2
Technology
Tyler Frazier
Thomas Edison State University
Associate Capstone APS 295
Mentor Jordan Goldberg
Date 08/28/2021
Technology
The advancing of technology has periodically transitioned various aspects of life in fascinating ways. The diversity of distinct fields of technology that perform roles in a synchronized manner have prompted different computer engineers and experts to create innovative strategies for developing new computer software and programs purposed to solve various everyday challenges. One of the most extensive fields of technology that has transitioned the metamorphosing world into a global village is networking. The existence of the internet has made many corporates ditch the conventional ways of driving deliverables like leveraging offline business procedures. In the 21st century, many companies are transitioning their activities and procedures to the virtual space due to the prevalence of cloud computing services. Companies like Amazon and Google offer cloud services where Amazon web services are unprecedentedly preferred.
Cloud computing has given many companies the confidence to develop enterprise resource planning systems with extensive features that can seamlessly leverage the big data and rich infrastructure available in cloud computing platforms. The implications of this are that many global companies will periodically and progressively build more ERP systems hosted on Cloud computing platforms. However, the advancement of cybercriminals has posed severe security threats to most ERP systems hosted virtually (Maditinos, 2012). Many cloud computing platforms have provided security patches that have massively failed to mitigate the escalating cybercrime instances. Amazon’s AWS platform, which has been vouched for by many scholars (Kotas, 2018), provides high-level security elements like lambda functions, network security, and identity control which have unprecedentedly been compromised by hackers. Thus, this paper will develop an innovative technology purposed to counter cybersecurity threats targeting ERP systems hosted in different cloud computing environments.
The innovative idea is unique and incorporates artificial intelligence to combat malicious acts performed by cybercriminals. Security issues to be mitigated by the proposed innovation include database manipulation, social engineering, and performing high-level computing procedures to crack passwords protected in advanced algorithms like MD5 and password salting and hashing techniques. The proposed system will be developed by leveraging front-end and backend languages whose functionality structure is supported by trusted companies like Google and Microsoft.
The systematic development of ERP systems has prompted many cybercriminals to target cloud computing environments to access sensitive information. The process of generating the idea is influenced by computer performed activities like automation, which simultaneously and massively perform significant roles. Most cloud computing platforms do not have standalone software purposed to combat the escalating cybercrime instances. The ultimate idea of creating extensive software will borrow specific development aspects from software development environments whose primary role is to track the sequence, scalability, and actual code writing techniques. These implications are meant to explain that the proposed artificial intelligence system will monitor procedures that lead to altering the source code of implemented software.
The idea of monitoring instances of code alteration and manipulation will prevent hackers from writing codes whose motive is to change the system’s primary purpose. Most implemented cybersecurity mitigation systems fail to focus on roles of codes used by hackers unprecedentedly, and in this context, the idea of monitoring actual codes used in activities suspected to be malicious will be indisputably blocked. Companies that host their systems in the cloud will be required to create a user account on the proposed system. The idea of creating an account is validated by user privacy and monitored system control. This means that any ERP software will be uploaded to the proposed system for analysis. Thus, the source code of the analyzed system will be altered on the cloud by users who are authenticated by the proposed system so that any unauthorized system alteration can be considered malicious.
The ideation process described above will make the proposed system robust and reliable. Equivalently, corporates like Amazon that offer cloud computing platforms will be contacted to integrate the system with their security layers. The purpose of this alternative solution is to improve the system’s efficiency while enabling users of different cloud computing platforms to leverage the opportunity. Specific challenges like ethical issues relating to customer information and adhering to particular terms and conditions offered by cloud service platforms may seem challenging to follow and comprehend from the basis of the most severe stumbling blocks.
A significant number of applications are developed with tools that hackers compromise. Some existing programming languages have weak security patches that make applications vulnerable to hackers. There are more than one hundred programming languages that are leveraged by different corporates. The implications of this are meant to expound on the overview of the proposed system, which will leverage front-end and high-level backend languages. One of the most advanced languages is Microsoft’s C# which has advanced security patches (Troelsen, 2017). Equivalently, the language is tailored to create advanced applications which are responsive, scalable, and resizable. The proposed system will use the rich architecture and functions of the language to write challenging source code to understand and compromise. Logic languages like the prolog will be leveraged for logic programming that incorporates artificial intelligence.
Regarding front-end development, React. Js is the JavaScript framework that will be leveraged since it will facilitate the development of every application window while creating reusable user interface components. PostgreSQL is the database to leverage because it is the advanced version of SQL and, most substantially, contains three vital security layers: network-level security, transport-level security, and database-level security (Makris, 2021). The most targeted component of a system is the database, and, in this context, various security algorithms that work best can be seamlessly integrated with PostgreSQL. As earlier stated, security patches like md5 algorithms can be decrypted by hackers because they leverage one-way encryption techniques. PostgreSQL will be integrated with advanced encryption standards. In explanation, whenever the AES technique is leveraged in the replicated network, with servers configured with similar salt and passphrase, the password data gets replicated in its encrypted format, thus offering excellent protection.
Many secure frameworks like Unix crypt and Sha 1 and 2 algorithms will be leveraged to protect the database. Regarding the user interface, a user manual will be provided as a guide to user s. Equivalently, the system will be user-friendly, whereby expert skills and experience will not be substantial to use the system. The technologies and tools described above will make the ultimate idea of detecting, terminating, and discouraging malicious activities relevant.
References
Maditinos, D., Chatzoudes, D., & Tsairidis, C. (2012). Factors affecting ERP system implementation effectiveness. Journal of Enterprise information management.https://www.emerald.com/insight/content/doi/10.1108/17410391211192161/full/html
Kotas, C., Naughton, T., & Imam, N. (2018, January). A comparison of Amazon Web Services and Microsoft Azure cloud platforms for high-performance computing. In 2018 IEEE International Conference on Consumer Electronics (ICCE) (pp. 1-4). IEEE.https://ieeexplore.ieee.org/abstract/document/8326349/
Troelsen, A., & Japikse, P. (2017). Pro C# 7: With. net and. net Core. Apress.
https://books.google.com/books?hl=en&lr=&id=Jus_DwAAQBAJ&oi=fnd&pg=PR5&dq=+C&ots=9-5tbdX1Ls&sig=oeJEGC_CBuFJ-pLIsLXpeKA9NCM
Makris, A., Tserpes, K., Spiliopoulos, G., Zissis, D., & Anagnostopoulos, D. (2021). MongoDB Vs. PostgreSQL: A comparative study on performance aspects. GeoInformatica, 25, 243-268https://link.springer.com/content/pdf/10.1007/s10707-020-00407-w.pdf
The post 2 Technology Tyler Frazier Thomas Edison State University Associate Capstone APS 295 appeared first on PapersSpot.