You are on page 1of 11

Migrating business-critical applications and

their associated data sources to an External


Cloud hosting solution

Executive summary:

The IT security company have going to migrate the critical applications for their
business and the other data sources to an external cloud for a hosting solution. A company
should manage the risks in the IT field and also it should know how to manage the risks.
Trend Micro is one of the internet security company which is an Australian company
which is used for developing an antivirus software and online security program. The risks
are the dangerous causes happens to the computer system. These risks should be handled
by the company by developing these types of software. Trend Micro is one of the fastest
responding company for the new threats arisen in the computer system. The system
should responsible for the migration purpose. The system should take tare when data
sources are moved from internal cloud to external cloud. The software developed by this
company is compatible with all the types of computer system. This is the anti-virus
malware which is used for protecting the threats and avoids the risks completely. The
company gives up to 25 GB cloud storage, therefore, it is very useful for migrating the
data sources and the business applications to the other external sources without any
restrictions but the risks should be maintained and avoided. The software which they
developed contains a privacy scanner and detector. The scanner is very helpful for the
theft prevention and parental controls etc.

The risks should be understood clearly by the stakeholders and they should take
the necessary decisions and then support the threat prevention. The threats are the riskful
vulnerabilities which are attacked in the computer system and makes the data to damage
and lost. IT security is an important task which is responsible for the IT employee or a
network given in the IT infrastructure. The staff should know about the components of
the infrastructure and its benefits. The system which faces the IT risks will suffer from
complexities, third part connections, threats, loss of control and so on. The system should
ensure the different set of applications which are useful for the IT system for using the
best practices like data, applications, communications and the storage. These
requirements are satisfied by acquiring the IT risk assessments. The risk assessments
involve the stakeholders for performing the aspects like hardware, software, training,
business and awareness among the employees. The organization should assess the
security posture and identify and modify the needs to enable the security, management
operations and other actions which are used for viewing the hacking of the attackers. The
management of the organization is responsible for the resource allocations and the
security challenges.

The business stakeholders are the ones who make the company in a good position.
The Tread micro is one of the best company for the process of migration from one data
source to another source. The software created by them can easily allow us to transfer
data without any risks in the system. The main features of this company are antivirus,
anti-spam and anti-spyware in which it is used for detecting the virus and safeguarding
the system with the help of a spyware. The spyware is one of the software used for
viewing the hackers threats and the details of the hackers. The company creates much
software and each software is very well satisfied with the project which we are handling
for the migration of the data sources from one place to another external device. The
software is used for protecting against the rootkits, data leakage during the migration and
the intrusion blocking.

The system also includes the additional features like working in the wireless
medium, online backup system, cloud storage and security system in the mobile phones.
The trend micro is one of the multinational company which is used for developing the
security software for the cloud computing, servers, consumers and also any scale business
developers. The cloud and the virtualization security product which is used for providing
the cloud security for the consumers of the cloud storage.
(https://en.wikipedia.org/wiki/Trend_Micro_Internet_Security/ )
FINANCIAL SERVICE SECTOR:

The financial services sector is a most important factor for a company profile. The
Trend Micro is supported and trusted by 10 banks in the Australian country. The banks
provide their security for the business and the company. The business may be in any
types but the Trend Micro is used for providing a good solution for the issues occurred
due to the risk management and the banks are used for protecting the finance operations
against the attackers. The financial services are the major factor in which the attackers are
used for hacking the operations and stealing the products and the money for them. The
financial sector for the Australian government or the country has a sophisticated service
against the financial marketing and the investment management. The financial sectors are
used for the exporting purposes but the Trend micro is mainly used for the bank
transactions.

The employees of the company say that the spamming is one of the major issues
before a decade so that the Trend Micro has revealed a software to overcome these types
of problems. The stakeholders are the major ones in the financial service sector which
makes the company attain the great level. The Trend micro is a great company for the
security purposes which helps for tracking the records of the company database and
ensuring the security of the data. This is one of the fastest growing company which has
25% in its market share with a large security player in the region of Asia Pacific. The
trend Micro says that moving a cloud from one place to another is a benefit for the
customers because it has many flexible and agile reasons for the customers.
(http://bfsi.eletsonline.com/trend-micro-securing-the-financial-services/ )

The migration of data from one source to another external storage is a huge cost
advantage process which is a security process in which the data is hosted in the cloud.
Many companies have the problem that the cloud contains the data which is moved to
another external data and the other external data is protected or not from the threats. The
Trend micro is one of the best sources for protecting the data from the cloud service
provider. The cloud computing is the major security process for keeping the data secure
and safe from the hackers. The Trend Micro is used for providing a great security and
makes to move the data faster from one cloud to the other external storage. The financial
service sectors are mainly used to exchange the currency, machine service for the credit
cards and debit cards, networks, accounts and the tax filing services. The financial service
sectors use the export service, investment, and the financial services.

The global providers for the financial services use the master card and the visa
card for exchanging the services. The financial services maintain a secured service in the
Australian financial sectors. Hence the prevention policy makes the migration of the data
from one cloud to other external clouds in a secure way. The Australian financial
companies have a great service for borrowing the funds from the financial centers. The
money exchanging policies are controlled by the Reserve bank of Australia. The financial
services can give insurance, loans to the business company for running their business.
The business in the companies needs to buy many cloud storage for storing the data.
These data are stored in the cloud storage and these clouds are bought by the companies
from the service providers. The financial services provide more offers for buying the
cloud from the providers. Hence, the financial service sectors are used for the companies
which are used for migrating the data hosting solution from one source to external clouds.

SECURITY POSTURE REVIEW:

The main aim of the IT project is that migrating the data sources from one source
to other external sources which hosting the solutions of the data. The transformation of
the data needs some security while the data moves from one place to another place. The
data and the information of the companies may be stored in the computer system. The
secured cloud has to be installed in the system so that the data which is stored in the
system will be avoided by the risks and makes a proper migration. The Trend Micro
system develops a software which is used for keeping the security more strong and
minimizes the threats and the risk which is very valuable for the IT resources and the
other critical functions. The Trend Micro provides 100 percent security to the customers
and the users of the cloud.

The details and the information in the companies are very confidential data for the
other people and hence they should be prevented from the threats and the attacks. The
security experts for the cloud storage are very helpful for exchanging the information
from one source to other external sources safely and carefully. The support for the clouds
should analyze carefully without the risks and the issues. The staff in the company must
be a good person and they should not leak the data without the knowledge of the person
in the company. Many times the person in the company may leak the data without their
knowledge in some social media. Therefore the hackers may watch and gather the data
and wait until we get a chance to steal. So these types of threats should be avoided and
must provide a great security for the company.

The set of policies and the procedures must be followed for the security purpose
and the people must be careful in their work. The proper security should be given to the
each and every systems on the computer. The continuous checking must be applied to the
every system so that no one can hack the system. The trend micro company is one of the
best company for blocking the malware's from the other sources and stop the spam
downloads. This company provides maximum security for the software and the
confidential data and it scores the highest success rate for the people in the organization.
This Trend Micro company gives you a quick time for adding the extra features for
providing a best and better solution for the protection. The Trend Micro system provides
mobile security and gives protection for the data in the mobile phones. Nowadays the
networks are getting faster for migrating the cloud storage and the data from one source
to another source. The security for the data while migrating should carry and follow the
following procedures.

The network traffic should be recorded because the security breach is may be a
complicated process which can be easily identified when the traffic of the networks is
recorded. The recorded information must be used for detection of the threats. The security
system should alert the organization when any threats occur in the computer system. The
vulnerabilities of the system must be visible to the company, therefore, they can adjust
the effects in the systems. The system must not be oversubscribed again and again
because it has a tendency to handle limited networks. The throughput of the system
should be noted so that we can easily identify the necessary levels of the risk. The
demands for the security must be achieved faster by the organization which helps to
migrate more safely for the system. A common data source is implemented for migrating
the data and they should provide a secure network for achieving required security. The
people in the company must know about the required security features for the computer
system. The staff in the company use the hardware's, software's, internet facilities and etc.
The internet facility needs the email messaging and downloading the software's needed
for the company.

The technology developed in the IT organizations helps us to know about the


potential time which is lost while using the internet and also the business productivity.
Some of the safety measures should be handled in the computer by scanning the system
whether it is booted or not and also the real-time scan must be enabled for the detection
of the errors and the threats. The scanning software of the virus and the threats must be
updated continuously to the last version of the software. The system must be checked and
updated with some validation of the software. The software's must not be installed from
the unknown sources. All the software's must have a license dated with prevention and
precautions of the threats. Therefore, these are the security postures with some set of
rules and procedures for the stakeholders of the company.
(http://www.zdnet.com/article/eight-ways-to-improve-your-corporate-network-security-
posture/ )

THREATS, VULNERABILITIES AND CONSEQUENCES ASSESSMENT:

The threats, vulnerabilities and its consequences are more important for the
company. The threats and the vulnerabilities must be noted carefully and its consequences
are very helpful for maintaining and preventing the unwanted issues in the system. The
threats must be detected from the computer system and it should be prevented from the
hackers of the computer confidential data. The security of the computer includes an
authorized access and the unauthorized person should not access the system. The user
must be careful in accessing the system. The threats are of the different form and it can
come in the system with and without the intention of the people's knowledge. The loss of
data for the computer cannot be estimated by the business organization. The impact of
this issues may be the loss of money, loss of information and the confidential data. The
business organization must maintain a proper control for the security breach and the data
breach. The data is said to be a sensitive information and it is very useful for increasing
the item. The data are very large in amount and it is very hard to prevent them from
attacks and the risks. Therefore let us see the threats, vulnerabilities and its consequences
to the organization when the migration process is done. The above-mentioned issues must
be known by the employees of the organization and the company. Let us discuss briefly
the threats which are the harm happens to the computer system, vulnerabilities which are
said to be the weakness that creates the threat in the computer system and the
consequences which are said to the damage happens after the vulnerabilities and the
threats of the computer system.

A threat is said to be a thing which happens with intention of the person to harm
the computer system. The threat is used for limiting one's freedom which is used for
kidnapping one's information. The security of the computer threat is used to cause a
serious damage to harm the computer system. A threat is said to be a thing which may
cause and may not cause the damage to the harm the computer system or not. The threats
are used for attacking the computer system and the networks which the hackers or the
attackers spread the threat to steal the confidential data in the computer system. The
security threat is used for exploiting a vulnerability in the computer system to breach the
security and it possibly harms the computer system. The violence of the threat is said to
be a criminal offense which intentionally steals the knowledge of the person and their
information. The threats are mainly used to harm the data or destroy the property through
a malicious activities happens in the network of the organization. The threats are said to
be the harmful events which are used for an occurrence of the attacks. The attack is said
to be the action taken by the computer to harm the data in the system. The vulnerabilities
are said to be the weakness happens in the target to attack the system.

The threats are of different types which are used for hacking the system and steal
the data in the computer system. The malware is one of the threats which is said to be the
malicious software which creates various forms of intrusive actions and the program code
that makes the computer system to attack different forms of threats like worms, computer
virus, malicious rootkits, Trojan virus etc. The computer virus is said to be the piece of a
virus or a software which is spread to the computer system from one infected computer
system to the other system. This virus may cause the file to corrupt, delete and destroy
the data in the computer system and the hard drive of the system. This virus may spread
on the internet through the email messages.

The rogue is one of the security software which is used to update the computer
system or alert the system when the virus or the worms attack the computer system. This
software is used to detect the unwanted malicious software in the system. The cloud
storage has to be updated and the software must have the capacity to alert the customer in
the service provided by the organization. The Trojan virus is one of the threats which
occurs when the user downloads any software which is the malicious activities happens
in the system. The Trojan application can be described by the malicious spyware which
creates to steal the recorded passwords from the confidential sites. The computer worm is
also a threat which copies itself to spread the virus to the computer. Spam messages are a
threat which occurs by emails and the instant messages in the computer system and
mobile devices. Phishing is one of the scam processes that makes the computer system to
steal the private information of the organization.
(https://blogs.cisco.com/smallbusiness/the-10-most-common-security-threats-explained/ )

The vulnerability is said to be the weakness occurs in the computer system to


make way for the hackers or the attackers to hack and harm the computer system. The
vulnerabilities in the system can occur in flaw or issues which the attackers access the
flaw and the capacity of attackers to exploit the flaws in the system. The security
vulnerabilities are said to be the software bugs, the software which is used for infecting
the computer system, weak password and the script code injections in the computer
system. The security vulnerabilities need some requirements to avoid the data to be
attacked by the hackers of the system. The vulnerabilities are used to offer the intruders
to hack the system without their intention in the confidential data. The organization must
be careful in using the migration process because the critical business applications must
be migrated with the confidential process so that no data is stolen by the unauthorized
persons. The organization must watch the access of the authorized person in the computer
system. The hackers are allowed to gather the information in the computer system.
(https://securelist.com/threats/software-vulnerabilities/ )

The vulnerabilities used to allow the hackers to hide the activities in the computer
system. Some of the example for these types of virus are ransomware virus because it is
used to get downloaded from the spam emails in the system. After some time it starts to
spread in the computer system and finally starts to hack the system from the owner of the
system. Then the hackers encrypt the data from the computer and ask the users to pay the
ransom then they will decrypt the data if the users do not pay then they delete all the data
from the computer system. The encrypted messages are displayed in the computer
system. Therefore, the main reason of the ransomware virus is due to the vulnerabilities
in the computer system. These types of virus can also attack the cloud storage, therefore,
the organization must update the software day to day and they should watch the activities
of the system using some spyware detectors. The Tech micro company is a specialized
company in developing the antivirus software's for detecting the online programs and so
on. Therefore, these are the threats, vulnerabilities and also the consequences happens in
the field of IT with the stakeholders of the organization.

DATA SECURITY:

The data security is said to be the privacy measure which is used for preventing
the computer system and the databases from the unauthorized access in the system.
Therefore, the project is very helpful with the data security. The data is migrated from
one cloud to the other external cloud with the help of an authorized access. The
unauthorized access is prevented from the computer database due to the protective
measure called data security. The data security is also very helpful in protecting the
corruption of the data. This data security is one of the important aspects in the field of the
IT security and the management. The main aim of the data security and the privacy
measure is that to know which type of data and the information the organization wants to
protect from the hackers and the unauthorized persons. After the identification then the
priority information of the organization is noticed and the risks of the data loss is
determined by this type of identification. The data security is very helpful for measuring
the accurate data loss prevention in the analysis from the organization. It is very scalable
for the data security solutions. There are many employees in the organization to prevent
the data loss and to protect the data loss from the database of the system. There are
multiple policies for the managing the different types of data and also to measure the data
loss in the events. The measures to handle the application is that developing a data
security with clear requirements for evaluating the products in the organization. The
organization must realize the limitations in the traditional data loss prevention and the
data-centric is one of the data loss methods. The data security must test the applications
and for protecting the data with the application. Some of the data protection policies and
the procedures are created for prevention of the data.
(https://www.veracode.com/security/data-security/ )

The gateway for the data is an application in which the attacker know that the
applications are very weak in the link and it is very sensitive to access the data. The risks
can be reduced when the data are tested by the testing applications. The data security is
very helpful for checking the quality of the data and maintains the data with the same
quality. The organizations are most probably transfers the cloud storage, big data, data
governance and customer centricity. The main foundation for transferring or exchanging
the cloud storage is the critical business application in which the organization makes the
data to transfer in very faster range with more effective services are applied to the storage
process. First, the data should be identified by the customers and they should identify the
limitations, risks and the other measures in the database. The customers must know who
is accessing the data and how to access and protect the data from the malware's arisen in
the organization. Risks are the major problem arises in the organization to harm and
destroy the data in the computer system. The sensitive data is used to analyze the risk
which is used for discovering, then identifying and clarifying the data to ensure the data
is safe or not in the organization. (https://www.informatica.com/in/products/data-
security.html#fbid=PzjYq000y5q/ )

The data security is also a process which is used for protecting the data from
various sources and the security. The main purpose of the data security is authorization,
authentication and the encryption of the data. The authorized person only allowed to
access the cloud or any other database in the system. The authorized person is provided
with some of the reference ID in which they are allowed to login the database. The
authentication process is said to be signing up the user's detail with proper username and
the password for the system. Only the encrypted data is allowed in the cloud storage
because these types of data are protected well with some encryption algorithms and the
key to protecting them. A firewall must be installed in everyone's system so that it is very
useful for blocking the unwanted sites in the system. This security is very helpful for the
persons in the organization while migrating the data from one source to the other external
sources in the organization. The next method is the intrusion detection in which is very
useful for finding the intrusion in the data and the vulnerabilities are detected with the
help of the analysis of the data in the system. Therefore, these are the IT risk assessment
for the projects developed by the Trend Micro companies with the help of the
stakeholders and the employees of the system. Therefore, the IT risks are evaluated from
the projects which are chosen by the company.
(https://www.upwork.com/hiring/development/data-security-top-ten-skills-you-need-on-
your-team/ )

REFERENCES:

1. https://www.upwork.com/hiring/development/data-security-top-ten-skills-you-need-
on-your-team/

2. https://www.informatica.com/in/products/data-security.html#fbid=PzjYq000y5q/

3. https://www.veracode.com/security/data-security/

4. https://securelist.com/threats/software-vulnerabilities/

5. https://blogs.cisco.com/smallbusiness/the-10-most-common-security-threats-explained/

6. http://www.zdnet.com/article/eight-ways-to-improve-your-corporate-network-security-
posture/

7. http://bfsi.eletsonline.com/trend-micro-securing-the-financial-services/

8. https://en.wikipedia.org/wiki/Trend_Micro_Internet_Security/

You might also like