ransome, 2016). Cloud computing model delivers services to users at every less investment. In short it can be stated that, cloud computing reduce the IT expenditure of a firm by providing access to user in a flexible way.
The cloud offers various form of services like SaaS (Software as a service), PaaS (Platform as a Service) and IaaS (Infrastructure as a Service). IaaS allow user to access the services remotely and is beneficial for all the firm as it make sure that user pay as per the use. PaaS allow user to develop and deploy any application as it offers integrated environment (Botta, De Donato, Persico & Pescapé, 2016). On the other hand, SaaS as a service allow user to access the application from any location and at any time.
Amazon virtual private cloud is a cloud service by amazon, it enable the clients to use amazon resources over the virtual network. It allows users to have a complete control over the environment by giving them permission to select their own IP address, create new subnets and configure their routing tables (Xia, Wang, Zhang, Qin, Sun & Ren, 2016). Amazon AWS is popular due to its simplicity, highly secure network and scalability and reliability offered by the cloud (Zissis & Lekkas, 2012). It offers multiple connectivity options by allowing user to directly connect to the pubic subnets.
There are various cloud computing services that can be compared on the basis of many factors.
Service/ Factors |
Amazon web service |
Google cloud |
Microsoft Azure |
Deployment |
It works over Elastic Compute Cloud (EC2) |
It works over compute engine |
It make use of virtual engines |
PaaS |
It uses elastic beanstalk |
It offers app engine flexible environment |
Cloud service |
Storage |
Storage gateway |
Sync the information |
storsimple |
Cross connectivity |
API gateway |
Cloud VPN |
VPN |
Database |
RDS |
Cloud SQL |
MySQL, Postgre SQL |
Security |
Identification and then offering access |
Cloud security |
Active directories |
Ease of purpose |
Ease of purchase |
Every organisation should consider cloud computing as it enhances the ability so that organisation can achieve their business goal. Cloud offers a way through which businesses can store file their file over a web-based interface and allow them to access as it time. Another benefit of using cloud computing is disaster recovery at much lower cost. Cloud based backups are done for security purpose (Beloglazov, Abawajy & Buyya, 2012). Every organisation to work on cloud based platforms as it reduces the IT cost and also scales down the operations. It also improves the flexibility of work practices by making automatic updates. The impression of cloud computing is positive as it allows organisation to have automatic software updates (Knorr & Gruman, 2008). It allow use to access the services from anywhere without any borders and make the data and information available to only authorised user. Cloud computing is a best way that helped organisation to store data and retrieve in an easy way.
There are some technical limitations that are faced by cloud computing networks. Downtime can be seen as one of the biggest limitation (Dillon, Wu & Chang, 2010). If in case some cloud platforms are hacked due to technical bugs it can cause a huge loss to an organisation. All the information and data is stored over internet thus there are high potential risk of vulnerabilities.
The risk associated with cloud computing is unauthorised access to information, security defects in the technology, vendor lock in, inability to track the data and risks are also related to lack of control.
Cloud computing is a method in which IT based services are delivered by permitting user to access the resources, tools, software’s from the server. It also permit user to gain access over the internet irrespective of their location. In this case, various cloud services ad discussed in a comparative manner. Cloud computing allow users to work remotely. Thus, various limitations that are faced by cloud due to technical issues are analysed. Cloud computing can be of any type it can be either a software as a service, platform as a service or infrastructure as a service.
Ransomware is a type of software that locks up the computer system by encryption and returns the actual data only when the data is decrypted (Krishnan, Bhagwat & Utpat, 2015). These attacks are increasing day by day and it arrives on the network due to emails attachment, storage devices and comprised website. Ransomware kits are the one that allow user to use software tools and generate bugs that may affect the capability of a network.
Some of the ransomware attacks that have occurred recently occurred are discussed below:
This attack was spread all over till September 2017 and it was difficult to identify that they accessed the patient’s information or not. Thus, all eth patients and clients were notified about the attack so that they can secure their sensitive information and become aware about it.
To protect the system from ransom ware some of the security measures need to be undertaken like, ensure that an antivirus is installed into the system so that it can defend the viruses and eliminate them to penetrate in the system (Sharma, Zawar & Patil, 2016). There is various advanced threat prevention designed to protect and safeguard the system from ransom ware (Tuttle, 2016). Other than that, security awareness campaigns are launched so that people become aware about all the possible threats. The data need to be backed up so that in case of failure it can easily be recovered. Patching is software that is available to fix up all the threats and vulnerabilities. Apart from that it is recommended that, user should not open emails from unknown sender and they should not access suspicious links (Byrne & Thorpe, 2017). Apart from that, it can be improved by assuring that data is transmitted over internet by encrypting them. All the above attacks, widespread over the network and caused security breach.
Conclusion
It can be concluded that ransom ware is one of the biggest cyber-crime that hits the business. It was found that in last years, it has affected many organisations by allowing hackers to access the information and sensitive data about the company. In this case study, few ransom ware attacks that occurred are discussed and how they affected the network and individual is listed. There are various security measures that are available, their motive is to protect the data and ensure that privacy of data packet is maintained. The organisation suffers from loss of productivity or may cause inconvenience to the costumers by diminishing the important information. Thus, it can be concluded that ransom ware attacks are increasing day by day. Ransom-related attacks moved from number 10 to number 5 in year 2016 by using Malware bytes detections method. That’s a significant increase in popularity but Malware bytes also lead to development of new ransom ware. Over the last 2017, there has been a shift away from ransom-related attacks to other attacks. Some of the ways through which attacks could be eliminated are listed above.
References
Ali, M., Khan, S. U., & Vasilakos, A. V. (2015). Security in cloud computing: Opportunities and challenges. Information sciences, 305, 357-383.
Anderson, B., Chi, A., Dunlop, S., & McGrew, D. (2018). Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption. arXiv preprint arXiv:1805.11544.
Beloglazov, A., Abawajy, J., & Buyya, R. (2012). Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future generation computer systems, 28(5), 755-768.
Botta, A., De Donato, W., Persico, V., & Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Future Generation Computer Systems, 56, 684-700.
Boucher, P., Wright, M., Cranny, T., Nault, G., & Smith, M. (2015). U.S. Patent No. 9,197,668. Washington, DC: U.S. Patent and Trademark Office, 67-90.
Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network Security, 2016(9), 5-9.
Byrne, D., & Thorpe, C. (2017, June). Jigsaw: An Investigation and Countermeasure for Ransomware Attacks. In European Conference on Cyber Warfare and Security (pp. 656-665). Academic Conferences International Limited.
Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L., Tirtea, R., & Schiffner, S. (2015). Privacy and Data Protection by Design-from policy to engineering. arXiv preprint arXiv:1501.03726.
Deering, S., & Hinden, R. (2017). Internet protocol, version 6 (IPv6) specification (No. RFC 8200).
Dillon, T., Wu, C., & Chang, E. (2010, April). Cloud computing: issues and challenges. In Advanced Information Networking and Applications (AINA), 2010 24th IEEE International Conference on (pp. 27-33). Ieee.
Economic times. (2017). Definition of ‘Https’. Retrieved from https://economictimes.indiatimes.com/definition/http
Felt, A. P., Barnes, R., King, A., Palmer, C., Bentzel, C., & Tabriz, P. (2017, August). Measuring HTTPS adoption on the web. In 26th USENIX Security Symposium (pp. 1323-1338).
Hong, Y., Pasman, H. J., Sachdeva, S., Markowski, A. S., & Mannan, M. S. (2016). A fuzzy logic and probabilistic hybrid approach to quantify the uncertainty in layer of protection analysis. Journal of Loss Prevention in the Process Industries, 43, 10-17.
Knorr, E., & Gruman, G. (2008). What cloud computing really means. InfoWorld, 7, 20-20.
Kranch, M., & Bonneau, J. (2015, February). Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning. In NDSS.
Krishnan, Y. N., Bhagwat, C. N., & Utpat, A. P. (2015, February). Fog computing—Network based cloud computing. In Electronics and Communication Systems (ICECS), 2015 2nd International Conference on (pp. 250-251). IEEE.
Lennox, J., & Holmberg, C. (2017). Connection-Oriented Media Transport over the Transport Layer Security (TLS) Protocol in the Session Description Protocol (SDP) (No. RFC 8122).
Lin, W., Fei, J., Zhu, Y., & Shi, X. (2014, November). A method of multiple encryption and sectional encryption protocol reverse engineering. In Computational Intelligence and Security (CIS), 2014 Tenth International Conference on (pp. 420-424). IEEE.
Rittinghouse, J. W., & Ransome, J. F. (2016). Cloud computing: implementation, management, and security. CRC press.
Santesson, S., & Tschofenig, H. (2016). Transport Layer Security (TLS) Cached Information Extension (No. RFC 7924).
Tschofenig, H., & Fossati, T. (2016). Transport layer security (tls)/datagram transport layer security (dtls) profiles for the internet of things (No. RFC 7925).
Sharma, M. P., Zawar, M. S., & Patil, S. B. (2016). Ransomware Analysis: Internet of Things (Iot) Security Issues, Challenges and Open Problems Inthe Context of Worldwide Scenario of Security of Systems and Malware Attacks. Int. J. Innov. Res. n Sci. Eng, 2(3), 177-184.
Sheffer, Y., Holz, R., & Saint-Andre, P. (2015). Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) (No. RFC 7525).
Sittig, D. F., & Singh, H. (2016). A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks. Applied clinical informatics, 7(2), 624.
Staniforth, A. (2016). Open source Intelligence and the protection of national security. In Open Source Intelligence Investigation (pp. 11-19). Springer, Cham.
Szymanski,. P. (2017). What is Transport Layer Security protocol?. Retrieved from https://www.networkworld.com/article/2303073/lan-wan/lan-wan-what-is-transport-layer-security-protocol.html.
Todkari, S. V., Deshpande, V. S., & Bagwan, A. B. (2018). Data Loss Prevention Scheme Using ADCN with Effective Tour Strategy in Wireless Sensor Network. In International Conference on Intelligent Computing and Applications (pp. 39-49). Springer, Singapore.
Turner, S. (2014). Transport layer security. IEEE Internet Computing, 18(6), 60-63.
Tuttle, H. (2016). Ransomware attacks pose growing threat. Risk Management, 63(4), 4.
Wang, J., Shankar, H., Highland, T., Koduri, N., & Odnert, D. (2016). U.S. Patent No. 9,237,168. Washington, DC: U.S. Patent and Trademark Office.
Xia, Z., Wang, X., Zhang, L., Qin, Z., Sun, X., & Ren, K. (2016). A privacy-preserving and copy-deterrence content-based image retrieval scheme in cloud computing. IEEE Transactions on Information Forensics and Security, 11(11), 2594-2608.
Zissis, D., & Lekkas, D. (2012). Addressing cloud computing security issues. Future Generation computer systems, 28(3), 583-592.
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download