Your paper requires that you use at least 10 references - Click the Library Resources on the navigation bar. Develop a full annotated outline of the paper including sections in which each resource w

Running head: challenges and resources to be used.

Information Governance (ITS-833-06)

Weekly Research Paper: Milestone 1

University of Cumberlands

Tharun Thatikonda


Introduction

Cloudflare is one of the biggest companies that is located in United States and its main objectives are offering its customers with high security internet. The company was founded by American named as The company does not only offer security internet to its customers but also but it also provides high security to the users who have registered all over the internet which promotes enhanced interactive experience to its customers. This company is one of the top companies in data security in terms of protecting their clients. The company equips its users with policies that are easy thus attracting more customers to the organization. Overall, the company has a good reputation to its customers due to the enhanced security on data protection. (Graford, 2013)

Primary challenges of the organization

In spite the company having a high number of merits, it has a number of challenges. These challenges include;

  1. Distributed denial of service (DDoS)

In the organization, these challenges come as a result of multiple malicious which disrupts the normal traffic that are targeted to a specific server, the service or the network where they overwhelms the target to the infrastructures that are surrounding.

These attacks are brought about by using a number of attacked computer systems as external sources of traffic attacks. The systems that can be affected by this type of attack include the IoT devices, computers, devices that are networked and among others

  1. Web application firewall

Web application firewall can be described as an integrated, intelligent and scalable method that is utilized when protecting critical web applications from malicious attacks in a business where there are no changes that one will do in his/her business.

In cloud flare infrastructure, the firewall application software gives users a chance of where they will be capable of using powerful rules which gives them a possibility of making easy clicks. In this web application, cloud flare blocks a number of users when browsing over the internet. Here, cloud flare has to employ a lot of people in order to perform this task. These workers are used activates visibility to actionable metrics to the person using the internet. (Rossmo, 2017)

  1. Malware infection

In different organizations that are purposed on string information, malware infection has become a major threat on the storage devices. Malwares in systems comes on different purposes, some of them are used in creating a backdoor. After creating a backdoor, the cracker does his/her malicious activities which are responsible of bringing a disaster to the whole organization.

Resources that are to be used on the paper

In order to write a successful milestone, a number resources have to be utilized. These resources will help me carry out my research well and will give me more tips about the organization that am going to write about. The resources that am to use include:

  • Various books concerning the industry

  • The internet

  • Journals and magazines

References

Rossmo, D. K. (2017). Security threats on computing industries. The 2015 journal.

Graford, R. (2013). Introduction to cloud computing organizations.