create 1 new thread, and provide substantive comments on at least 3 threads created by other people. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.
- If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?
create 1 new thread, and provide substantive comments on at least 3 threads created by other people. Make sure to explain and backup your responses with facts and examples. This assignment should be i
Mukesh Arukala discussion COLLAPSE Top of Form In a scenario like this one, the architecture systems react and collaborate with the security features of an existing system where it has been installed or deployed. In system analytics, we only have privileged users in charge of the host architecture to ensure that the system is up and running, hardening it, maintaining, and patching. In summary, the privileged users will ensure that the host architectural system is safe and secure from external interference and that the applications running in are all safe. However, it should be recalled that those individuals referred to as Digital Diskus are highly trained. Besides, such individuals are provided with separate and independent systems to run their programs, such as web searches, emails, spreadsheets, and other digital tasks assigned to them. As far as their duties are concerned, such individuals do not have any room to perform or even access the following functions. They include data gathering, reporter, and console management. They might possess the right to inherit any data in the system, but they will still lack the authority to view or question business intelligence and analysis results. In an enterprise setting, the administrative account is allocated the most privileges. This gives the attackers a difficult time to breach the security and secure full control of the system. According to Beer and Hassan (2018), the administrative account can thwart it and revert the system back to its normal operations in case of an attack. If the administrative accounts have also been lost to an attacker, then a more comprehensive and precautious approach is necessary. Here users will have to bank on the several controls privileged on administrative accounts and which are usually on standby for such incidences. Sharing of information within the system stands to be one of the most concerning areas for attackers. It is not easy to trust a Digital Diskus ecosystem because it is not entirely safe to share sensitive information. Before allowing users to share such information, there is a need to ensure that the system has been adequately protected and thus safe and trustable. Besides, the management should ensure that sensitive data has been protected through encryption methods before sending it over the network. The management console’s output was considered an attack service because if it happens that the system output needs to be protected, and then there is a need to declare the output as a possible attack survives. This is because if the attacker manages to gain access through the output section, such an attacker will most likely access several system credentials. The credentials will enable the attacker to easily know the types of data contained in the system and the methods of accessing them. Reference Beer, M. I., & Hassan, M. F. (2018). Adaptive security architecture for protecting RESTful web services in an enterprise computing environment. Service-Oriented Computing and Applications, 12(2), 111-121. Bottom of Form Anilreddy Gaddam Week 4 Group Discussion COLLAPSE Top of Form Agent Attack In an organization, the biggest problem that we want to eliminate is API security. For Digital Diskus selecting the best API security will help to secure libraries and API. Public-key authentication was used by the firms in which it is considered an insecure manner hence tougher identity checker will be given by it. At the time of using this type of security, an entity of both right phrase and secret key were needed where it is used to a new entity it will verify itself (Ayres et al., 2019). To get a secret key a malicious agent would have valid users and they can launch to the earner’s phrase of physical-force or directory hacking. Authentication methods were given by the Digital Diskus business analytics for its valid agents which able to protect their systems that are from being hacked. For security authentication is essential. Furthermore, the system included layers the authentication strength is determined. For compliance the authentication is useful. In national assets protection, most of the organizations seek to protect some of the assets are API and libraries. The hackers aim to retrieve the API and libraries to write and agent and in the same way make the installations. Simply the API can determine protocols, routines, or tools where they are followed and to software, these structuring applications are related. From the attacker all the agents are malicious and they may end up the data processed that are running crucially (Mayr et al., 2018). For attackers, the main aim is to get access to relevant data illegally from the database. To secure assets the systems cannot guarantee, therefore the organizations should deploy the safeguard standard security measures to themselves. From exploiting the system vulnerability the malicious software will be prevented through the necessary security processes include the patch. For several system production processes the Digital Diskus has different applications which include accounting, marketing, procurement, financing, etc. Therefore the organizations should strive to protect the organization’s sensitive data from attackers that including the attacker’s agent and through API and libraries this might be propagated. To detect any attacks on systems the regular risk assessment should be done and on systems, these might be executed. Thus the attacker for those data sources will know that what type of data sources will exist and to the access methods they are quite possible and by the agent or protocol each access must be configured. Through Digital Diskus different methods will exist and they can protect themselves from the attacks of API and libraries. Patch and block is one way, which can be achieved through whistling applications and they may run on the system. On system to resist agent attacks, this is a good way. Basic security principles were adhered to by the Business Analytics, thus the system allowing will be deployed in the environments which are less trusted, even less protected than the Digital Diskus were provided (Valk, 2019). An attack surface the entirety of the Management Console will have every input and every output. All the inputs were made by the points which were considered as the attack surfaces. To various interfaces, authentication was provided by the identity systems of the business analytics system. References Ayres, D. L., Cummings, M. P., Baele, G., Darling, A. E., Lewis, P. O., Swofford, D. L., Huelsenbeck, J. P., Lemey, P., Rambaut, A., & Suchard, M. A. (2019). BEAGLE 3: Improved Performance, Scaling, and Usability for a High-Performance Computing Library for Statistical Phylogenetics. Systematic Biology, 68(6), 1052–1061. https://doi.org/10.1093/sysbio/syz020 Mayr, P., Frommholz, I., Cabanac, G., Chandrasekaran, M. K., Jaidka, K., Kan, M.-Y., & Wolfram, D. (2018). Introduction to the special issue on bibliometric-enhanced information retrieval and natural language processing for digital libraries (BIRNDL). International Journal on Digital Libraries, 19(2/3), 107–111. https://doi.org/10.1007/s00799-017-0230-x Valk, A. (2019). Systems Thinking and Arts Integration Through Library Educational Programming on a STEM Campus. New Review of Academic Librarianship, 25(2–4), 244–270. https://doi.org/10.1080/13614533.2019.1623271 Bottom of Form Pavan Kumar Digumarthy Discussion COLLAPSE Top of Form The Diskus is designed to detect new attacks that can be performed on it. Digital Diskus respond by saying they have all sorts of safeguards to avoid such an attack, with multiple security layers. They also point to code that restricts anyone’s ability to pull up their video stream on the Internet or to access the World Wide Web from a computer that is not at the Alva office. So, if the attack does happen, it would be slowed down a lot, potentially for a while. If such an attack is detected, the new firmware is installed to limit the possible damage it may cause (Ramsey et al., 2019). If the Diskus determines the attack was successful, a warning message appears on the screen. This should not be confused with the software shutdown. If the warning message appears, the Diskus will shut down. If no warning message appears, the Diskus will continue to work as usual. A manual repair or backup is recommended. The Diskus comes in two flavors of user interfaces. One is the On-the-Fly version used by users who want to read information about a new attack (Ramsey et al., 2019). The other is the real-time version used by users who want to add content or configure configuration settings to the Diskus. The Diskus itself is comprised of a series of pages that can be opened by clicking on an icon, with icons pointing to each step in the real-time system. So, if a new attack is detected in memory, it will immediately be displayed on the screen. With this, the attackers can monitor system activity on a live network and trace patterns and characteristics (Ramsey et al., 2019). Building a data analytics application in a customized enterprise service solution will go a long way toward ensuring that enterprise applications can see real-time data. Cloud Kit gives a ready-made solution to build enterprise apps with analytics or other data on-premise and install them in the cloud. Cloud Kit integrates with Microsoft SQL Server and Azure SQL Database to build high-performance, multi-tenant, highly scalable, and highly scalable data-driven applications (Maple et al., 2019). In this it gives an overview of how the Cloud Kit is made up of components and to discuss their roles and purpose. It also gives a sneak peek at one of the Cloud Kit components, the Cloud Kit SDK and provides an overview of its built-in schema and deployment strategies. Finally, it gives some of the key considerations when migrating from a pre-Cloud Kit data analytics app (Maple et al., 2019). Organizations’ business analytics systems also allow managers to monitor aspects of their business, not only on a day-to-day basis, but also for changes over time, such as when sales, marketing, and operations departments make changes in technology or processes. There is nothing like seeing a growth chart to put a stop to creative choice. The business analytics system has some email intercepting capabilities, and it tracks the schedule for a conference that is attending. Maybe it has access to Facebook and Twitter accounts. There is plenty of potential for abuse, and like how not all pedophiles are human, not all Internet surveillance is constitutional (Maple et al., 2019). References Ramsey, R. R., Plevinsky, J. M., Kollin, S. R., Gibler, R. C., Guilbert, T. W., & Hommel, K. A. (2019). Systematic Review of Digital Interventions for Pediatric Asthma Management. The Journal of Allergy and Clinical Immunology: In Practice. Maple, C., Bradbury, M., Le, A. T., & Ghirardello, K. (2019). A connected and autonomous vehicle reference architecture for attack surface analysis. Applied Sciences, 9(23), 5101. Bottom of Form