scholarly journals Cloud – IAAS security threats and its possible mitigations

2018 ◽  
Vol 7 (1.7) ◽  
pp. 186
Author(s):  
R Priyadarshini ◽  
N Malarvizhi

Cloud IaaS, a virtual data center is an instant computing infrastructure provided and managed over the Internet. The provider owns the resource and maintains it in the level specified in the SLA. The user is permitted to use the resources as services like operating systems, security, networking, application developing servers, application deploying tools, databases, etc., on the basis of pay-per-use model. The providers and users both are concerned over integrity, privacy and security issues. This study distinguishes the issues identified with the cloud IaaS layer and strategies to overcome them to maximize the performance.

2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


Author(s):  
Loo Seng Neo

The growing pervasiveness of the internet and the rise of social media have revolutionised how individuals communicate and interact with one another. Serving as an effective conduit for communication, these technological advancements have also been exploited by individuals with malicious intent (e.g., criminals, violent extremists). As the world witnesses an upward trend of such crime and security concerns in the online sphere, it places the ‘responsibility' on intelligence and law enforcement agencies to respond with the appropriate technological interventions. Thus, this article will discuss how digital footprints can be leveraged to identify potential security threats, particularly for crime and security issues that will result in negative repercussion at the national level, such as acts of violent extremism and hate crimes.


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


Author(s):  
Sébastien Ziegler ◽  
Cédric Crettaz ◽  
Eunah Kim ◽  
Antonio Skarmeta ◽  
Jorge Bernal Bernabe ◽  
...  

2016 ◽  
Vol 4 (1) ◽  
pp. 90-103 ◽  
Author(s):  
Michael Adu Kwarteng ◽  
Michal Pilík

Abstract The advent of the Internet continues to open new frontiers in digital marketing. One visible impact of the Internet in marketing has been the growing increase in online transactions which profits marketers and seemingly satisfies customers. However, in developing countries, the potential of online shopping has not been fully explored, and in some cases, are just non-existent. Lack of online infrastructure has often been attributed to the slower growth in online transactions in Africa, however, the customers’ preparedness and inclination to use the service is ignored. .Against this backdrop, this study seeks to analyze consumers’ propensity to engage in online transactions with a focus on demographic attributes such as age, gender and education. Using customers in Ghana as a case study, key reasons as well as the demographics that fancy online transactions are revealed. The results indicate that delivery problems, poor internet connection, privacy and security issues are some of the reasons preventing customers to shop online


Sign in / Sign up

Export Citation Format

Share Document