Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Great posting this week. I like to read on your CBIS, and it is true that cloud computing is a terrific way to store information

Great posting this week. I like to read on your CBIS, and it is true that cloud computing is a terrific way to store information and has good protocols for security, but do you think that too many rely on its properties too much? Due to the ease that hackers have some issues being more sensitive I feel as though they shouldnt be able to be kept in certain areas.

image text in transcribed

The cloud computing software is used at the server end to support ATCTS for managing and running applications. Cloud computing software is a security component because it protects stored information through various processes, such as encrypting and decrypting data. Network management software also protects the network from cyber-attacks by monitoring traffic (Wodyk et al., 2020). Backup software can also serve as a security component since it helps provide crucial data if the system suffers an attack that wipes the information. Finally, there is the Common Access Card (CAC), which is used for logging into the ATCTS system. It prevents unauthorized access into the system by acting as a form of security clearance. Other security components include antivirus and firewall softwares meant to prevent malware and other malicious programs from accessing the system or network and transmitting the information. One of the leading security concerns and vulnerabilities that the system has is concerns social engineering. The system has instituted all the mechanisms and measures to prevent physical and remote attacks against it, but it remains vulnerable to social engineering. Social engineering remains the most common type of cyber attack involving psychological manipulation, identity exploitation, tailgating, and personal contact (Duarte et al., 2021). Despite cyber security advances, humans remain the weakest link and, therefore, the most vulnerable. Hackers still have a good chance of gaining access to the system if they can access one who already has access. Baiting attacks and spear-phishing are social engineering methods that can be used when the hacker has access to the victim and establishes trust or a relationship with them. Alternatively, social media engagements of the involved parties can also be exploited to access some of their information and give the hackers access to them

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Machine Learning And Knowledge Discovery In Databases European Conference Ecml Pkdd 2022 Grenoble France September 19 23 2022 Proceedings Part 4 Lnai 13716

Authors: Massih-Reza Amini ,Stephane Canu ,Asja Fischer ,Tias Guns ,Petra Kralj Novak ,Grigorios Tsoumakas

1st Edition

3031264118, 978-3031264115

More Books

Students also viewed these Databases questions