FYU 0180: Integrated Project - Free Samples to Students
Identify a problem within your chosen subject area
Search for literature which shows previous attempts at solving the problem and review it
Find your own way of solving the problem and put it into practice
Present your findings and conclusions
You will need to decide on a topic area and research project which is related to your chosen Undergraduate programme of study, achievable in the limited time available and agreed with your teacher.
Your research project will continue through semester 2, but the deadline for assessment 1 is as early as week 5, so you will need to begin immediately in order to achieve a successful start (and conclusion) to your research project. There will be sessions through the semester which will be entirely practical in nature, meaning that you can make use of the class time to continue your work and use your teacher to help and advise, but most of the work you do for your project will be conducted outside of class time, and it will involve a lot of time spent reading, thinking and writing. The three assessments do not directly evaluate your time management skills, however, you will need to ensure you work to a plan, and stick to it, in order to succeed.
You are advised to view this unit and its assessment regime as a mini-dissertation, with assessment 2 being the dissertation report and assessment 3 being the dissertation presentation. In keeping with this theme, your teachers for this unit become your dissertation supervisors and as such, you should seek to meet them as and when needed during the course of the semester. We will reserve tutorial slots for this purpose during semester 2.
Note: the purpose of a research supervisor is to offer advice and assistance. In order to gain the maximum benefit, you need to come to meetings with questions to ask. Your supervisor will do his/her best to help, but you need to decide what the problems are before attending meetings.
Assessment 1: The Problem Based Report Document
The task:
Write a problem based report which introduces a problem connected to your chosen area of study.
Your report should consist of three sections:
An explanation of the problem
A discussion of results and conclusions of previous research projects. This will be the result of a small literature review, involving your reading of four sources; two of them should be electronic and two should be hard copy.
An introduction to the approach you are going to take in solving the problem. Tell the reader how you will conduct your research and gather data and results. This section should begin with a clearly defined research question, followed by a clear explanation of the research you are going to undertake and how you will go about it, including some indication of why you believe you can complete the work of the project within the limited time available.
Weighting: This assessment carries 30% of the overall grade for the unit.
Deadline and submission:
Submission will be in electronic form, via BREO. A submission box will be set up for you a week before the deadline.
Criteria:
In marking and grading your work, we will be looking for evidence of the following:
Clear and concise writing in a uniformly academic style
A clear structure, which follows the instructions as set out above
A clearly defined problem and research question which is relevant to the problem and achievable within the time limit.
A well organised literature review which is relevant to the problem and your research project.
Your adherence to referencing conventions as set out in the Harvard Referencing handbook
Understanding of and detailed reading around the topic and problem
That you have precisely followed the instructions in this task sheet
Feedback:
You will receive written and oral feedback within a working week of submission, including a provisional grade.
Assessment 2: The Project Report
The task:
Write a research report, which reports the research you undertook, the results and the conclusions. You should also include a section in which you reflect on the success or otherwise of the approach you took to solving the problem, with some identification of how you might choose to do things differently the next time you carry out a research project.
Your research report should include:
Some background information on the problem you have been researching
A discussion of your research methods
A discussion of your findings and results
The conclusions you have reached
An evaluation of the success of your chosen research method.
Answer:
Problem Statement
Cloud computing has immensely changes the way of computing and its resources. Cloud computing has been creating a great revolution in the data storage services over the internet. Cloud computing has encompasses activities including the use of social networking websites and other databases. However, there have been various security issues included in the cloud computing related to sensitive data and information (Bhadauria et al. 2014). Various organizations and users upload and store their data over the cloud storage. However, this become risky for them to store their data and information over cloud. However, the cloud computing has been able to fix security problems in the operations. Rather, there several loopholes present in the security protocols of the cloud computing.
This report addresses cloud security based on three layered approach in which outcomes of each layer is affecting next layer. Initially, major threats and risks to the cloud computing including DoS attacks. Research on these measures will help in understanding nature of problem. Secondly, new emerged security risks sin the cloud computing and their underlying mechanism has been discussed in the report. This knowledge will help in understanding existing loopholes in the security protocols. Various illegal techniques used in order to breach data and information from online database of cloud storage. Thirdly, the flaws in the security procedures and present security techniques and strengths of security hazards.
Previous work
Various researches have been done on cloud computing and security issues in the cloud computing. The security issues in the cloud computing have been creating problems for organization. As identified by Ochani and Dongre (2017), there have been seven security issues in cloud computing model including privileged user access, regulatory compliance, data location, data segregation, data recovery, research support and long-term viability. Cloud Computing has been providing on-demand services to the users. Cloud computing has helped in providing several services to users and organizations. Data and information transmitted form customer through internet that create high degree of risk as data might get lost on the way. The internet security protocols have been installed in organization. The regulation for misuse of legal authorities in the cloud security has been continuously broken in the market. Therefore, thus has been an important decision of various governments for increasing security of cloud data over the internet. The management of security has been an important topic in every organization.
Cloud security has been shaping the future of the IT although there has been a dark side in respect to security of data md information. Several studies have been focused on the security issues in cloud computing. A detailed analysis has been provided in those literatures and researches. As commented by Almorsy, Grundy and Müller (2016), cloud computing used to minimize complexity and helps in providing fast and easier services. Researchers have found that virtualization has been helping in enhancing IT interventions. Previous research works have focused on traditional concept of the cloud computing that have been creation a basic approach to the research works. The security issues identified in the cloud computing have been obsolete. There have been new threats and risks involved in the cloud computing that have not been explained in the previous literature.
Methods
This report has focused on identifying security issues in the cloud computing in order to handle software engineering context. This report has reviewed previous literature work for acknowledging current literature work. Some research questions have been prepared for the research:
- What are security issues identified in the cloud computing?
- What are the various security techniques used for preventing unauthorized access to data in the Cloud?
- How to handle security problems that can be expected in future cloud computing?
However, most of the research work have been done with traditional literature review approach with low scientific value. The research has used survey and interview for gathering data and information. The research has used a descriptive research design for a descriptive analysis of the research questions. The use of the A quantitative research approach has been used in this research. In survey, the researcher used to select respondents from population and maintaining a standardized questionnaire (Hashem et al. 2015). In this research, the sample size has been 50 participants who are using cloud computing services. A simple random sample technique have been used in order to select participants from population. Survey questionnaire have been prepared using Google Forms and sent online to participants.
Cloud Computing has got hold on the potential for eliminating requirements for gearing up high cost computing services and infrastructures in the market. The use of IT based solutions provided by any organization needs to be maintained by a well-developed software package for minimizing the complexity. The use of the cloud computing helps in minimizing cost of computing resources in the market. The tenancy of the cloud computing feature have been helping in providing a better approach to the complexity of the systems in the company. The configurable devices in the network connected with cloud have to be well maintained under security protocol (Sen 2014). The use of cloud computing has been helping in providing a better opportunity to the organization and businesses for maintaining great approach in the market. Cloud computing has been helping in providing a better opportunity to the companies in the market. Cloud computing technology has been helping in maintaining the cost of the computing services. The cost of computing services have been reduced in the market. Therefore, the total expenditure of the company have been increased. Cloud computing is may use for data storage. Sensitive data and information of the companies have been stored over the internet.
There has been various security issues in the Cloud computing as it includes various technology including databases, networking, databases and operating systems. These technologies in has been updating the software and the functions of the companies in the market. The cliud comouting has been helping in minimizing the co plxituies in the servyces provided by the cmonaies in the market. The use of cloud computing technology has been heloing in orivididng several servyces in the company. The networking analysis of companies have been hoeing in minatining a keen approach to the development of the network security in the company. Cloud is where we can access services that help to store, run software application anywhere in the world through internet when needed. The cloud can scale down resources on what we need which is cheaper than buying hardware.
Infrastructure as a Service (IaaS): This model describes about providing physical hardware computing resources to the clients in the market. The company used to share various computing resources in order to maintain a low cost of the computing hardware in the market. The use if the IaaS services helps in maintaining a keen approach to the development in the company in the market (Inukollu, Arsi and Ravuri, 2014). This prompts the client being more in charge of dealing with their own particular information security with the seller being more in charge of physical security, since they claim and deal with the physical gadgets being utilized as framework. Cases of IaaS company administrations incorporate GoGrid, Amazon Elastic Compute Cloud (EC2) and Rackspace Cloud.
Platform as a Service (PaaS): PaaS gives clients a chance to utilize company's cloud foundation to convey client made web software/programming. Normally company controls and keeps up the physical PC equipment, working frameworks and server software while the client just controls and keeps up their created programming software. Clients would along these lines be essentially in charge of any security misuses that could focus on their software, while company is not in charge of physical security, yet additionally for any security abuses that could target organize associations, information stockpiling and information get to (Singh, Jeong and Park 2016). Cases of PaaS seller administrations incorporate Google App Engine, Force.com, Amazon Web Services Elastic Beanstalk, and the Microsoft Windows Azure stage.
Software as a Service (SaaS): In this model, the seller gives clients programming software utilizing their cloud foundation and cloud stages (Puthal et al. 2015). The seller is for the most part in charge of guaranteeing all types of security in this administration. Cases of SaaS company administrations incorporate Google Docs, Google Gmail and Microsoft Office 365. From this subsection, it is genuinely clear at this point level of duty shared amongst CSPs and CSPs varies in light of the administration show being utilized.
The security issues in the cloud computing have been creating major impact in the bu8sness of the company in the market. The use of cloud computing in the company has been helping in providing various services in the market. The cloud computing is mainly used for storing huge amount of data online. Various data and information of the company has been stored over the cloud that helps in minimizing the complexity of hardware storage. Therefore, this has been creating risks over the online data storage as various cyber threats have been providing in yhe marjete. The online threat security has been a major issue in the research field (Ali, Khan and Vasilakos 2015). DDoS (Cloud Denial of Service) attack has been an attack that have been affecting the security if the cloud computing over the internet (Dou, Chen and Chen, 2013). Virtual machines have been introduced for both hardware and software solution to the cyber threats. However, there has been various technical difficulties in the virtual machines including key logger examinations. This application helps in meeting needs of various application for daily purposes. Therefore, for a secure cloud storage management, a proper resources in the virtual machines needs to be prop eared (Stojmenovic et al. 2016). Thus, in distributed computing setting, a concern related to security is always some make out of peril yet any danger cannot be unpredictably judged to be a security concern. Bit of commitments among the get-togethers related with a distributed computing system may achieve experiencing abnormality which may definitely incite a situation with security vulnerabilities.
There has been various security risks in the cloud computing. Some of the security risks are discussed below:
Physical security risks: The hardware location of data center of the cloud might be in risk as there have been various network attacks in the data center. Several virus attacks have been reported in the data center if the cloud in recent years. The physical theft of data and information has been operating in different parts of world (Hashizume et al., 2013). The infrastructural theft in the cloud has been reflecting in organizations that have been causing financial loss to the company. The skill development plan including training on cyber securities have been helping in awarding people related to the cyber risks involved in the cloud computing.
Data Security Risks: data and information has been the most important asset for any company in the market. Therefore, several companies used to store their sensitive data rated to financial department of the company over the cloud database. Therefore, the secuirty over the cliud needs to be increased in due case (Rakhmi, Sahoo and Mehfuz, 2013). However, there have been several data theft over the cloud computing that have been creating problems for the company. The loss of sensitive data and information of the company have been creating loss for the company (Fernandes et al. 2014). The cyber laws and regulations have been implemented over the companies for minimizing the cyber treats and attacks over the internet.
One of difficulties for cloud computing is in its level of deliberation and additionally effect in affordability which brings about inadequately characterized security or infrastructural limit (Chen and Zhao, 2012). Research on these measures will help in understanding nature of problem. Secondly, new emerged security risks in the cloud computing and their underlying mechanism has been discussed in the report. This knowledge will help in understanding existing loopholes in the security protocols. Various illegal techniques used in order to breach data and information from online database of cloud storage. Information misfortune and different botnets can come without hesitation for breaking out security protocols. Additionally, multi-occupancy display is likewise a viewpoint that need to be provided consideration (Chang, Kuo and Ramachandran 2016). The use of cloud computing in the company has been helping in providing various services in the market. The cloud computing is mainly used for storing huge amount of data online. Various data and information of the company has been stored over the cloud that helps in minimizing the complexity of hardware storage. Therefore, this has been creating risks over the online data storage as various cyber threats have been providing in the market. (Mircea, 2012). All conventional security risks are in this manner pertinent with included level of intensity in a cloud foundation which makes the continuous achievement of cloud computing a very difficult one. Privacy, accessibility and uprightness are summed up classes into which security worries of a cloud domain falls. Risks for a cloud framework are pertinent both to information and foundation (Yi, Qin and Li 2015).
For adaptable cloud computing, physical level limitations has breathed life into experts for proposing fuse of different level of cloud named as 'compact cloud' for helping getting ready of the specific handling what's all the more, planning for flexible figuring devices (Islam, Manivannan and Zeadally 2016). The earlier cleared up impart nature of satellite correspondence and related security issues are likewise applicable to the convenient cloud computing on account of its being remote correspondence. The use of cloud computing in the company has been helping in providing various services in the market. The cloud computing is mainly used for storing huge amount of data online. Various data and information of the company has been stored over the cloud that helps in minimizing the complexity of hardware storage. Therefore, this has been creating risks over the online data storage as various cyber threats have been providing in the market. The dynamic game-plan of cloud computing energizes various level of extensibility for the cloud customers with different level of security issues (Jouini and Rabai 2016). In an arrangement of activity, risks for purchasers are related to and subject to the appropriate procedures and methodologies of the cloud pro centers the purchasers are overseeing. Using cloud things or organizations may incite security stresses for the buyers in case they are unquestionably not especially mindful with the sort and particulars of the things or organizations they are to anchor or to use in a cloud area; this is in like manner related to the cloud providers' character and enduring quality. The survey questionnaires used in the research has been based on the research questions that have been initiated in the first. The use of these survey questionnaires have been helping in maintaining a keen approach to the research study. The data analysis of the survey questionnaires have been helping in getting a meaningful approach o the research questions. The respondents have been able to answer properly to questions. The Likert scale used in the data analysis has helped in proper presentation of outcomes of the survey results. The tables and graphs of the survey questionnaires have been helping in proper understanding if the readers to understand the outcomes of the research. However, the research has been able to satisfy all the research questions initiated in the first if the research. One of the inborn issues in this setting is that, the customers may customarily not have limit with regards to recognize or foresee each one of the risks drew in with the specific cloud trade they are overseeing or connected with.
References
Bhadauria, R., Chaki, R., Chaki, N. and Sanyal, S., 2014. SECURITY ISSUES IN CLOUD COMPUTING. Acta Technica Corvininesis-Bulletin of Engineering, 7(4).
Almorsy, M., Grundy, J. and Müller, I., 2016. An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Hashem, I.A.T., Yaqoob, I., Anuar, N.B., Mokhtar, S., Gani, A. and Khan, S.U., 2015. The rise of “big data” on cloud computing: Review and open research issues. Information Systems, 47, pp.98-115.
Sen, J., 2014. Security and privacy issues in cloud computing. In Architectures and protocols for secure information technology infrastructures (pp. 1-45). IGI Global.
Khan, M.A., 2016. A survey of security issues for cloud computing. Journal of network and computer software, 71, pp.11-29.
Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press.
Ahmed, M. and Hossain, M.A., 2014. Cloud computing and security issues in the cloud. International Journal of Network Security & Its Software, 6(1), p.25.
Inukollu, V.N., Arsi, S. and Ravuri, S.R., 2014. Security issues associated with big data in cloud computing. International Journal of Network Security & Its Software, 6(3), p.45.
Singh, S., Jeong, Y.S. and Park, J.H., 2016. A survey on cloud computing security: Issues, threats, and solutions. Journal of Network and Computer Software, 75, pp.200-222.
Puthal, D., Sahoo, B.P.S., Mishra, S. and Swain, S., 2015, January. Cloud computing features, issues, and challenges: a big picture. In Computational Intelligence and Networks (CINE), 2015 International Conference on (pp. 116-123). IEEE.
Ali, M., Khan, S.U. and Vasilakos, A.V., 2015. Security in cloud computing: Opportunities and challenges. Information sciences, 305, pp.357-383.
Aljawarneh, S.A. and Yassein, M.O.B., 2016. A conceptual security framework for cloud computing issues. International Journal of Intelligent Information Technologies (IJIIT), 12(2), pp.12-24.
Stojmenovic, I., Wen, S., Huang, X. and Luan, H., 2016. An overview of fog computing and its security issues. Concurrency and Computation: Practice and Experience, 28(10), pp.2991-3005.
Rao, R.V. and Selvamani, K., 2015. Data security challenges and its solutions in cloud computing. Procedia Computer Science, 48, pp.204-209.
Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M. and Inácio, P.R., 2014. Security issues in cloud environments: a survey. International Journal of Information Security, 13(2), pp.113-170.
Chang, V., Kuo, Y.H. and Ramachandran, M., 2016. Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57, pp.24-41.
Wei, L., Zhu, H., Cao, Z., Dong, X., Jia, W., Chen, Y. and Vasilakos, A.V., 2014. Security and privacy for storage and computation in cloud computing. Information Sciences, 258, pp.371-386.
Islam, T., Manivannan, D. and Zeadally, S., 2016. A classification and characterization of security threats in cloud computing. Int. J. Next-Gener. Comput, 7(1).
Jouini, M. and Rabai, L.B.A., 2016. A security framework for secure cloud computing environments. International Journal of Cloud Software and Computing (IJCAC), 6(3), pp.32-44.
Jaiswal, P.R. and Rohankar, A.W., 2014. Infrastructure as a service: security issues in cloud computing. International Journal of Computer Science and Mobile Computing, 3(3), pp.707-711.
Ullah, K. and Khan, M.N.A., 2014. Security and Privacy Issues in Cloud Computing Environment: A Survey Paper. International Journal of Grid and Cloud Computing, 7(2), pp.89-98.
Hussein, N.H. and Khalid, A., 2016. A survey of Cloud Computing Security challenges and solutions. International Journal of Computer Science and Information Security, 14(1), p.52.
Kaur, R. and Kaur, J., 2015, March. Cloud computing security issues and its solution: A review. In Computing for Sustainable Global Development (INDIACom), 2015 2nd International Conference on (pp. 1198-1200). IEEE.
Yi, S., Qin, Z. and Li, Q., 2015, August. Security and privacy issues of fog computing: A survey. In International conference on wireless algorithms, systems, and software (pp. 685-695). Springer, Cham.
Ochani, A. and Dongre, N., 2017, February. Security issues in cloud computing. In I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2017 International Conference on (pp. 783-787). IEEE.
Buy FYU 0180: Integrated Project - Free Samples to Students Answers Online
Talk to our expert to get the help with FYU 0180: Integrated Project - Free Samples to Students Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.