Internet, points of presence, information .

Writing Proposal Templatefor ITC571 Student Name and ID Husam Malkawi Project area Security in Contents Distribution Networks, CDN. Project name Network Security Concerns for web users and policy issues Key words CDN, Internet, points of presence, information integrity, client anonymity, publishers 1. Introduction Background Information, Issues and Current Solutions The use of web has transformed the use of the internet which has been an avenue for storing and distributing information. A Content Distribution Network, CDN is a spatial distribution network that uses proxy servers and data centres to distribute content via the internet. The CDN works in a system that provides nodes and servers that contain information and the network accesses these nodes on remote point of presence, PoPs and distributes the information to the end user. In the process of sharing data, the client’s anonymity and information integrity is expected from the CDN. However, sometimes there are infiltrations into the networks leading to hacking and client’s information is exposed or the content is exposed. In such cases, the CDN is compromised and it poses a security threat for sensitive information. In the past, people’s emails and countries communication have been hacked leading to threats, blackmails, loses, and national concerns over the issues. Shortcomings/ limitations in the current /existing solutions The CDN has been developed to prevent information from being intercepted and though some threats have been reported, the research seeks to identify ways to enhance security and potential threat to information hacking. Also, the policy concerns present for web users who are victims of such threats since the damages they experience could harm their brands, businesses and personal lives. The policy levels are new as web security is a fairly new area and there is limited knowledge on how to identify hackers and charge them for the damages. Evidently, government issues on CDN security are advanced but the same caution does not trickle down effectively to web users. Importance of solving this problem The study needs: To assess the knowledge of CDN and its applicability in small businesses. Also to identify organization that have applied it and assess the potential threats experienced. Once this has been achieved an analysis can be carried out on potential threats and ways to solve them and identify new threats that may need to be addressed. The study will also assess if users are knowledgeable of the threat they face in a CDN platform. 2. The Main aims of this research To assess potential network security threats for CDN users and to assess the effectiveness of the policy issues in safeguarding the web users. The study aims to expose the knowledgeability of CDN threats, to assess if ignorance could be a tool that propagates the risks. 3. The questions which need to be addressed in this research What role does the government and web users play in CDN security and how does it impact in CDN security. How can CDN systems be improved to make them more secure? What policy changes can be made to improve in CDN security? 4. A Brief Description of YourProposal CDN security is a concern that web users should have to enable them mitigate from potential threats. In cases that users are knowledgeable, the issues they face can help us understand if the current policies are effective or there are new threats that have not yet been addressed. 5. Factors affecting the research and ethical considerations (if needed) Before the research commences, the university ought to give permission to the researcher to authorize the study. Security is a sensitive matter to discuss and the respondents might be limited in sharing their techniques to avoid exposing themselves to threats. I plan to use a non-disclosure argument to allow them to share their information freely. The researcher needs to practice information integrity and respondent anonymity to safeguard the respondents. 6. The Process or Methodology of Your Project The study will combine both primary and secondary data sources. The first initiative is gathering secondary data through literature review. 1. Literature review (LR): The analysis will identify the current situation on CDN network security by identifying case studies on potential threats and solutions to the said threats. The study will also establish current limitation is the existing methods of CDN security and identify gaps by other researchers that need to be analysed. Literature review forms the backbone of the study as it reducesredundancy, increases the researchers knowledge on the topis and it leads to identification of problems based on other research work. The LR gives knowledge on the types of threats faced, effective methods of collecting data relevant to the study, identification of approaches on how to deal with CDN threats and evaluation of existing policies on security that influence security. 2. Data Collection: The data will be collected using a questionnaires, interviews and observations. The tools will be tested before they are release to collect data to ensure that the data collected is relevant to the research. The questionnaires will be both open ended and closed ended targeting various small businesses. The questionnaires will be sent by email to identified companies and a follow up will be conducted. The sample population is through stratified random sampling. The company must be a small or medium business with minimum costs for running a CDN security network. Interviews will be scheduled for key informants’ n the IT field. The interview will be through one-on-one platforms physically or through video conferencing for those located away from the study area. Telephone calls will also be used in place of video calls and the data used will facilitate analysis. Observations are based on company visit, website analysis and systems review. 3. Data analysis: The data collected will be analysed using the SPSS software to identify the correlation of the variables. The data will also provide the current threats and how each threat s handled and it will identify gaps that needs to be evaluated for the study.The information will be represented in tables, graphs and charts to show the outcome of the data collected. The identified gaps are then analysed using information acquired through the literature review to offer recommendation. 4 Policy Review: Since the study also seeks to study the role of policies in CDN security, the data collected will analyse various policies used by companies to enhance security. The government policies on security as well as international policies will be reviewed to establish the role each plays in enhancing security. Gaps identifies in policy concerns will lead to proposed changes in the policies to make them inclusive. 5. Recommendations: Based on the outcome of the study, the research should offers proposal on security improvement for the CDN systems and it should offer policy improvementsbased n the existing policies. The study also should recommend other areas of study identified during the research that needs more analysis. 6. Limitation: The study focuses on small and medium businesses that limits the scope to big businesses that may have experience more threats and identified advanced ways to deal with imposing threats. Time factor is also a challenge that limits the researcher’s scope and it may limit the testing of the proposed changes and assessment of the proposed system upgrades. 7. Expected Outcomes The research should lead to several deliverables that include: A system upgrade that identifies potential threat and proposals of how to deal with the threats are given. The upgrades will help small and middle sized companies improve their CDN security at low costs and within a guided framework. The study also seeks to evaluate policy concerns based on existing policies and a recommendation will be offered on areas of improvement. The policy recommendation will improve government approach and role in dealing with CDN security threat and it will increase acco
untability for both users and businesses. The students will also benefit from the study as the research builds on the body ofknowledge and it gives area for further research on the same field. The gaps also gives the university research team an area to pursue on through grants and funding. The model proposed based on the research findings will influence CDN security developers in the market as it will provide on gaps that need to be filled and this will be a market opportunity for providers who will address the concerns. Reference list Ganti, P. (2017). Real World Content Delivery Networks. [S.L.]: O’reilly Media, Inc, USA. WANG, X. (2017). Micro Cloud for Security Content Delivery. DEStech Transactions on Computer Science and Engineering, (mcsse). Mangili, M., Martignon, F. and Capone, A. (2016). Performance analysis of Content-Centric and Content-Delivery networks with evolving object popularity. Computer Networks, 94, pp.80-98. Gupta, M. and Garg, A. (2015). A Comparative Analysis of Content Delivery Network and Other Techniques for Web Content Delivery. International Journal of Service Science, Management, Engineering, and Technology, 6(4), pp.43-58.

Leave a Reply

Your email address will not be published. Required fields are marked *