Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: March 22nd, 2022

Threats Analysis and Framework for Netflix

Threats Analysis and Framework for Netflix
You have evaluated various cloud computing architectures and the security aspects of cloud providers’ services; created a cloud-based security strategy; and completed various hands-on labs. Now it’s time to use this knowledge you’ve gained by providing recommendations for Netflix you selected for your project.
Directions: Provide a comprehensive threat analysis and framework mapping developed For Netflix:
Company Evaluation
Seciurty and Threats
Cloud Recommendation
Threats Analysis and Framework
Your recommendations for improvement or solutions, and a conclusion. In this compiled document, provide at least three to four (minimum) recommendations.
In your final submission:
Describe threats analysis (both physical and logical).
Develop framework mapping that includes 3-4 recommendations for improvement or solutions.
Provide a conclusion.
Threats Analysis and Framework for Netflix
Netflix faces different threats internal and external thus negatively affecting the organizational progress and thus there is a need to develop solutions and countermeasures to eliminate or avert the threats. The security threats faced by Netflix include cyber-attacks, data breaches, virus attacks, the introduction of face Netflix apps, phishing attacks, attack on the streaming services, hacking using confidential details such as passwords or introducing Trojan malware and cyber extortion such as data exposure and the threat of DDoS attacks. The threats result in a decrease in the revenue and profit levels as they push away subscribers and customers. There is a need to adopt countermeasures and solutions through the cloud computing architectures, security aspects of the cloud service providers, cloud-based security strategies and solutions from completed hands-on labs to eliminate and avert risks facing Netflix.
Netflix Evaluation
Netflix as an American media services provider’s primary business entails offering subscription-based streaming media services, streaming of television programs that externally produce as well in-house produced and it offers online streaming of a library of films. Netflix headquarters are at Gatos, California but the company has subscribers across the globe (McSherry and Mironov, 2009). As of 2018: 2024 – Write My Essay For Me | Essay Writing Service For Your Papers Online Netflix global subscribers were at 130 million while the subscribers in the United States were 57.38 million. In this case, in the event of a cyber-attack or security breach, it will have a devastating impact on subscribers and thus there is a need to invest in advanced countermeasures and solutions to prevent the impacts of such attacks.

Security and threats Analysis
Netflix has consistently maintained security on its content and that of the subscribers despite threats that are experienced from time to time. The cyber-attacks are directed at access content illegally or accessing subscribers’ confidential data at the expense of the subscribers. First, the fake Netflix app is a cyber-attack that has raised concerns from the members of the public. The fake Netflix app was circulated across the web prompting the unsuspecting subscribers to provide their confidential details such as passwords, usernames and credit card details (Sapienza et al., 2017). The fake Netflix app was similar in color and features and was downloaded by many subscribers thus exposing them. Consequently, Netflix has experienced phishing attacks that phishers try to acquire personal information pretending to represent trusted companies and websites through online platforms. In this regard, phishers create websites that mimic the genuine Netflix website to acquire confidential information and thus stealing accounts and personal information. Furthermore, the cyber-attack on the streaming services has led to Netflix losing content unauthorized parties. This fact makes content to be leaked to the members of the public thus affecting Netflix operations (Llanso and Pearson, 2016: 2024 – Do my homework – Help write my assignment online). The illegal and unauthorized access to Netflix content is a significant security breach that can drive the organization out of business. Additionally, hacking is a cyber-security issue that has risked the existence and operations of Netflix. The hackers target the service expanding membership base by accessing bank credentials and passwords at the expense of the subscribers. The hacking experiences scare away subscribers thus Netflix ends up losing.

Framework mapping
The framework mapping, in this case, will entail the documentation of the security threat to enhance the development of a structure that will handle the cybersecurity issue. The framework mapping will provide the necessary information to enhance the decision making on the implementation of the security policies and other strategies or best practices. The mapping will be effected through the collection and organizing of data, facts, and evidence on the cyber risks and threats. The data that need to be collected include the region that experiences a high number of attacks, types of the attacks, the attackers and the targets of the attackers and the probable solutions for the different types of the attack. This information will make it possible to enroll an effective structure to handle the insecurity situation by exerting more vigilance in regions highly affected, adopting the best practices to counter different types of attacks, and hiring of the relevant cybersecurity personnel to handle the cybersecurity issues.
Conclusion: Recommendations and solution
Cyber related insecurity and threats have significantly risen affecting Netflix operations and thus there is a need to adopt cloud-based security solutions. The security solutions will effectively prevent the attackers from perpetuating their ills at the expense of Netflix and its subscribers across the globe. First, Netflix needs to Cipher cloud solutions. The Cipher cloud uses the models of Paas, Saas, and Iaas to secure and protect customer information across private and cloud applications without compromising functionality or performances (Almorsy, Grundy and Muller, 2016: 2024 – Do my homework – Help write my assignment online). In this regard, Netflix needs to surrender sensitive customer’s information for safekeeping under the ciphercloud solutions. Consequently, Netflix needs to adopt encryption solutions to effectively prevent hackers and general attackers from perpetrating cyber-attacks. Encryption entails the covering of data and information on transit into a code to ensure that unauthorized access is prevented. Netflix adopting encryption ensures that its content is transferred from the source to be subscribers without interferences. Moreover, Netflix needs to adopt firewall protection solutions to ensure that exchanges of content done over the internet are done safely. The firewalls prevent unauthorized internet users from accessing networks linked to the internet or the intranet (Singh and Chatterjee, 2017). This approach ensures that operations within Netflix are not exposed to the external world and only the authorized parties. More so, Netflix needs to adopt the workload protection platform to protect their content and customers. The technologies work together with cloud infrastructure and virtual machines to enhance monitoring and prevention features. This technology will ensure that operations at Netflix are monitors and threats are effectively eliminated. Lastly, Netflix needs to adopt the cloud Access Security Brokers to monitor operations and enforce security policies in the course of operations. This approach ensures that all the safety measures are adopted in the interest of enhancing the security of Netflix and subscribers.

References
Almorsy, M., Grundy, J., & Müller, I. (2016: 2024 – Do my homework – Help write my assignment online). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Llansó, T., & Pearson, D. (2016: 2024 – Do my homework – Help write my assignment online). Achieving Space Mission Resilience To Cyber Attack: Architectural Implications. In AIAA SPACE 2016: 2024 – Do my homework – Help write my assignment online (p. 5604).
McSherry, F., & Mironov, I. (2009, June). Differentially private recommender systems: Building privacy into the netflix prize contenders. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 627-636).
Sapienza, A., Bessi, A., Damodaran, S., Shakarian, P., Lerman, K., & Ferrara, E. (2017, November). Early warnings of cyber threats in online discussions. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 667-674). IEEE.
Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.

Order | Check Discount

Paper Writing Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Professional Writers

We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing

Discounted Prices

Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.

AI & Plagiarism-Free

Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.

How it works

When you decide to place an order with Nurscola, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.