Monday, December 9, 2019

Transactions on Services Computing †Free Sample to Students

Question: Discuss about the Transactions on Services Computing. Answer: Introduction The use of the Virtual Private Network is prioritising its importance in the market these years. This PowerPoint focuses on the VPN of the JKS Accountants in Sydney. The concept of the VPN has been described in the presentation. The risks that were prevailing in the company by not using the VPN are discussed in the presentation. The benefits of implementing the VPN in the JKS Accountants have been focussed. There are some suggestions regarding the components of the VPN used in the company for gaining benefit in the market. The virtual refers to the virtual communication between the devices connected in a public and private network through Internet. This means that the communication is virtual rather than any physical existence. The devices are connected in a public network but the communication among them is private. The data packets are properly encrypted for providing security to the data and information (Bahnasse Elkamoun, 2015). The third party cannot interrupt the communication between the connected devices over the Internet. A network is a collection of more than two devices connected together for communication. A VPN is a network that can transmit data and information over a large distance with proper efficiency and effectively. Risks involved in not using VPN There are various risks involved in not using the VPN during communicating over internet. The employee of the JKS Accountants has to access the internet to communicate with the clients. Therefore, the data transfer is necessary for the company. This can be harmful for the company to transfer important files and data over the network without using VPN (Chung et al., 2013). The network requires high security for data encryption and prevents the interception by the third party. The VPN helps in preventing these unusual interceptions of the third party intruders of hacking the data and information over the network. The hackers are having keen look on these networks for breaching important financial data and files of company for accessing it. The network over the Wi-Fi and hotspot are not properly secured for the data transfer without using VPN and data can be easily breached out of it. The employee of the JKS Accountants has to work remotely over the Internet that requires proper securit y for data transfer. The employee deals with sending and receiving mails from the clients that helps in maintaining the communication with the clients (Jain Paul, 2013). The tools like Firesheep can easily intercept the message in the mails and causes loss to the company. The VPN provides modest bandwidth that can be use in communicating to large distance with the clients over the Internet. The employee of the JKS Company cannot communicate with large number of clients without the use of the VPN. There is a number of advantages of using VPN services in the JKS Accountants. The employees deal with important and remote data and files over the internet. Therefore, VPN helps in providing a secured network for communicating and transferring data and information of the clients over the Internet. The privacy over the communication network is necessary for the company to maintain (Jadeja Modi, 2012). VPN helps in keeping the files secret from the third a over the network. The IP address of the sender and receiver of the data are kept secured and private by the VPN that helps in securing the data from being hacked. The VPN helps in monitoring the network and connected devices form the hackers. It also provides an encryption technique provide protection to the data and files transferred over the network. There are different types of encryption done by the VPN to manage the data and information over the network. The key of the encryption is known by the sender and receiver only that helps in enhancing the security level. It also provides firewall to the connected devices and protects from the viruses and malwares. The JKS Accountants communicates with the clients to transfer the data and the requirements of the clients in market. Therefore, VPN helps in protecting the files and information transferred over the network (Wang et al., 2012). The VPN uses private addresses for supporting the protective files over the internet. The address bit conversion of the data is done by the VPN that helps in protecting the address bit if the data (Choudhury, Rahman Bahtaba, 2012). The hackers cannot identify the address of the data packets. The employees of the JKS Accountants experiences better services form the clients by using the VPN in their network and server. The maintenance cost of the VPN services is less than the other services. The VPN will mask the IP address and its location from anyone monitoring the network to which the employee is connected. This isdone by masking the original IP address of the user with a fake IP address that redirects to another gateway city location. Anyone monitoring the network can find the user but will not be able to recognise the original location or identity. The VPN helps in monitoring the network and connected devices form the hackers. It also provides an encryption technique provide protection to the data and files transferred over the network. The user nor will they be able to view or intercept any data that is sent or received by the user as apart from masking the privacy of the user a VPN provides encryption to the data that is being delivered online. The cloud storage is a technique of storing data online over the internet. The JKS Company can store their data and files over the cloud storage using the internet. The benefit of using the cloud storage is the accessibility from anywhere with the help of internet. Therefore, the clients and employees of the JKS Accountants increase the flexibility of accessing the data and files. The cloud storage helps in minimising the use of the hardware storage of files and folders by reducing the space for it (White, 2012). The cloud storage is a secure place for storing the data and information of the clients. The organisation of JKS Accounting can implement cloud storage service along with the implementation of VPN to ensure enhanced data and privacy security. The data stored in a cloud server will be protected from any kind of human attack (cyber attack) or non-human attack (natural accidents or calamities). Latest security software is used to prevent cyber attacks and the presence of multip le copies of the data in multiple physical locations reduces the chance of data damage due to any accidental or natural calamities (Jadeja Modi, 2012). The data that is sent to the cloud storage or received from the same is encrypted with latest encryption technology so that data is not hacked by cyber attackers during the transfer process (Wang et al., 2012). The data stored in the cloud is protected from the physical attack of hard disk crash and other attacks. Data and files stored in the cloud storage is secured with the help of various security protocols of the company and only authorised users can access to the cloud. Therefore, the data and files stored in the cloud is safe and secure providing an opportunity for the JKS Accountants to use this technique. Hadoop is an extension of the applications and softwares used by the organisation for communicating with the clients in the market. Various files storage system helps in storing files and folders in fashioned way to protect from the third arty imprudence (Holmes, 2012). This technique reduces the risk of failure of the file storage system and enhances the security of the files and folders of the company. The JKS Accountants uses the Hadoop components to store the files and folders un the company. The local storage of data is technician with the helps in the Hadoop technology. . This type of usage is preferable to highly adjustable public cloud services like Google Drive and One Drive. Therefore, it can be concluded that for a company like JKS Accounting to allow its employees to work remotely certain measures need to be taken to ensure security of the sensitive data that are being processed at the time of work. It is inferred that services like the VPN, Cloud Storage and Hadoop, if implemented properly within the organisation will help to achieve a higher level of network security. The use of VPN will ensure the user privacy as well as data security while at the time of data transfer through an insecure network. Cloud storage service will ensure the safety of data storage from both human and non-human attacks and Hadoop will ensure the data safety in local data centres. References BAHNASSE, A., ELKAMOUN, N. (2015). Study and evaluation of the high availability of a Dynamic Multipoint Virtual Private Network.Revue MDiterranEnne Des TLCommunications,5(2). Jain, R., Paul, S. (2013). Network virtualization and software defined networking for cloud computing: a survey.IEEE Communications Magazine,51(11), 24-31. Chowdhury, M., Rahman, M. R., Boutaba, R. (2012). Vineyard: Virtual network embedding algorithms with coordinated node and link mapping.IEEE/ACM Transactions on Networking (TON),20(1), 206-219. Chung, C. J., Khatkar, P., Xing, T., Lee, J., Huang, D. (2013). NICE: Network intrusion detection and countermeasure selection in virtual network systems.IEEE transactions on dependable and secure computing,10(4), 198-211. Amin, S., Schwartz, G. A., Hussain, A. (2013). In quest of benchmarking security risks to cyber-physical systems.IEEE Network,27(1), 19-24. Sadeghi, A. R., Wachsmann, C., Waidner, M. (2015, June). Security and privacy challenges in industrial internet of things. InDesign Automation Conference (DAC), 2015 52nd ACM/EDAC/IEEE(pp. 1-6). IEEE. Ryan, J. J., Mazzuchi, T. A., Ryan, D. J., De la Cruz, J. L., Cooke, R. (2012). Quantifying information security risks using expert judgment elicitation.Computers Operations Research,39(4), 774-784. Drago, I., Mellia, M., M Munafo, M., Sperotto, A., Sadre, R., Pras, A. (2012, November). Inside dropbox: understanding personal cloud storage services. InProceedings of the 2012 ACM conference on Internet measurement conference(pp. 481-494). ACM. Wang, C., Wang, Q., Ren, K., Cao, N., Lou, W. (2012). Toward secure and dependable storage services in cloud computing.IEEE transactions on Services Computing,5(2), 220-232. Jadeja, Y., Modi, K. (2012, March). Cloud computing-concepts, architecture and challenges. InComputing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on(pp. 877-880). IEEE. White, T. (2012).Hadoop: The definitive guide. " O'Reilly Media, Inc.". Holmes, A. (2012).Hadoop in practice. Manning Publications Co..

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.