The importance of data security in online commerce
Question:
Discuss About The Journal Of Bodywork And Movement Therapies?
From the aspect of looking at the point of users and the persons linked to the use of the company’s website then the users are liable to share their personal information with the company (Tankard, 2012). The users would want to keep their data safe from the hand of the hackers and breaches. The online portal requires the user to submit their personal information as well as bank details from where they are able to purchase the items from the company’s online e commerce website. The company should take into consideration that if there is an increase in the number of users in the company’s website there would be more the amount of revenue will be flowing into the company (Whittaker, 2015). This would in turn help the company to keep them afloat in the market competition. It can also be said that the number of crimes on the data source increases with the increase in the number of users of the website. More the number of users more will be the amount of information on the server this would cost more to the hackers when they sell the information on the black marketing. Thus, the company being one of the top leaders in the selling of products in the form of departmental chain the technological revolution would push the users to make purchases on the online e commerce website (Tankard, 2012). Thus looking from the financial point of view if the company invest a certain amount of money in acquiring the cloud server for the organization then the company would be able to keep many of the data safe from the hackers and the data breaches that might occur in the company’s data servers. The logging of information has to be located in different co locations of the server (Whittaker, 2015). The safe guard of the data can only be maintained if the data that is being inserted is being committed after every step of data inserted. The committed data should follow a specific norm, which is to be relate to the investigation that can to take place along with the evidence that the vendor will be able to view with the prospective of the activity. Apart from this process, there is no other safe guarding procedure for the data of the user, which is being stored in the servers of the company (Whittaker, 2015).
Investing in cloud servers through Infrastructure-as-a-Service (IaaS)
The major aim, which is to be followed when moving into the cloud server can directly help in the achievement of the cloud computing resources like data servers, and application based on the working of the data servers (Rosário, 2014). The company achieves the procedure by the help of a simple pay and use procedure, which requires the company to pay a certain amount of money to the cloud service provider in return for a certain amount of storage on their servers. The overall model of the cloud servers in based on the concept of the use of virtualization and intelligent computing techniques based on the distributed mechanism of cloud architecture (Pratyusa et al., 2013). The main module architecture of the cloud servers can be achieved by the company with the help of the use of high amount of resources, which should be abstracted in nature, use of instant scalability and flexibility properties of the data that is being transferred onto the cloud. The data that is being used should also follow the property of the near provisions of the instantaneous of the visual aid of the data (Pagliari and Kevin, 2014). All the resources should be shared among all the other resources so that the whole system will be able to function in a proper manner. The service on demand facility of the cloud servers should be taken up by the company, which would help the organization to not pay extra for any unwanted space and just buy the space when they require it. The management of the cloud resources should be done using the best form of programmatic management otherwise the data will fail to get stored in the server and there will be a huge loss in money. The different types of cloud services that are offered by the cloud service providers are Software as a service (SaaS), Platform as a service (PaaS) and Infrastructure as a service (IaaS). Software as a service (SaaS) can be said to be related to the use of software related services based on cloud servers which are delivered by a third party company which is mainly made available on the pay for the demand basis (Luiijf, 2012). The use of the server is provided through the help of a remote configurable internet remote. These services come in the form of CRM software and spreadsheet tools. Platform as a service (PaaS) is a form of cloud service providing procedure which makes use of an API ton provide the customer with the delivery of the new cloud service. The company is provided with an API interface, which helps in the use of the services in the form of a deployment platform or a configuration tool or in the form of a development tool (Kowalski, Rostyslav and Robert, 2012). This type of services are provided by Microsoft Azure and google search engine services. Infrastructure as a service (IaaS) is the use of the virtual machine concept for the provision of the cloud servers to the users who require a separate cloud server for their company but does not want to take the responsibility of looking after the server all the time (Kim, Ronnie D. and Kyung, 2012). This is done by the cloud providers and are controlled by the user by an API. The most common use of this type of service is by the Amazon web services.
The benefits of using IaaS and cloud technology
With respect to Myer, the best solution for the company would be to buy a certain amount of space on the cloud server and avail the use of the Infrastructure as a service (IaaS). This would help them to have a separate location for their services on the cloud and the care to be taken for the cloud server is zero for them. They would only be required to be charged for the servers that is being provide for them (Jo, Hakkon and Kwangwoo, 2014). The security aspect of such use of technology is very high. The cloud provider has the maximum headache on their mind because if their services are compromised then they would receive a bad name in the market and the user would start to back out of their services. The business of providing cloud services in the form of Infrastructure as a service (IaaS) is of a very high risk as well as of a very high profit margin for the company. Though the initial cost of the purchase of the servers is high, it would help the company in the long run to keep their users data safe on the cloud. The timely update of the servers will come at no extra cost for the organization. Thus, it would be the best choice for Myer to select Infrastructure as a service (IaaS) for their organization’s use (Ductor, Lorenzo, and Daryna Grechyna, 2015).
Taking into account of the different threats that are constantly being produced for the cloud servers, many of the companies are not even ready to move to a cloud based data server. The use of the servers always poses threats to the company as they are not always satisfied with the cloud servers. They imagine that the server might shut down at any time and all the data might get lost into the network stream (Chou, 2013). This is not the case that is occurring on a cloud server. The data that is being used for the transaction procedure is always safe. The data is being processed using the process of roll back and deadlock mechanism, which uses keeps the data safe even if the server fails to keep up with the transaction procedures (Chen, Deyan, and Hong Zhao, 2012). The vulnerabilities for the use of a cloud server is that the hacker might be able to get in to the server without the company even knowing about it. The hacker can then steal the information from the sever and leave without leaving behind any kind of trace of the working they had just done on the server. This would become harmful and should be stopped with the help of regular monitoring of the network stream (Cardenas at al., 2013). If there were any kind of wrong IP address in the network stream then the officials will be notified instantly and they would start working on the problem as soon as possible. The service providers will do everything to keep their data as well as the data of their customers safe form the attack (Buldt et al., 2013). Apart from this active attackers there is another kind of attackers termed as passive attackers. They does not cause havoc on the servers but start their work slow by collecting information from the network stream that is connecting the server to the company. They read packets and try to make out the information that is being transferred. Once they gain enough knowledge, they leave and come back with a planned out bigger attack. This attack can be easily reduced with the help of effective cryptographic techniques when the data is being transferred through the network (Baicu and Andrei Mihai Baicu, 2012).
Regular monitoring and risk mitigation for effective data protection
The concept of data security is of high importance when it comes to keeping data safe from the hands of hackers and from the attack of data breaches. The company chosen for the report, Myer has recently moved into the field of e commerce technology. This means that the company will be having a data set of large amount of users and their respective personal information and bank account details. This details if gets leaked then the users will be compromised (Andreosso-O’Callaghan and Jörn Carsten Gottwald, 2013). The situation would not be able to be controlled into a small location. The hackers will be able to clear out money form the accounts of the user of the Myers online e commerce website. For the safety of the company as well as for its users the company should invest in a cloud server which would help the company to keep the data related to all the sensitive work safe and out of the reach of the hackers. Once on the cloud server, the data is encrypted using two-step verification model, which would require extensive work in cracking the data. More over the data is kept safe from all types of virus attack and breaches. The breach will be detected even before they are able to get into one layer of the security protocol of the cloud servers (Aloul, A R Al-ali and Mamoun, 2012). The use of the cloud also helps the company to spread their data over a large amount of area and in turn making it hard for the hacker to locate the continuity of the data stream. Apart from all this facts the company should always follow a risk mitigation procedure, which should be kept at arm length at all, times. This would help the company to reduce the minimum amount of risk as soon as it occurs (Aduda and Elizabeth, 2012).
Conclusion
To conclude this report, it can be said that the organization Myer would be successfully implement the clouds computing servers in their system if they are able to follow the report that has been produced for the organization. The use of a cloud server would help them to keep their data a safe as well as keep it away from the hackers and data breaches which might occur on the organization. As already discussed in the report it would be highly beneficial for the organization to shift to the use of Infrastructure as a service (IaaS) on a cloud server which would make the data of the users safe.
References
Aduda, Josiah, and Elizabeth Kalunda. 2012. “Financial Inclusion and Financial Sector Stability With Reference To Kenya: A Review of Literature.” Journal of Applied Finance & Banking 2(6): 95–120.
Aloul, Fadi, A R Al-ali, Rami Al-dalky, and Mamoun Al-mardini. 2012. “Smart Grid Security : Threats , Vulnerabilities and Solutions.” Smart Grid and Clean Energy Smart (971): 1–6. https://www.aloul.net/Papers/faloul_ijsgce12.pdf.
Andreosso-O’Callaghan, Bernadette, and Jörn Carsten Gottwald. 2013. “How Red Is China’s Red Capitalism? Continuity and Change in China’s Financial Services Sector during the Global Crisis.” Asia Pacific Business Review 19(4): 444–60.
Baicu, Floarea, and Andrei Mihai Baicu. 2012. “Risks Management Relating to Information Systems Security Vulnerabilities and Threats in Information Systems.” Quality - Access to Success 13(128): 112–16.
Buldt, Andrew K. et al. 2013. “The Relationship between Foot Posture and Lower Limb Kinematics during Walking: A Systematic Review.” Gait and Posture 38(3): 363–72.
Cardenas, Alvaro a., Pratyusa K. Manadhata, and Sreeranga P. Rajan. 2013. “Big Data Analytics for Security.” IEEE Security & Privacy 11(6): 74–76. https://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=6682971.
Chen, Deyan, and Hong Zhao. 2012. “Data Security and Privacy Protection Issues in Cloud Computing.” 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE) 1(973): 647–51. files/443/Chen and Zhao - 2012 - Data Security and Privacy Protection Issues in Clo.html.
Chou, Te-shun. 2013. “Security Threats on Cloud Computing Vulnerabilities.” International Journal of Computer Science and Information Technology 5(3): 79–88. https://www.airccse.org/journal/jcsit/5313ijcsit06.pdf.
Ductor, Lorenzo, and Daryna Grechyna. 2015. “Financial Development, Real Sector, and Economic Growth.” International Review of Economics and Finance 37: 393–405.
Jo, Hoje, Hakkon Kim, and Kwangwoo Park. 2014. “Corporate Environmental Responsibility and Firm Performance in the Financial Services Sector.” Journal of Business Ethics 131(2): 257–84.
Kim, Ju Young, Ronnie D. Caytiles, and Kyung Jung Kim. 2012. “A Review of the Vulnerabilities and Attacks for Wireless Sensor Networks.” Journal of Security Engineering 9(3): 241–50.
Kowalski, Stewart, Rostyslav Barabanov, and Robert Hoffmann. 2012. “Cyber Security Alert Warning System: A Socio-Techinal Coordinate System Proposal.” In Proceedings - 2011 3rd International Workshop on Security Measurements and Metrics, Metrisec 2011, , 21–24.
Luiijf, Eric. 2012. “Understanding Cyber Threats and Vulnerabilities.” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7130: 52–67.
Pagliari, Stefano, and Kevin L. Young. 2014. “Leveraged Interests: Financial Industry Power and the Role of Private Sector Coalitions.” Review of International Political Economy 21(3): 575–610.
Pratyusa K. Manadhata HP Labs, Princeton, NJ, USA, USA Alvaro A. Cárdenas University of Texas, Dallas, and Sreeranga P. Rajan Fujitsu Laboratories of America. 2013. “Big Data Analytics for Security.” IEEE Security & Privacy (December): 74–76.
Rosário, José Luís Pimentel do. 2014. “Biomechanical Assessment of Human Posture: A Literature Review.” Journal of Bodywork and Movement Therapies 18(3): 368–73.
Tankard, Colin. 2012. “Big Data Security.” Network Security 2012(7): 5–8. https://linkinghub.elsevier.com/retrieve/pii/S1353485812700636.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2019). Myer. Retrieved from https://myassignmenthelp.com/free-samples/journal-of-bodywork-and-movement-therapies.
"Myer." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/journal-of-bodywork-and-movement-therapies.
My Assignment Help (2019) Myer [Online]. Available from: https://myassignmenthelp.com/free-samples/journal-of-bodywork-and-movement-therapies
[Accessed 21 November 2024].
My Assignment Help. 'Myer' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/journal-of-bodywork-and-movement-therapies> accessed 21 November 2024.
My Assignment Help. Myer [Internet]. My Assignment Help. 2019 [cited 21 November 2024]. Available from: https://myassignmenthelp.com/free-samples/journal-of-bodywork-and-movement-therapies.