This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Management

Server management systems and tools And Server Management Systems

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

 

Server management systems and tools

And

Server Management Systems

 Security issues in Networking and the current technical trends such as:

– End-to-End Secure Cloud Services

– Web Applications and Web Server Protection

Introduction

Internet users are nowadays extremely vulnerable to cybersecurity –related threats. Almost 33% of computers used in households are affected by malware and these household computers are mostly attacked by viruses. Computer viruses affect specific parts of the computer by sending spam and corrupting data. Mostly personal data of users such as passwords are stolen, and viruses might also delete information present in hard drive.  In this report, research will be conducted on network security issues. Technical trends including web server protection, web applications and end-to-end secure cloud services shall be studied. Technical details, along with the target platform of these trends, will be outlined. Moreover, advantages and disadvantages will be presented as well.

Background information

In a business setting, computers and systems are connected, and when a user faces problems, it might affect other users as well as they are connected via the same network. Consequently, security issues might arise, including malicious attacks like viruses and hacking, data loss and security breaches. A network is in a vulnerable state if unauthorised access is allowed. It is vital to implement measures that will reduce the security issues. The purpose of the organisation should be eliminating all kinds of vulnerabilities and implementing measures that would secure the devices. Services on the cloud are vulnerable to sudden threats, and the end-to-end secure cloud services can ensure a secure and fast cloud networking. This latest trend ensures complete security of the data of customers. This, in turn, enhances the competitive advantage of the organisation. The vendors, along with the consumers, are protected from threats. It is a secure and reliable way of maintaining the operations on the cloud. Similarly, in order to ensure protection of applications and servers, the web server protection would be useful. Web server protection ensures SSL offloading along with authentication. It helps prevents data loss, as well. The server performance enhances due to SSL offloading, and it also improves server performance.

Don't use plagiarised sources.Get your custom essay just from $11/page

Technical details and features

End-to-End Secure Cloud Services

 

Tresorit is one such end-to-end secure cloud service that protects the data from malicious attackers. Notably, in a business environment, it ensures data privacy from curious government institutions and unethical staffs. It ensures data confidentiality in a cloud environment. The end-to-end encryption feature of Tresorit allows the encryption of relevant metadata and files on devices. The encryption keys are generated randomly and the keys are always sent to servers in encrypted format. A user will be able to access files only with the uniquely designed decryption key.

The features have been outlined below-

  • End-to-end encryption
  • Cyptographic key sharing
  • Integrity protection of client
  • Zero-knowledge authentication

 

Web Applications and Web Server Protection

In a web-based business, server protection has become a necessity because of the rising complexity of security issues. It deals with security-related to websites and web services, including APIs. In an organisation, information is an asset, and it should be protected using web server security. Layered defence mechanism works best, and the organisations that deal with customers should ensure complete protection. The features explicit to web server includes-

  • Programmatic login
  • Single sign-on across web server applications
  • ACL or Access Control List based security model

Target platform

A target platform is defined as a platform that has been targeted by a cloud service. Based on the type of technology, a target platform is devised. Operations are integrated across large platforms. A target platform is famous among end-users. Web applications are built focussing on a destination, and it is based on a design as well. Every application uses platform software, and it mainly involves support functions, including storage and standard libraries. Nowadays, applications are service-oriented, and they serve end users. This, in turn, makes them a part of the platform as well. A web application mainly uses platforms such as Linux, Windows and even several Unix versions. Based on application style, different types of technologies are used. For instance, the Microsoft’s Dynamic CRM product involves a platform that has been designed specifically for business application. Within the platform, an operating system mainly offers basic interfaces. Nowadays, a trending operating system is Amazon’s Elastic Compute Cloud, also referred as EC2. It provides Linux instances that meet the specific needs of customers. EC2 is a platform of VMs instead of operating systems. To understand cloud platforms, it is necessary to look at it as a cloud infrastructure service, cloud foundation and cloud application services. Cloud platforms and on-premise platforms are not identical. As soon as platform functions move in the cloud, it changes in noteworthy ways.

Advantages and Disadvantages

End-to-End Secure Cloud Services

Advantages

  • In the case of business, this technology protects files securely
  • It offers equally secure solutions by replacing file servers
  • Cloud services save organisations from server costs and costs related to equipment

Disadvantages

  • The risk associated with extended downtime is present
  • Cyberattack vulnerabilities are rampant in cloud services as well

Web Applications and Web Server Protection

Advantages

  • It allows users to work from different locations
  • There is no need to download or install and update any physical software
  • The technology is compatible across various platforms and devices

Disadvantages

  • The speed of the computer might slow down
  • The technology is quite expensive, and maintenance issues might occur
  • It is not possible for all web application to block malware

Conclusion

The report has been written considering the security issues that occur in networking. In the beginning, a brief explanation has been given regarding the reasons behind security issues. Following that, new technological trends that might ensure the protection of the business has been outlined. The technical details related to end-to-end cloud services and web applications have been presented in the report. Each of these technologies has a target platform and works in accordance with the needs of the platform. Lastly, few advantages and disadvantages of the trending technologies have been presented. It has been understood that the modifications are necessary to ensure complete protection of cloud services.

References

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask