Research Paper: Survivable Next-Generation Internet

Pages: 7 (2202 words)  ·  Bibliography Sources: 5  ·  Level: College Junior  ·  Topic: Education - Computers  ·  Buy This Paper

SAMPLE EXCERPT:

[. . .] If fellow colleagues have some sensitive information present on their laptop, another employee can send that information to the rival company. By this way, they are not only harming the individual user but the company as well. Therefore, the company and the individual user are both at risk for breach of sensitive information. These sorts of breach can harm the company because it was sensitive information that was sent to the rival company. Furthermore, the individual user will be most probably fired because of his lack of responsibility.

Compare and Contrast

As mentioned before, cloud computing brings about large scale services to the enterprise users but they also bring large scale damage opportunities to the hacks out there. If a hacker only has his own limited hardware, it might take him a long time to attain an encryption key. However, if he has the facility to use an array of cloud servers, he might able to get that encryption key within a matter of minutes. Therefore, it is possible that these cloud hackers can use servers to serve malware, distribute their pirated software and even launch DdOs attacks.

It would be interesting to discuss the motive of attack or breach of privacy in both forms of attacks. In large organizations scams and breeches, the aim is usually a financial one. The attacking person is not just an individual but a proper group or organization made only for this purpose. They carry out cyber-attacks to earn millions and billions overnight. They hack into these accounts and transfer money into their accounts. Since majority of these attacks are carried out online and in such a way that they cannot be traced or recovered.

Another major difference is the severity of both the attacks. When it comes to individual attacks, the severity might be a lot but it is only taking the offending person with them. For instance, a user downloaded malicious media or went on to a malicious site, only his credentials or password would be affected. Same cannot be stated about breaches in the company networks or shared networks. A breach of security in one computer can lead to privacy breach in all the computers. Furthermore, as mentioned above, the motive in company attacks is a financial one. The end result would be massive amounts of damage to the company that can lead to loss and an ultimate setback for all the employees in the organization.

Therefore, it is clear that there is more risk of privacy and safety breach when it comes to shared account and company systems. These systems are widespread and have very sensitive information inside them.

Conclusion

It should be seen that safety and maintenance of privacy is important whether it concerns an individual or an entire organizations. Everyone has a right to keep their personal, financial and professional detail safe from other people. Even though information technology has made our life more efficient and easy, it has also made it more vulnerable to attack. All of these things can be prevented if proper security software's are applied and if people are more careful about their actions on the World Wide Web. For employees that are hired in large organizations, they are recommended to work safely and not downloaded malicious things onto the system (Ho et.al, 2004) It is both the company and the individual person's job to make sure that their actions don't instigate a data breach or an attack on the security of the system.

References

Colombe, J., & Stephens, G. (2004). Statistical profiling and visualization for detection of malicious insider attacks on computer networks, 138 -- 142.

Cloudsecurityalliance.org. (2011). Top threats to cloud computing: cloud security alliance. [online] Retrieved from: https://cloudsecurityalliance.org/research/top-threats [Accessed: 10 Aug 2014].

Edosomwan, S., Prakasan, S., Kouame, D., Watson, J., & Seymour, T. (2011). The history of social media and its impact on business. Journal Of Applied Management And Entrepreneurship, 16(3), 79 -- 91.

Ho, P., Tapolcai, J., & Mouftah, H. (2004). On achieving optimal survivable routing for shared protection in survivable next-generation internet. Reliability, IEEE Transactions On, 53(2), 216 -- 225.

InformationWeek,. (2014). 9 Worst Cloud Security Threats - InformationWeek. Retrieved 10 August 2014, from http://www.informationweek.com/cloud/infrastructure-as-a-service/9-worst-cloud-security-threats/d/d-id/1114085?page_number=2

Jaatun, M., Zhao,… [END OF PREVIEW]

Generation Networks: Ngns Will So-Called 'Next Term Paper


Internet in Basic Terms Thesis


Internet Abuse in Universities Case Study


Internet the First Decade Term Paper


IPV6 Technology and Deployment Thesis


View 1,000+ other related papers  >>

Cite This Research Paper:

APA Format

Survivable Next-Generation Internet.  (2014, August 10).  Retrieved October 23, 2019, from https://www.essaytown.com/subjects/paper/survivable-next-generation-internet/2200679

MLA Format

"Survivable Next-Generation Internet."  10 August 2014.  Web.  23 October 2019. <https://www.essaytown.com/subjects/paper/survivable-next-generation-internet/2200679>.

Chicago Format

"Survivable Next-Generation Internet."  Essaytown.com.  August 10, 2014.  Accessed October 23, 2019.
https://www.essaytown.com/subjects/paper/survivable-next-generation-internet/2200679.