Enterprises, post-pandemic have slowly started moving from their legacy infrastructure to predominantly cloud platforms. From small...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Enterprises, post-pandemic have slowly started moving from their legacy infrastructure to predominantly cloud platforms. From small to large enterprises the movement towards the cloud has occurred considering various components such as remote and hybrid work structure, efficient and robust security mechanisms, cost-effectiveness, etc. But with digital transformation via cloud adoption comes the risk of an increased number of sophisticated attack techniques by threat actors. According to a prediction by Gartner, more than 95% of workloads will be digital by 2025 and this brings the challenge of facing cyber-attacks against the cloud environment. "DDoS has been one of the most used cyber-attack tactics against cloud where the number of attacks grew by 27% from2020 to 2021. To mitigate this, Radware's Cloud DDoS Protection Service has been used by enterprises, where on an average 1,591 attacks per day were mitigated. It cannot be denied that, with the transformation being seen in technology, the vulnerability aspects too proportionally increase. Post-pandemic when the digital transformation got fast- paced, the vacuum left during the transition only allowed the cyber-attacks to turn sophisticated. With an increasing number of organizations moving towards a virtual setup, cloud environment has become the new target of the threat actors," said DR Goyal, Vice President at RAH Infotech. This raises an important question - how do SMEs protect their cloud environment against an array of malicious and advanced tactics via 'cloud-scale attacks'? To protect against the sophisticated DDoS attacks of today, the security measure used too needs to be of at least the same level of sophistication. Hence there are a number of criteria enterprises need to consider before choosing their cloud DDoS protection products. Network capacity is the benchmark for considering a mitigation service as there is a need to consider the overall scalability available during the attacks. Once the attacks are identified the processing capacity of the product is important. Latency is a critical component since website traffic needs to be maintained else high latency can adversely affect the working of the organization. Mitigation time and components, asset and IP protection, and the cost are a few more factors SMEs need when choosing the cloud DDoS protection product for their organization. "Ransom DDoS attacks have become a persistent part of the threat landscape. The recent uptick in DDoS activity should be a strong reminder to enterprises, ISPs and CSPs of any size and industry to assess the protection of their essential services and internet connections and plan against globally distributed DDoS attacks aimed at saturating links," said Navneet Daga, Sales Director of Cloud Security Services - APJ, Radware. "With Our leading DDoS mitigation technology & state of the Art scrubbing network we offer customers leading SLA's to have minimum disruption to users & business and mitigate reputational damage to the Brand." The below aspects have made Radware's cloud DDoS protection service distinctive from other cloud protection products. Automated, behavioural based, zero-day protection; automatic signature creation; smart SSL attack mitigation and widest coverage with multi-layered protection The service is backed by 16 globally connected, full mesh mode scrubbing centers, one of them located in India, using analytics-based routing with 10Tbps and growing mitigation capacity • Multiple deployment options, expert emergency response, comprehensive protection and industry-leading SLAs to attract the enterprises • Cloud-only simple deployment makes integration and installation easy One cannot expect to make a tectonic shift in technology and yet be immune to the external influences such as cyber security threats faced. Instead, the focus should be laid more on how to protect itself from threat actors and incur minimum damage as only the right technology would help in continuing to fight the threats successfully. Except of article taken from: https://www.crn.in/news/cloud-environments-under-attack- by-threat-actors-using-new-techniques-radware-threat-report/ PART A (50 marks) Answer Question 1 based on the article above: Question 1 (50 marks) Identify and explain with examples TEN (10) downsides of cloud technology when it involves cyber security threats. Enterprises, post-pandemic have slowly started moving from their legacy infrastructure to predominantly cloud platforms. From small to large enterprises the movement towards the cloud has occurred considering various components such as remote and hybrid work structure, efficient and robust security mechanisms, cost-effectiveness, etc. But with digital transformation via cloud adoption comes the risk of an increased number of sophisticated attack techniques by threat actors. According to a prediction by Gartner, more than 95% of workloads will be digital by 2025 and this brings the challenge of facing cyber-attacks against the cloud environment. "DDoS has been one of the most used cyber-attack tactics against cloud where the number of attacks grew by 27% from2020 to 2021. To mitigate this, Radware's Cloud DDoS Protection Service has been used by enterprises, where on an average 1,591 attacks per day were mitigated. It cannot be denied that, with the transformation being seen in technology, the vulnerability aspects too proportionally increase. Post-pandemic when the digital transformation got fast- paced, the vacuum left during the transition only allowed the cyber-attacks to turn sophisticated. With an increasing number of organizations moving towards a virtual setup, cloud environment has become the new target of the threat actors," said DR Goyal, Vice President at RAH Infotech. This raises an important question - how do SMEs protect their cloud environment against an array of malicious and advanced tactics via 'cloud-scale attacks'? To protect against the sophisticated DDoS attacks of today, the security measure used too needs to be of at least the same level of sophistication. Hence there are a number of criteria enterprises need to consider before choosing their cloud DDoS protection products. Network capacity is the benchmark for considering a mitigation service as there is a need to consider the overall scalability available during the attacks. Once the attacks are identified the processing capacity of the product is important. Latency is a critical component since website traffic needs to be maintained else high latency can adversely affect the working of the organization. Mitigation time and components, asset and IP protection, and the cost are a few more factors SMEs need when choosing the cloud DDoS protection product for their organization. "Ransom DDoS attacks have become a persistent part of the threat landscape. The recent uptick in DDoS activity should be a strong reminder to enterprises, ISPs and CSPs of any size and industry to assess the protection of their essential services and internet connections and plan against globally distributed DDoS attacks aimed at saturating links," said Navneet Daga, Sales Director of Cloud Security Services - APJ, Radware. "With Our leading DDoS mitigation technology & state of the Art scrubbing network we offer customers leading SLA's to have minimum disruption to users & business and mitigate reputational damage to the Brand." The below aspects have made Radware's cloud DDoS protection service distinctive from other cloud protection products. Automated, behavioural based, zero-day protection; automatic signature creation; smart SSL attack mitigation and widest coverage with multi-layered protection The service is backed by 16 globally connected, full mesh mode scrubbing centers, one of them located in India, using analytics-based routing with 10Tbps and growing mitigation capacity • Multiple deployment options, expert emergency response, comprehensive protection and industry-leading SLAs to attract the enterprises • Cloud-only simple deployment makes integration and installation easy One cannot expect to make a tectonic shift in technology and yet be immune to the external influences such as cyber security threats faced. Instead, the focus should be laid more on how to protect itself from threat actors and incur minimum damage as only the right technology would help in continuing to fight the threats successfully. Except of article taken from: https://www.crn.in/news/cloud-environments-under-attack- by-threat-actors-using-new-techniques-radware-threat-report/ PART A (50 marks) Answer Question 1 based on the article above: Question 1 (50 marks) Identify and explain with examples TEN (10) downsides of cloud technology when it involves cyber security threats.
Expert Answer:
Answer rating: 100% (QA)
1 Vulnerability It is undeniable that as technology changes so do the vulnerability factors which ri... View the full answer
Related Book For
Global Marketing management
ISBN: 978-0470505748
5th edition
Authors: Masaaki Kotabe, Kristiaan Helsen
Posted Date:
Students also viewed these computer network questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
A 10-year, 4.5 percent, semiannual coupon bond issued by Tyler Rentals has a $1,000 face value. The bond is currently quoted at 100.2 percent of par. What is the clean price of this bond if the next...
-
Googles ease of use and superior search results have propelled the search engine to its num- ber one status, ousting the early dominance of competitors such as WebCrawler and Infos- eek. Even later...
-
The built-up shaft is designed to rotate at 450 rpm. If the radius of the fillet weld connecting the shafts is r = 13.2 mm, and the allowable shear stress for the material is Ï allow = 150 MPa,...
-
Discuss the role of the managerial accountant in today's business environment. How has the role changed and evolved over time?
-
Explain the mechanism of vomiting.
-
Beta Supply completed the following selected transactions during the year: Requirements 1. Open T-accounts for Allowance for Uncollectible Accounts and Uncollectible Accounts Expense. These accounts...
-
The following income statements were drawn from the annual reports of Pierro Sales Company. The president's message in the company's annual report stated that the company had implemented a strategy...
-
Assume that Bob and Doug each have a Capital Account of $ 1 5 million Mr . Lee wants to join the partnership. Bob and Doug s law firm partnership is super profitable, and for Mr . Lee to join their...
-
Whine purchased 80% of the outstanding voting shares of Dine Inc. on December 31, 2018. The balance sheets of both companies on that date are shown below (after Whine acquired the shares): WHINE DINE...
-
Blue Spruce Corporation, a publicly-traded company, agreed to loan money to another company. On July 1, 2020, the company received a five-year promissory note with a face value of $522,000, paying...
-
Explain what happens to a hexane solution of decan thiol - capped gold nanocrystals when it is carefully syringed onto the water's surface. How do you think the optical properties of the gold...
-
The expected market return, Rm = 12%. The expected return on a risk-free asset, Rf = 5%. 1. Stock A has a beta of 0.8. What is the expected return of stock A according to CAPM? If stock A offers an...
-
Determine whether each of the following transactions will be counted in the 2005 GDP of the United States. If the transaction is counted, identify which expenditure component (personal consumption,...
-
Question 1 - Provide a brief background on Australia for UNHCR business model. What were the main reasons for Australia for UNHCR's decline in donations prior to commissioning Sparro to assist them?...
-
Now let's consider what it takes to get to the interview stage. How do we "grab" the prospective employer's attention? Consider this in terms of the resume, cover letter, and even the call to come in...
-
For the RL circuit shown above, assume that the component values are R = 10002 and L= 10H. Part A) Find the differential equation that relates the source voltage, x(), to the inductor voltage, y()....
-
Horse serum containing specific antibody to snake venom has been a successful approach to treating snakebite in humans. How do you think this anti-venom could be generated? What are some advantages...
-
Focus group research conducted by advertising agencies like Leo Burnett shows that Asia's youngsters (the proverbial Xgeneration) mimic American trends, but at the same time, they are pretty...
-
Danone: Marketing the Glacier in the U.S. (Case #25, Notes) Overview Although widely considered a global success, sales growth and market share have been dwindling in the U.S. for Danone's popular...
-
Discuss the major issues in running focus group discussions in an international context.
-
__________________ inside the potable water tank(s) pushes the water through distribution lines to the lavatories and galleys.
-
Pneumatic power may be used to back-up hydraulic system components without loss of performance by turning a __________________ pump.
-
What is used to heated potable water on passenger aircraft?
Study smarter with the SolutionInn App