Sign In
Not register? Register Now!
Pages:
2 pages/β‰ˆ550 words
Sources:
4 Sources
Style:
APA
Subject:
Management
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.44
Topic:

Mitigating Cybercrime Using Cloud-Based Tools. Management Essay

Essay Instructions:


Please make sure to include the introduction and the conclusion.

Essay Sample Content Preview:

Mitigating Cybercrime Using Cloud-Based Tools
Name
Institution
Mitigating Cybercrime Using Cloud-Based Tools
Cloud-based attacks have become common in the recent past and there is a need to adopt identification and mitigation techniques that are effective. As noted by Roy, Sarkar, Ganesan, and Goel (2015), clouds is exposed to specific malware, besides the usual standard security threats in the cyberspace. The cloud makes our systems vulnerable to attacks from external sources because, as Information Technology moves to the cloud, so does malware (Fernandes, Soares, Gomes, Freire, &Inacio, 2014). Thus, using cloud-based tools is the best solution to deal with malware attacks. In addition, commonly used anomaly detection methods are inefficient, which calls for the adoption of cloud-based methods such as entropy, which are efficient in detection of malware (Berezinski, Jasiul, &Szpyrka, 2015). Other cloud-based tools include the Mykonos Web Security and cloud-based sandbox.
Entropy-based approach is one of the cloud-based tools used in the detection of malware. According to Berezinski, Jasiul, and Szpyrka (2015), entropy is a measure of the unpredictability of a random variable. A bigger entropy ensures that information is highly encrypted, thus securing the data from possible malware attacks. One way of identifying whether a network has been intruded by external attackers is through the detection of anomalies in the network (Berezinski, Jasiul, &Szpyrka, 2015). Entropy-based approach detects anomalies in the network via the distribution of features in the network traffic. Several studies have revealed that entropy is the best solution for detecting malware and can be used to encrypt information, either in storage or in transit. As such, our organization can consider adopting this approach to deal with the recent malware attacks.
Another cloud-based tool that is effective in the detection and mitigation of malware is the Mykonos Web Security. This tool relies on the concept of deception, where it predicts eminent attacks by confusing and stopping attackers (Roy, Sarkar, Ganesan, &Goel, 2015). The attackers' usage site profile is...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!