Answer To: Scenario You are the principal consultant for a community based Charity. The Charity is involved in...
Amit answered on Aug 12 2020
Full Name :
Student ID :
Subject :
Assignment No :
Due Date :
Lecturer’s Name :
ITC – 568 (Assignment - 2)
Your Name:
Your Email:
College name, University name, Country name
Table of Contents
A. Introduction 3
B. Importance of database security to working employees 4
1. Possible threats and related risks for database security 4
2. Additional risks to security of database because of SaaS application installation 5
3. Severity and strictness to provided risk of data to working employees 7
C. Privacy of database to working employees 8
1. Possible threats and related risks for database security 8
2. Additional risks to security of database because of SaaS application installation 9
3. Severity and strictness to provided risk of data to working employees 10
D. Issues related to implementation of digital identification 10
E. Possible supplied solutions for identified issues 12
F. Data sensitivity 14
G. References: 15
A. Introduction
For protecting databases and stored information from any type of unauthorized access (Hackers or other individuals), security is being implemented on databases. The direct financial losses can be caused because of any information loss from the databases. Thus a configuration which can provide a secure platform to sensitive and confidential data is being required from the cloud services. The chance of data loss or any data breach is very high in case of cloud implementation. Here, for the Australia based charity, the possible threats to cloud based network are being identified and solution is being provided. On bases of severity of SaaS application installation, the privacy issues and additional security issues are being analyzed. The faced issues for using digital identity on SaaS based applications and their solutions from Australia and USA are also compared in this report. The issues related to data sensitivity and laws for cyber crime in USA and Australia are also evaluated [Singh & Chatterjee, 2017].
Most of the organizations make use of servers which may be internal or external to store the information related to organization, so, security of such databases stored on servers is always a big and important concern for organizations. Br rest6ricting any type of unauthorized access to the organizational database can easily solve the privacy and security requirements of any organization. The servers of cloud are being used by different organizations and different individuals which can cause security issues to organization. The privacy issues and security issues before and after the implementation of applications based on SaaS cloud services on charity community are being analyzed in my report. The data sensitivity problems with related issues which may be ethical or legal are also analyzed in my presented report. The advantages of movement to SaaS based applications for charity community are also analyzed in my report.
B. Importance of database security to working employees
1. Possible threats and related risks for database security
From the supplied case description, it can easily be observed that a small data center with window server 2008 is being utilized by charity homes for complete desktop services. The software based on some third party is being utilized for storing the employee’s databases, so, it can only store small amount of data. The database related workload of employee’s working at charity cannot be handled by this application. Because of small storage abilities, the security problems for confidential data are arrived at charity. The second issues are related to data fetching capabilities which is also very time consuming. Because of these reasons, the movement to cloud services for its 500 employees through a cloud vender is proposed here. On bases of case study, it is also observed that the time sensitive and confidential data is used by the employees of Charity. From given case, it is clear that a 200 TB of data space is being used by charity by the means of SaaS based cloud services. The complete database is stored on the small application based server and SaaS based cloud which is accessed by the authorized individual employees of the charity. It is possible that any unauthorized person may use some unsecured API for creating data breach. The injection of any malware can easily create data losses for any organization. The security issues can be raised to database of charity because of some unauthorized access for fetching the information through the cloud based servers. Most of the cloud based servers are open ended and any individual who can manage to some fake ID of Charity can easily access the database stored on SaaS based cloud. The unauthorized access can cause denial of service, malware injection, and other possible attacks to steal the confidential information of charity. The unauthorized access can cause data modification of database hijack through cloud services. The information stored on end server of cloud can also be destroyed so that services of mental health can be affected for charity. This can lead to treatment delay for mentally suffering patients. The complete database system can also be controlled by any such data attack which can cause huge losses to charity. For clearing the attacked surfaces of servers, the system with multiple tenancies will be required by the charity.
2. Additional risks to security of database because of SaaS application installation
On bases of supplied case description, it is known that the HR management of the charity is bringing the SaaS solution for data storage and a vender from USA is being appointed for this. The SaaS cloud will provide effective solutions to the data storage issues and security issues to all the employees. The SaaS based cloud services will also reduce the operational costing to the charity because of no installation requirements. The data location uncertainty and data transparency lacks are the main identified security problems with implementation of SaaS based cloud. The data location uncertainty can increase the data access time for authorized users and it can also lead to sensitive database access to some unauthorized individuals. The data transparency lacks can cause increased distrust between the charity employees which is a huge disadvantage to the individuals working at charity. The security protocol hacking and data corruption from cloud based applications can also be caused by it [Puthal et al, 2015].
The complete responsibilities related to data storage on SaaS cloud are managed by service provider and any individual is not allowed to manage his/her database separately. For the given case of charity system, the database is only accessed through the charity internet link provided by the HR management and PMS (performance management system). A digital ID is provided by the HR management to all the authorized employees. This digital ID of authentication is directly generated through the charity directory and PMS. So, the possibility of data breach increases here. Because of implemented encryption protocols on stored databases, the data hacking risks can be minimized. The identity theft is main issues associated to implementation of SaaS based cloud who are using credit card information (employees of charity). So, implementation of encryption protocols can minimize the data breach for identity theft and increases the information security to credit card information of charity employees.
But we all know that system instability is also increased by the implementation of SaaS based applications. Because of other...