Cloud-Based Reputation Checks

One of the big challenges with cloud-based reputation checks is  performance. Users do not typically want to wait a few seconds while the  reputation of potential URLs is checked. Most of us have come to expect  that websites are at the immediate tips of our fingers and that access  and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service  exists in the cloud, the challenge can be summed up as, “How can a  reputation be securely retrieved without slowing Web access down so much  as to create a poor user experience?”
Answer the questions with an APA-formatted paper, in-text citation(Title page, body and  references only). Response should have a minimum of 600 words. A minimum of two references are required.

 

Don't use plagiarized sources. Get Your Custom Essay on
Cloud-Based Reputation Checks
Just from $13/Page
Order Essay

 

SafeAssign Originality Report Fall 2021 – Security Architectu… • Chapter #9 Assignment

%45Total Score: High riskLakshmi Narayana Pothakamuri Submission UUID: 804f61c5-4576-030e-cde6-5f8e0d6ad62a

Total Num …

1 Highest M …

45 % Week 5 Chapt…

Average M …

45 % Submitted …

11/2… 08:42 PM CST

Average W …

754 Highest: Wee…

View Originality Report – Old Design

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

1 of 8 11/21/2021, 12:48 PM

 

 

%45

%45Attachment 1

Institutional database  (3)

My paper S… S…

Top sources  (3)

Excluded sources  (0)

Word Count: 754

Week 5 Chapter 9 Assignment.docx

1 2 3

1 My paper

2 S…

3 S…

Running Head: Cloud based reputation 1

2

Cloud based reputation

Security Architecture & Design

ISOL-536-B05

Chapter#9 Assignment

Submitted to

1

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

2 of 8 11/21/2021, 12:48 PM

 

 

Adjunct Professor Dr. Charles DeSassure

University of Cumberlands

Lakshmi Narayana Pothakamuri

11/20/2021

One of the main concerns that arises when developing services such as cloud-based reputation is to agree on the level of secrecy the reputation should have. Clearly, if an attacker is aware mali- cious site with poor reputation, they might take advantage of this state and change the site domain or they might make other uncer- tain moves (Baranwal & Vidyarthi, 2018). Domain proprietors need a strategy to actually look at the reputation of a domain as well as work on fixing poor reputation rating with assistance of the service provider. Any reputation service that hopes to remain feasible should provide domain proprietors a technique for checking their domain and URLs and to hold up a protest if exploited. Clearly, re- view can likewise be manhandled; no doubt, change services are mishandled. Web filtering gateways normally provides a multiple security layer into a single framework to give outbound filtering protection from vindictive or undesirable sites. Gateways should be told which sites are malevolent or unwanted. While you could take a series of static lists of known awful URLs and IPs and consol- idate them to attempt to hinder noxious sites, static records can- not keep up with sites and IPs whose status changes from harm- less to malignant and back quickly. Exact, convenient web group- ing, web reputation and IP reputation threat intelligence all work to enhance security level that gateway can give. For high-security en- vironment that entail solid security, the need to add authentication of TLS certificates arises. On top of authenticating the certificate authority marking chain, additionally approve server certificate (Khosrow-Pour, 2020). This makes it hard to mimic the reputation server. To enhance security on the user’s side, it is important to en- sure that all are mature enough to manage their records, design their security plans and obviously pay for the services.

1

1

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

3 of 8 11/21/2021, 12:48 PM

 

 

Consequently, there should be a UI and user services. These

will probably utilize validation to attach record and administrations to clients. Web frameworks that don’t necessarily broadcast to the public are normally authenticated to curb traffic as well as ensure that only authorized personnel can access it and keep off any other user who can interact with the site. Websites sites with many users don’t necessarily benefit from authentication. For this

reason, these services are to be devoured simply by paying clients. That, obviously, won’t prevent an attacker from acquiring a sub- scribed account that can be used to launch attacks. Validation

cannot be the main control set up, for this single explanation. All things considered, and in any case, by far most of subscribed clients are searching for enhanced security not necessarily for a framework to attack. Authentication is probably going to reduce possibilities of an attack by eliminating exposure to all the pro- grammed attack that are at any point launched on the internet. One way of achieving the authentication is to give an authentica- tion certificate to the gadget. Alongside a certificate which can be authenticated, when the gadget is registered, its model number as well as the holder’s ID will be integrated. The communicator

raises a TLS passage to the server, approving the server certificate, according to the TLS convention (Wang & Benatallah, 2017).

Then, at that point, the gadget certificate is introduced.

Whenever approved, communication can stream. This implies that only registered gadgets are permitted reputation services and are always under observation. Additional validation can be installed on the server certificate to guarantee that the link receives its in- tended services. That acts as an additional validation over the TLS validation available in the protocol’s server-side validation. To im- pact servers authentication certificate (other than the one offered by approving the chain of marking certificates), the server’s certifi- cates should be reserved for correlation on the gadget. This valida- tion should be carried out once TLS has been effectively instanti-

ated. References

Baranwal & Vidyarthi, D. P. (2018). Auction based resource provi-

2

3

2

2

3

2

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

4 of 8 11/21/2021, 12:48 PM

 

 

Source Matches (13)

My paper 100%

My paper 100%

sioning in cloud computing. Springer. Wang & Benatallah, B. (2017). Cloud computing: Methodology, systems, and applications. CRC Press. Khosrow-Pour D.B.A., M. (2020). Encyclopedia of infor-

mation science and technology (5th ed.). IGI Global.

References

Alpay, D. (2019). Reproducing kernel spaces and applications.

Springer Science & Business Media. Perla, E., & Oldani, M. (2017). A guide to kernel exploitation: Attacking the core. Elsevier.

Yehoshua, N., & Kosayev, U. (2021). Antivirus bypass

techniques: Learn practical techniques and tactics to combat, by- pass, and evade antivirus software. Packt Publishing.

1

1

1 1

1

Student paper

Security Architecture & Design ISOL-536-B05

Original source

Security Architecture & Design ISOL-536-B05

1

Student paper

Adjunct Professor Dr.

Original source

Adjunct Professor Dr

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

5 of 8 11/21/2021, 12:48 PM

 

 

My paper 100%

Student paper 89%

Student paper 66%

Student paper 75%

1

Student paper

University of Cumberlands Lakshmi Narayana Pothakamuri 11/20/2021

Original source

University of Cumberlands Lakshmi Narayana Pothakamuri 11/20/2021

2

Student paper

These will probably utilize validation to attach record and administrations to clients.

Original source

These will apparently utilize validation to attach record and administrations to clients

3

Student paper

For this reason, these services are to be devoured simply by paying clients.

Original source

For this situation, these administra- tions are to be burned through simply by paying clients

2

Student paper

Validation cannot be the main control set up, for this single explanation.

Original source

Confirmation can’t be the main con- trol set up, for this single explanation

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

6 of 8 11/21/2021, 12:48 PM

 

 

Student paper 81%

Student paper 80%

Student paper 78%

My paper 100%

2

Student paper

The communicator raises a TLS pas- sage to the server, approving the server certificate, according to the TLS convention (Wang & Benatallah, 2017).

Original source

The communicator raises a TLS pas- sage to the server, approving the server endorsement, according to the TLS convention

3

Student paper

Then, at that point, the gadget certifi- cate is introduced.

Original source

Then, at that point, gadget authentica- tion is introduced

2

Student paper

Whenever approved, communication can stream.

Original source

Whenever approved, correspon- dences can stream

1

Student paper

Reproducing kernel spaces and appli- cations. Springer Science & Business Media. Perla, E., & Oldani, M.

Original source

Reproducing kernel spaces and appli- cations Springer Science & Business Media Perla, E., & Oldani, M

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

7 of 8 11/21/2021, 12:48 PM

 

 

My paper 100%

My paper 100%

My paper 100%

1

Student paper

A guide to kernel exploitation: Attacking the core.

Original source

A guide to kernel exploitation Attacking the core

1

Student paper

Yehoshua, N., & Kosayev, U.

Original source

Yehoshua, N., & Kosayev, U

1

Student paper

Antivirus bypass techniques: Learn practical techniques and tactics to combat, bypass, and evade antivirus software.

Original source

Antivirus bypass techniques Learn practical techniques and tactics to combat, bypass, and evade antivirus software

Originality Report https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c…

ORDER NOW »»

and taste our undisputed quality.