HS3011
HS3011
HS3011
Student name:
Student ID:
1
Table of Contents
Introduction................................................................................................................................3
Conclusion................................................................................................................................11
Reference List..........................................................................................................................12
2
Introduction
Data Protection is not just about safeguarding the information of the registered person. The
discipline in Information Technology is known as Security Administration. Knowledge is
something tangible or something of electronic nature. The information contains your details,
mobile, and other information or it can tell the social media profile, data in a smartphone,
facial recognition, and so on. Thus, information security encompasses too many academic
fields like cryptography, smartphone apps, cyber forensic evidence, online social networks,
and so on.
Case project 1:
Processing of CPUs:
According to Mishra, Sahoo, and Parida (2020), Load balancing technology is used for
optimal power use of CPU processes, reducing uptimes, and minimizing overload.
Add DNS Solve System Load Balancing to easily receive and respond to domain inquiries to
redirect to destination servers.
The site infrastructure load balancing technology allows network traffic in the system to
blocks it, divides applications and breaks them into different parts, and evaluates the servers
those applications have. This facilitates the backup of network traffic such that the possibility
of attacking the DDOS web system is reduced.
Round of Robin
The servers are evaluated and structured as a circular algorithm in a rotation. Requests for the
database are submitted to servers in order
Examples are:
3
For the first service request, Server A will be sent.
Stands to benefit: 2 user requests can be sent to two independent repositories while requests
are continuous. It takes time to create additional connections to the second site, while users
can also have information on the first server. The round-robin normally installs cookies, for
instance, to solve this situation (EL AMRANI and GIBET TANI, 2018).
WRR also can work in the same way as Round Robin Technologies to set up any destination
server. Any server is evaluated by an integer (Weight Weight Value - default value is 1). The
load balancer nodes are counted two times as common as the other server and support double
requests.
For example:
The clusters are the 03 servers A, B, and C. For device skills, machine A is greater than
machine B and larger than machine C. We also weighted 4,3,2 for servers A, B, C.
4
The application is organized by AABABCABC
As commented by Arif and Ketab (2019), the DRR algorithm is exactly the same as WRR
and is characterized by a constant shift in server weighting.
The selection of the server depends on many factors in the real-time server performance
analysis.
This algorithm is also used in load balancing products by F5 Network, not in simple financial
paralytic devices.
Fastest algorithm
This is a time calculation algorithm for server responses that select who is the shortest
response time server. The response time is determined by the time that the packet is sent to
the server and the packet is returned.
5
To receive and transmit this, the load balancer is used, and the load balancer knows which
server to use the next turn in response times (Finck, 2018).
Case project 2
OneDrive
OneDrive is Microsoft's cloud computing facility. Both accounts are free of charge on a
Microsoft account. Users can use OneDrive to download, merge and upload their files.
Windows 10 even use OneDrive to synchronize user preferences, visual updates, colors,
Microsoft Edge interface settings, and even tabs and saved passwords. Starting with
Microsoft OneDrive costs little; it's free as long as a user allows 5GB of free storage by
default. For those who wish to store more than a few files in the cloud, this is a solid
foundation. In Windows 10, Microsoft also sets OneDrive as the default save space for your
papers. If the user wants it, OneDrive automatically stores and synchronizes backups of the
cloud files to other machines where OneDrive is installed. If the hard drive or SSD fails, the
user can quickly access the OneDrive archives to prevent important information from failing.
Figure 3: OneDrive
(Source: onedrive.live.com)
Google Drive
Google Drive is a computational storage service that removes any load off the disc as its main
feature, much like all other cloud services. Cloud storage functions with data moved to a
6
central server – or cloud – that would open up the power of your device. This offers more
space on your machines for other crucial things such as large software and games. However,
Tikkinen-Piri, Rohunen, and Markkula (2018) stated that cloud services have far more
advantages than traditional warehousing. Users can access your files as they are in the cloud
from any internet-enabled device. Users can also share them with other users and open up
new possibilities for online contact.
(Source: drive.google.com)
Dropbox
Dropbox is a tool for the hosting of files, also called a cloud computing platform. Dropbox is
one of the largest most successful cloud storage systems in use today, while Microsoft
OneDrive, Box, Sync, and Google Drive are also available. Evaluating the functionality of
the design style on the website and also the Dropbox app is highly straightforward and easy
to just use. Dropbox supports fast "drag" and "drop" operations, as users can do: pick, grab,
store content, and then switch to the Dropbox website. As seen, Dropbox is ideal for a vast
number of consumers who choose convenience to minimize "excess" use. Although Dropbox
is primarily online storage that synchronizes your files with the cloud, it provides a wide
variety of features beyond that fundamental utility (Chen et al. 2020). Available via web or
apps and that can be installed in both iOS and Android on Mac, PC, and mobile devices.
Anything with 256bit AES is encrypted safely, regardless of the version the Dropbox user
requires.
7
Figure 5: OneDrive
(Source: dropbox.com)
IBM is offering three cloud computing hardware solutions. These platforms have built-in
virtualization support. IBM includes IBM Websphere technology architecture for
virtualization, promoting programming frameworks, and offering open virtualization
specifications. Sadik (2017) opined that the IBM cloud framework management layer
contains middleware from IBM Tivoli. Management tools provide the ability to manage
images by automatic supply and de-supply, monitoring, and metering while recording and
charging costs. The final layer of the architecture contains advanced tools for work loading.
Cloud computing workloads are resources or programming instances that may be carried out
for particular organization purposes. IBM also provides tools for the purpose of
communicating build and test the cloud.
Hence, from the analysis of four different data prevention cloud storage service, it can be
stated that the ideal storage is Google drive as it provides more space free of cost. Along with
8
this, Google drive uses a 256-bit data encryption model that provides more security to user’s
data.
Case project 3
In 2017, the physical network represented a substantial portion of the worldwide data enters
the SDN market, constituting about $2.2 billion in gross revenues, or around 42 percent of the
total overall income. Based on the latest financial outlook, the physical network will sell
$3.65 billion in 2022. By 2022, the physical network is expected to make $3.66 billion, but
sales from the SDN and NFV applications could be $2.76 billion. This concept of the
incorporation of the SDN architecture into the cloud ecosystem makes for a harmonised and
linked chain for network transformation. There are several sources for the production of
SDN. It makes network setting up, upgrading, servicing, and wiring easier for the business
because it decreases the network footprint and minimizes the power of network wiring and
equipment.
9
SDNs are basically based on software Traditional networks are basically based on
software
Network administrators use APIs to connect with Traditional networks are built using physical
the cloud. structures, including switches, routers and
hubs
SDN enables consumers to provision new Using physical places for access control
computers without physical networks hinders an IT administrator's ability to
control the traffic flow
SDN enables a computer network to be mapped Networking needs new hardware that
into a physical network improves network bandwidth
SDN offers an interface that helps the user to The traditional network is a standardized,
provision services and bandwidths at will hardware-based network
Table 1: Comparison between SDN and traditional network
As per the viewpoint of Xie, Yu, Huang, Xie, Liu, Wang, and Liu (2018), a Software-Based
Network carries over the management of network resources. The administrator has absolute
command over a single control plane without having to handle switches separately. The SDN
architecture uses the northbound and southbound application programming interfaces (APIs)
(APIs). Request would be answering to the controller in a haughty way. They will connect to
southbound interfaces using SCTP. The networks would be managed by the Software-Based
Networking (SDN). Users' performance may be improved using software-based networking
in cloud computing. Network quality enhancement and network management are improved
by SDN. Software-Defined Networking (SDN) offers so much flexibility for the enterprise to
improve the economy. Software-defined network architecture distinguishes power from
physical access.
The SDN controller shares the details with the SDN commission (NBI)
SDN controllers translate this information into the SDN data paths. CSCN requires
ISPs to be an agent for the government to impose punishment for copyright
infringement
Switches will provide routing capabilities on the network
Each SDN controller communicates with the network via an application programming
interface (API)
10
Case project 4:
Email protection is characterized as the steps taken to secure email information and email
accounts from online infiltrations. There are email encryption mechanisms in order to protect
client's information and email addresses from hackers. Among other countermeasures, that
involves locking down email servers with strict keys and access controls, getting
communications encrypted in transit, and using spam filtering tools. Email is most popularly
used by hackers to disseminate malware, including viruses, spam, and phishing emails. These
people usually attract individuals to reveal their private information by using misleading
messages. They lure people into the opening and submitting email attachments that could
contain malware or software on the users' computers. Huang, Chiang, and Chang (2018)
mentioned that Email is a key means of penetration for attackers and can result in a
compromise of valuable information. The simplest approach for small business owners to
shield themselves from email protection is to be "AWARE". Any company member (yes,
including the CEO) must be very aware of this protection regulation. You would be
concerned with the most private knowledge exchanged in emails. Then think security tools,
such as anti-spam and anti-virus. When these forms of malware attack, they may take full
control of your computer or mobile device. This access can be abused to attack and obtain
unauthorized access to classified information. Spam that can cause productivity loss among
employees can be a passageway for malware (Al-Fedaghi and Alnasser, 2020).
Advantages Disadvantages
Encryption Provides all-time privacy Before encryption or after decryption may
protection access the file by an attacker.
Protects Privacy Encryption The malicious attack cannot be avoided.
Encryption is an enforcement element An attacker can look for an earlier
anonymous and straightforward way to
decode encrypted messages.
Device-by-device data security encryption Attackers can exploit the encryption
algorithms.
Encrypted Data sustains reliability The information can be used to prevent and
track alterations.
Table 2: Advantages and disadvantages of Encrypting
11
Advantages and disadvantages of Securing Email
Advantages Disadvantages
Emails are useful for deciding yes and no Email can be difficult to fix
Email may be successful in locating the Email is dangerous because it can be used to
correct person to address the issue transmit classified information
Email is useful for arranging meetings Email may become informal or mistaken
Email will instantly send out a lot of Pronoun use can lead to significant
information to multiple people misunderstandings
Email security is important because most of Email can be hacked easily through using of
the business information are shared via email malware worm
Table 3: Advantages and disadvantages of Securing Email
Phishing, a euphemism for "social engineering," refers to the practise of tricking people into
divulging private information by impersonating an email or computer. Email protection
requires many levels of technology: There are several ways to secure companies' email
accounts and it's necessary to take a joint approach.
• Password Update: Require workers to change their passwords periodically. This makes
passwords difficult to steal.
• Secure Connections: Ensure that e-mail services are secure. This is a normal feature, but
essential for privacy purposes.
Our email system can block files found to contain ransom ware or other malicious
files until they enter their intended recipients. Spam will bring damage to an IT
department if not worked out.
Spam security or PC maintenance applications that can detect and delete malware.
Encryption technologies, such as OpenPGP, help people encrypt emails between
sender and receiver. Businesses require proper encryption to help manage classified
information (Bera, Misra and Vasilakos, 2017).
Employees should be educated about phishing threats over email. Often businesses
give their workers bogus phishing e-mails so that they can test their protections
against them.
Conclusion
12
The nature of Information Management is Information Protection that is an extremely
important task. They are not restricted to natural catastrophes, device malfunctions, severe
disturbances, and power outages etc. The area of information technology has expanded and
progressed with these technical advances. The Perimeter Institute for Security Analysis offers
many specializations such as penetration testing and network security.
13
Reference List
Mishra, S.K., Sahoo, B. and Parida, P.P., 2020. Load balancing in cloud computing: A big
picture. Journal of King Saud University-Computer and Information Sciences, 32(2), pp.149-
158.
EL AMRANI, C. and GIBET TANI, H., 2018. Smarter round robin scheduling algorithm for
cloud computing and big data. Journal of Data Mining & Digital Humanities.
Arif, K.I. and Ketab, A.S., 2019. Dynamic Time Quantum for an Efficient Round Robin in
Cloud Computing. Journal of Computational and Theoretical Nanoscience, 16(5-6), pp.2404-
2409.
Finck, M., 2018. Blockchains and data protection in the european union. Eur. Data Prot. L.
Rev., 4, p.17.
Tikkinen-Piri, C., Rohunen, A. and Markkula, J., 2018. EU General Data Protection
Regulation: Changes and implications for personal data collecting companies. Computer Law
& Security Review, 34(1), pp.134-153.
Chen, S.J., Qin, Z., Wilson, Z., Calaci, B., Rose, M., Evans, R., Abraham, S., Metzler, D.,
Tata, S. and Colagrosso, M., 2020, August. Improving Recommendation Quality in Google
Drive. In Proceedings of the 26th ACM SIGKDD International Conference on Knowledge
Discovery & Data Mining (pp. 2900-2908).
Sadik, A., 2017. Students’ acceptance of file sharing systems as a tool for sharing course
materials: The case of Google Drive. Education and Information Technologies, 22(5),
pp.2455-2470.
Huang, J.W., Chiang, C.W. and Chang, J.W., 2018. Email security level classification of
imbalanced data using artificial neural network: The real case in a world-leading enterprise.
Engineering Applications of Artificial Intelligence, 75, pp.11-21.
Al-Fedaghi, S. and Alnasser, H., 2020. Modeling network security: Case study of email
system. arXiv preprint arXiv:2003.13509.
Bera, S., Misra, S. and Vasilakos, A.V., 2017. Software-defined networking for internet of
things: A survey. IEEE Internet of Things Journal, 4(6), pp.1994-2008.
14
Xie, J., Yu, F.R., Huang, T., Xie, R., Liu, J., Wang, C. and Liu, Y., 2018. A survey of
machine learning techniques applied to software defined networking (SDN): Research issues
and challenges. IEEE Communications Surveys & Tutorials, 21(1), pp.393-430.
Zhang, Y., Cui, L., Wang, W. and Zhang, Y., 2018. A survey on software defined networking
with multiple controllers. Journal of Network and Computer Applications, 103, pp.101-118.
15