Question: Great posting this week. I like to read on your CBIS, and it is true that cloud computing is a terrific way to store information

Great posting this week. I like to read on your CBIS, and it is true that cloud computing is a terrific way to store information and has good protocols for security, but do you think that too many rely on its properties too much? Due to the ease that hackers have some issues being more sensitive I feel as though they shouldnt be able to be kept in certain areas.

Great posting this week. I like to read on your CBIS, and

The cloud computing software is used at the server end to support ATCTS for managing and running applications. Cloud computing software is a security component because it protects stored information through various processes, such as encrypting and decrypting data. Network management software also protects the network from cyber-attacks by monitoring traffic (Wodyk et al., 2020). Backup software can also serve as a security component since it helps provide crucial data if the system suffers an attack that wipes the information. Finally, there is the Common Access Card (CAC), which is used for logging into the ATCTS system. It prevents unauthorized access into the system by acting as a form of security clearance. Other security components include antivirus and firewall softwares meant to prevent malware and other malicious programs from accessing the system or network and transmitting the information. One of the leading security concerns and vulnerabilities that the system has is concerns social engineering. The system has instituted all the mechanisms and measures to prevent physical and remote attacks against it, but it remains vulnerable to social engineering. Social engineering remains the most common type of cyber attack involving psychological manipulation, identity exploitation, tailgating, and personal contact (Duarte et al., 2021). Despite cyber security advances, humans remain the weakest link and, therefore, the most vulnerable. Hackers still have a good chance of gaining access to the system if they can access one who already has access. Baiting attacks and spear-phishing are social engineering methods that can be used when the hacker has access to the victim and establishes trust or a relationship with them. Alternatively, social media engagements of the involved parties can also be exploited to access some of their information and give the hackers access to them

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!