Recent orders

Discussion Board 7

Name

Professor’s name

Course

Date

Discussion Board 7

Ethos refer to the manner in which speakers establish credibility and trustworthiness to their readers. The first-way King does this is by taking into perspective and considering his background and profession. King is a Baptist minister, and he reads Biblical verses to his audience. He says phrases such as “it came as a joyous daybreak at the end of the loving night of their captivity.” The use of appropriate vocabulary can also establish ethos. It can also be established by the use of professional formats and correct grammar. Dr. Martin Luther King does precisely that; his choice of words and grammar are meticulous. He quickly establishes ethos as he can pass across his message with ease and conviction and, in the process moving and inspiring the masses that at times comprised hundreds and thousands of people. King speaks in a professional tone that appeals not only the African American people but also to Native Americans. Because he was a person of color, King was best placed to relate to the discrimination and segregation issues that people of color faced. The problems were mostly predominant in the southern states where slavery was widespread. Because of this, crowds and everybody watching King would cheer him. In the speech, King says, “We can never be satisfied as long as our bodies, heavy with fatigue of travel, cannot gain logging in motels of the highways and the hotels of the cities…. As long as the Negro’s basic mobility is from a smaller ghetto to a larger one. Notably, King employs inclusive pronouns such as “our” and “we” in his speech. This reassures his followers that they should not worry because they were in it together.

Use of Music in Modern Advertising

The Use Of Music In Modern Advertising

Contents

TOC o “1-3” h z u HYPERLINK l “_Toc375909954” Integration of Cultures PAGEREF _Toc375909954 h 2

HYPERLINK l “_Toc375909955” Public Relations Tool PAGEREF _Toc375909955 h 3

HYPERLINK l “_Toc375909956” Benefits of Musical Advertisement PAGEREF _Toc375909956 h 4

HYPERLINK l “_Toc375909957” Establishing Continuity in In-between Advertisements PAGEREF _Toc375909957 h 6

HYPERLINK l “_Toc375909958” Downside to Music Marketing PAGEREF _Toc375909958 h 7

Advertising and music have mutually developed and evolved over the past several decades. However, the integration of popular music into advertising itself has proven a lasting and profitable bond. Advertising and music industries grew conjoined during the early 1800s and they realized potential after the advent of commercial radio broadcasting in the late 1920s. The combination of music and advertising initially saw fruition thanks to the mass media, but the use of popular music in advertising began in 1900. Since then, advertising music has grown and evolved from being used primary as a mnemonic device to music to stimuli to captivate and lure the interest of a listener by altering feelings, setting, and mood (Milliman, 1982). As an advertising tool, music changes people’s minds and therefore helps change their buying patterns.

Advertising focuses on a key demographic, attempting to allure to their senses and entice the individuals into purchasing the product. Advertising differs from persuasive conversation because it relies on mass media and widespread social networks to gain market share. Advertisers seek to change the attitude and perception of a buyer to motivate them to purchase. Print media originally introduced advertising. Advertising in early newspapers was through short broadsheets filled with news text, creating revenue through reader subscription and word of mouth. However, as time progressed, newspapers, magazines, online websites and social media networks have gained momentum as modern advertising platforms. The advent of information and technology has created multiple channels of potential marketing growth, many of which lend itself directly towards the integration of music.

With the creation and evolution of Internet technology, music has proven a vital aspect in hooking a viewer or listener into the product, gaining their attention while the actual product displays its potential perks and advantages over the competition. Its availability and accessibility is now widespread since music is generated from a combination of traditional and modern technology. The Internet has connected diverse music groups to advertisers targeting specific demographic locations, as apposed to smaller, regional offerings and localized music styles. Marketing remains all about directing the message towards a key demographic who proves more likely to purchase a product. Music helps align the product with the key demographic, with rap and hip hop aimed towards one demographic, while classical music and jazz might reflect a different. The utilization of different music styles allows a company to directly tug at the emotional and mental connection an individual already has with the genre and help exploit it. (Milliman, 1982).

The fact that music has played a leading marketing role for commercial firms is not in doubt. One can validly argue that without incorporation of music in advertising, marketing firms would struggle to reach the same sales volume it currently enjoys, as products must produce a direct connection to the passions of a demographic, and the best way to do this is through the association of musical elements an individual already has. This does mean a company must utilize the best music possible for the product and the demographic though, as the wrong music could provide a negative impact towards the view of the product.

Integration of CulturesDifferent cultures are going to alter the way individuals purchase products and view goods for sale. These values and beliefs also influence the kind of products these people consume and hence determine consumption patterns of particular good. As a medium of communication, music helps connect to these individuals directly on their own personal belief and cultural levels, which drastically helps increase sales thanks to marketing companies changing their ability to advertise to different demographics. Due to enhanced understanding, people begin to appreciate each other as well as their goods. This way, music plays a leading role of market penetration by introducing new goods to new markets (Milliman, 1982). Because there are so many different sub-categories in personal demographics, being able to reach each demographic through the integration of music into the marketing in order to bring in more sales form the sub groups. In other circumstances, businesses innovate and create new products altogether to satisfy their customers better. One of the best ways of providing this sort of service is through the application of music into the advertisement (Park & Young, 1986).

Public Relations ToolAs the old adage goes, image is everything and therefore, the perception people have concerning a particular business determines whether they are going to buy from it or not. It is therefore a matter of importance for any business to mind the company’s overall appearance and how the consumer sees it. The company should always strive to maintain it if not improve upon it. One good way of polishing a company’s image is through music. They can hire reputable artists to compose songs praising them as well as highlighting their strengths to the public. If for some reason an organization’s image has been tainted, music often helps clean up the situation and reduces the impact of negative press (Park & Young, 1986). Regardless of how exceptional a product is, without appropriate marketing, it doesn’t really matter. If nobody knows the product is good, nobody is going to buy one. The integration of music into the advertising campaign is essential in bringing up interest to the product and to send possible buyers to the product to purchase it (Park & Young, 1986).

Companies such as multinational institutions operate in different nations with varied languages. Language is an important business tool. It is possible that customers cannot understand a certain language but they can decipher information from music from the same language. In this case firms use music beats to communicate with people. Music is ideal in breaking language barriers, which cultural differences might present. Besides, breaking language barriers, music promotes crossovers between cultures, allowing different individuals from all over the world to enjoy the same product, regardless of what it is or what services it provides. However hard it is to compare and contrast Chinese music to jazz, in a dance club the solution becomes amplified by the rhythmic movement of the listeners (Park & Young, 1986).

The use of music into the marketing process is very important in bringing in new customers, all while maintaining current customers. Every customer requires basic understanding of what entails goods or service before being motivated to purchase and own it. Many firms use music to pass product information to buyers. In circumstances where the market already knows about the product, music plays a precursory role to entice customers to buy a product. Therefore, use of music people identify with is ideal in advertising industry when marketing a product. Music creates a lasting impression on people’s minds and that alters how people react to an advertisement (Kellaris & Cox, 1987).

Benefits of Musical AdvertisementNo matter the company, the bottom line financially is very important to the overall wellbeing of the business and if it is able to expand and grow or not. Therefore, a prudent business keeps their cost as low as possible to maximize on profit. Advertisement costs are a component of business cost and that will determine how much a business invests in integrating music into advertising. Unknown music artists have low public appeal compared to music by celebrated artists who control a commanding public profile. A combination of a celebrated music and a product creates a perceived celebrity mood in the mind of the customer who identify with music and the artist. However, the cost of procuring a celebrated artist is higher compared to a local music producer. Music is more effective in appealing to the wide market compared to other advertisement strategies such as billboards. It is more effective in passing information, faster to testing people’s reaction and take appropriate action to improve on the advertising strategy (Park & Young, 1986).

With the cutthroat competition in the business world today, customer loyalty is very crucial because it aids in customer retention and increase revenues. Music in the market has played a leading role in creating customer royalty. For instance, in the cosmetic industry, whenever a stereotypical successful female accompanied by a trendy music audio-visual done by a popular artist advertises a new personal care product, a large groups of people who identify with female, the musician, the music and the audio-visual accompaniments become royal customers. Types of music have a differentiated effect on demographic age groups. For, instance hip pop music is appealing to the young generation compared to elderly customers who like jazz (Park & Young, 1986).

Product credibility in the market is very important because it has a direct bearing on how customers respond to the product. Music has been widely used to establish authority of a product in the market. Marketers use well know music piece together with the product technical expert talking about the advantages of using the product. People are more likely to identify with the product and trust it more if it is accompanied by a music version they very well know. In another incident, you can have the celebrities like music artists talking about the product; its advantages, uses and how it has changed their lives. Customers are likely to fall for the product because they identify with the celebrities and their music (Kellaris & Cox, 1987).

Most of the advertisement monies have been wasted in focusing on the wrong customers. For instance, most buyers are never in the market to buy diapers or school-going population cannot be in the market to shop for farm implements. On this account, music can be a very powerful tool in customer targeting. Advertisers’ use an advertising channel whose demographic characteristics match with the group being sought (Milliman, 1982).

Once a target group has been identified then next thing online should be cultivating the target group to respond to the product on offer. This is where musical styles come in in customer targeting; music genres that resonate with a particular market segment is useful in engaging them because it might be a status or socioeconomic identifier (Kellaris & Cox, 1987).

However, advertisers should be careful not to overuse music in targeting because if over used, it can be monotonous and therefore, end up achieving exactly the opposite of the original intentions. A good mix of music that hits at the target group is therefore important (Rugman, 1965).

Establishing Continuity in In-between AdvertisementsInitially, music got its continuity purpose from acting movies where music is used to catch the attention of the audience during transition from one scene to another. In modern commercial advertisements, music is used as a commercial break tool. It comes in between advertisements, where apart from establishing continuity in the advertisements it also serves to create memorable mental pictures that customers associate with the product (Park & Young, 1986).

In addition, another Structural function of music is to establish some emphasis on the advertisements. Some musical notes can be used at some junctures to emphasize some important use of a product. Emphasizing can be used to achieving multiple advertisement goals, including becoming memorable and enhancing image creation in the people minds (Rugman, 1965).

For long time music, has had great influence to the society. In traditional societies, it has been used as a cultural identification tool. However, music has commercialized both itself as a product and as a medium for advertising other products. It is no doubt that music has great influence to the market today. This in itself attracts some advantages and disadvantages to the commercial firms, consumers and the public (Kellaris & Cox, 1987).

Music arouses customer’s emotions about a certain product such that once a given piece of music is played the customer remember the product right away. This way, music is useful in identifying certain products in the market, and hence promoting their consumption (Park & Young, 1986). Music creates psychological effects on people minds and therefore influences their decision-making ability. A good song or beat can positively influence an individual’s perception of a product hence considerably increasing their purchases (Batra & Ray, 1983). Music since time immemorial is known for soothing people into softening their stand and influencing them to embrace things they did not consider initially as good to them. Influence of commercial music in the market today is advantageous because it slowly galvanizes people into accepting products on offer in the market. This is especially the case of introducing new products in the market which customers do not have an idea about (Milliman, 1982).

Downside to Music MarketingSome aspects of some products such instructions of using some drugs need to be properly written where a customer can frequently refer to if he or she forgets about them. Music does not conveniently offer such capability of a product because even if it is recorded, it will be very inconvenient and expensive to play a music record whenever a consumer uses a product (Rugman, 1965). It follows that even though music may dominate and have immense influence on the market, it is not exhaustive and therefore, it may need some other supplementary advertisement method. Music alone does not sell a product, but instead well placed music along with desirable information and material that can influence the buyer and key demographic of the service or material in question (Batra & Ray, 1983).

Music has very powerful impact on peoples’ minds and can alter their way of thinking. For instance, a company using best music can pass for supplying the best products. Music stimuli works independently about the product or service being sold to the customer. This is very dangerous because it makes them just recipients of information. Manufacturers and retailers want to associated with the pleasure sector of a viewer’s and listener’s brain, and if they already connect a particular artist or musical record with success, power and desire, they are more likely to buy the product, regardless of what it is or if they need it at all in the first place (Rugman, 1965). Brainwashing is common among the teenagers and children who tend to identify with advertisement content without questioning the credibility of the presented illusions. The law requires business to advertise without exaggerating ingredients and effects of their products and services to avoid lying to the public (Milliman, 1982).

Despite strict censorship and strict rules regulating consumption of music, improper music content filled with adult content is in the market due to laxity within the business law. Although propaganda asserts that sex, nudity and sexually explicit music content sells best a commercial advertisement, in the long run, the community is exposed to negative norms. This is because it slowly but surely weakens the social fabric that is holding the society together. This is against the principle of corporate social responsibility that advocates for protection of customers and responsible dissemination of information (Kellaris & Cox, 1987). It is important that commercial businesses understand the importance of protecting the population that they sell their products to and look after their heritage by tailoring sustainable advertisements. If the customer base is destroyed, then they can be sure of the being technically out of business due to inadequate market (Aaker, Stayman & Hagerty, 1986).

Over shadowing of music impact in the market is not very good because it is full of assumptions that may be different from reality. Illusions presented in some market segments can work but mostly, they backfire whenever content discriminates against morality. Mature markets segments such as adult and elderly people prefer natural goods sold under soothing sounds compared to modern products sold using contemporary music genres, which are widely used in commercial advertisements (Batra & Ray, 1983). These people are part of the market and it is only logical if their market share is exploited using music that appeals to older generation. For this reason, marketers have to come up with compensatory advertisement measures. Every advertiser is cautious when selecting music to make sure that the music fits the target market segment. Religion plays a role in marketing and advertisement and sometimes-religious differences are highlighted by designing advertisements that mimic a stereotypical Christian or Muslim lifestyle (Kellaris & Cox, 1987).

The business world is a fast-paced stage where dynamic changes occur daily and with technology, competition keeps growing and music advertisement is changing to fit the new market dynamics. These changes are a great undoing for music influence in the market because before the customers get used to some music prevailing in the market, it has already changed and new music is running in the market. With time, music suffers from old age setbacks but with research and development, an informed decision can be reached concerning market trends. Drastic changes in the music industry and celebrity status means that a hired celebrity is not identified one year down the line, which means that the public appeal is done and the advertisement is no longer effective. This confuses the customer and affects sales’ performance (Batra & Ray, 1983).

As much as it is good, music stimuli has a far-reaching negative impact on the society and the consumers by influencing what the consumer should buy. For instance, uncensored music can instill bad morals in some sections of the society and affect vulnerable people like children. That breaks the social moral fabric that holds the society together and unsustainable advertising causes future loss to a company business. And if the society is corrupted by music advertisement, business will run out of market since the appeal to buy destroyed the same society that buys (Aaker, Stayman & Hagerty, 1986).

Work Cited

Aaker, D.A., Stayman D.M., & Hagerty, M.R. (1986). Warmth in Advertising: Measurement, Impact, and Sequence Effect. Journal of Consumer Research, 12, 365 -381.

Batra, R. & Ray, M L. (1983). Advertising Situations: The Implications of Differential involvement and Accompanying Affect Responses. n R.J. Harris (Ed.), InformationProcessing Research in Advertising. (pp. 127-151). Hillsdale, New Jersey: Erlbaum.

Kellaris, J.J. & Cox, A.D. (1987). The Effects of Background Music In Advertising: AReplication and Extension. In S.P. Douglas, et al., (Eds.), AMA Educators’ Proceedings(Vol. 53, p. 283.). Chicago: American Marketing Association.

Rugman, H.E. (1965). The Impact of Television Advertising: Learning without Involvement.Public Opinion Quarterly, 29, 349-356.

Milliman, R.E. (1982). Using Background Music to Affect the Behavior of SupermarketShoppers. Journal of Marketing, 46, 86-91.

Park, C. W. & Young, S.M. (1986). Consumer Response to Television Commercials: The Impactof Involvement and Background Music on Brand Attitude Formation. Journal ofMarketing Research, XXIII, 11-24.

Cyber Security Attack on an Organization or Company

Cyber Security Attack on an Organization or Company

Name:

Number:

Course:

Lecturer:

Table of Contents

TOC o “1-3” h z u Introduction PAGEREF _Toc418184942 h 2Identification of threats and attacks PAGEREF _Toc418184943 h 3Communication of identified threats and attacks PAGEREF _Toc418184944 h 6Solution and recovery to the threat problem(s) PAGEREF _Toc418184945 h 6Protection against malware PAGEREF _Toc418184946 h 6Malicious Insider attack and susceptibility of joint technology PAGEREF _Toc418184947 h 7Equipment/ device compromise PAGEREF _Toc418184948 h 7Spoofing attack for metadata PAGEREF _Toc418184949 h 7Modbus security challenge PAGEREF _Toc418184950 h 8Profiles for unfamiliar risks PAGEREF _Toc418184951 h 8Hijack of services and accounts PAGEREF _Toc418184952 h 9Abuse and evil use of cloud computing PAGEREF _Toc418184953 h 9Conclusion PAGEREF _Toc418184954 h 9References PAGEREF _Toc418184955 h 10

IntroductionSeveral security threats exist which the adversaries use to get the right of entry into the company computer systems through planned attack. The attackers can use one type of threat or even a combination of potential threats to attack the system resources such as data, software or hardware. The companies can outsource the security services from the cloud service providers. However, they need to choose the providers which meets the larger part of security requirements before migrating to the cloud environment platform.

Identification of threats and attacksThe attack on cyber security by either insiders or outsider criminals can be associated to a number of threats. The threats comprise of malware injection, spoofing attack on metadata, hijack of service and accounts, company malicious insiders, susceptibility of joint technology, profiles for unfamiliar risk, Abuse and evil use of cloud computing as well as unsafe interface for application programming. Others include compromise of communication equipment, analysis of traffic and eavesdropping and Modbus safety challenge. Any of these attacks can expose the company’s system to attack depending on the level of security installed and the experience of the attackers (Younis, & Kifayat, 2013).

The injection of malware is the leading kind of attacks that whose main purpose is to introduce malware services, application in to the system of the loud. The installation of malware can permit the use of Random Access Memory Scripting Attack that allows the attackers to get company or personal data that are not encrypted as the data passes through the affected point of sale memory machine prior to being transferred to the processing payment of the provider. The design of malware can be done purposely to relocate the data stolen from the network system of the company. This installation can be done at one point of the network terminal linked to the company that later makes it possible for theft of sensitive information such as financial data (Younis, & Kifayat, 2013, Committee, 2014).

In the spoofing attack for metadata, the server from the World Wide Web is employed to get documents that stores every piece of information concerned with invocation of web service like the security needs, format of the message, location of the network and many others. The attack in this case in carried out in order to re-engineer the metadata accounts of the web service with an aim of altering the endpoints of the network and other guiding principles to do with information safety. The hijacking of both accounts and service threat can take place at a time when the cyber criminal tries to hack the website which is under the care of cloud service providers. The cyber criminals in this instance can install particular software in secret to allow them gain the control the infrastructure of the cloud. As a result, a client company that uses the cloud services of the target service provider will be prone to attack (Younis, & Kifayat, 2013).

The malicious insider attack can be extra sophisticated and hard to deal with since it is characterized with lack of sufficient visibility on how the responsibilities of various employees are updated or changed as they also change their jobs. For this reason, malicious insider attack can be experienced as a result of inadequate transparency concerning the procedures of service providers and how employees can be authorized to get the right of entry in to virtual asset. The profile of unfamiliar risk is also a threat that can easily take place due to placing much emphasis on the functionalities and features that can be derived from the services of the cloud at the expense of taking in to an account how safety processes as well as technologies can be enhanced and without considering the individuals with privileges of accessing data and the result of disclosing any data (Younis, & Kifayat, 2013).

The threat of joint technology and susceptibility comes as a result of the cloud service providers and their client companies, organizations and/or institutions make use of similar infrastructure that is also used within the internet. This implies that the joint infrastructure will be shared among the existing clients of the cloud. This means that all the problems that exist in the internet infrastructure will also move to the cloud. This creates security gaps for the attackers at various points of the network terminals both at the internet level and at the client consumers which are companies in this case. The Abuse and evil use of cloud computing is also the leading threat in the environment of cloud computing hence poses a threat to consumers of the cloud. In Abuse and evil use of cloud computing, the cyber criminal employs the existing capability of cloud computing to launch an attack through the spread of sperm and malware. Lastly is the use of unsafe interface for application programming. The application interfaces with no secure access control, encryption, authentication, and mechanisms of monitoring activities will pose a threat to the providers of the cloud and hence to the consumers. This is because application program interface are used so much by the cloud providers while offering services to consumers (Younis, & Kifayat, 2013).

Some of the communication equipment which can be compromised includes multiplexers which can bring about straight harm to the system network. The equipment can also be used by the attackers to plan and start on prospect attacks. In traffic analysis and eavesdropping, the adversary can get the right of entry in to sensitive information by means of keenly checking the traffic of network. The prospect information prices, grid control structure among others are some of the examples of information which can be monitored in using this kind of threat. The Modbus safety challenge is another threat where by the protocols used for the Modbus is not designed for enhanced safety serious environment. Therefore the possible attacks with problems of Modbus security include replay of authentically recorded messages, communicating counterfeit relay messages to slave devices, reading messages from the Modbus, computer attack using suitable adapter and many more (Aloula et al., 2012).

Communication of identified threats and attacksThe users of the company network resources will first report any problem noticed to the network technicians. Upon confirmation of the threat and attack, the network technicians then report the problem to the chief information security officer. As the chief information security officer to the company, I will communicate the identified threats and attacks to the chief executive officer given that the ownership of company risks belongs to the top management (Stamper, 2012). The top management through the chief executive officer then communicates to the cloud service providers who will be responsible for solving the issues of cyber attacks.

Solution and recovery to the threat problem(s)Protection against malwareThe solution to the installation of malware will involve the use of FireEye software for automatic deletion of the installed malware by the attackers. The FireEye intrusion detection system is used first to trigger urgent alerts. The semantic antivirus can also be used to detect the malicious behaviors of the system. A tool known as Kill Chain which relies on the static defense can also be used for cyber security defense. The companies should purchase only those software supplied by the manufacturer where=by the products are embedded with safety storage consisting of keying materials for the validation of software. In this case, the system can easily validate software that is freshly downloaded before running or installing it, failure of which the software should not accept installation progress. Nevertheless, the general purpose systems can be protected using the latest antivirus software together with the intrusion prevention that is host based (Aloula et al., 2012, Committee, 2014).

Malicious Insider attack and susceptibility of joint technologyThe network user identities should also be confirmed by means of robust approaches of authentication. The company should also put into place the policy for implicit denial which will ensure that the right of getting entry into the network system is allowed only via permissions of explicit access. The systems of both prevention and detection of network intrusion technologies should also be considered in order to safeguard the system from both the inside as well as the outside attacks. The susceptibility evaluation should also be carried out at least on annual basis to guarantee enough security for the components that interface with the network system perimeter (Aloula et al., 2012).

Equipment/ device compromiseThe programs of awareness should also be put in place by the company or organization with an aim of educating the users of network concerning the safety best practices for employing the tools and applications for network. This is because the actions performed by users can at times results to considerable susceptibilities of the system. The devices should also be made to recognize the various destinations that they interact or communicate to. This can be done or implemented by means of mutual verification approaches through the security of transport layer. The security of internet protocol can also be used for this implementation (Aloula et al., 2012).

Spoofing attack for metadataThe network devices that support the virtual private network design for safe communication should also be employed. Although the present devices have some limitations concerning management of keys and cryptography, the devices used should also make use of infrastructure for the public keys in order to safeguard communication. The communication through the system of smart grid should also be configured to take place over various channels with various bandwidths, linkage where certificate authorities, every device and servers will have to be linked to the network every time. This kind of configuration is required since the present devices lacks sufficient power of processing and storage to carry out advanced approaches of user and software authentication and encryption (Aloula et al., 2012).

Modbus security challengeEvery technology of IT used by the company should also have the capability of being upgraded or enhanced in terms of security features given that the smart grid lifecycle is normally longer as compared to the existing IT systems used. The security should also be made as part and parcel of the design for the smart grid. The company should also use devices whose securities are not vendor specific as this may result to several susceptibilities due to problems of incompatibilities. The company can also take in to an account the idea of utilizing the third party companies of communication for utilities. In this case, the third party communication companies will be very important in managing the security problems to do with data transmission. Last but not least, a strong verification protocol should be employed to improve safety of communication amid parties of the smart grid. The protocol used will have to function in real time in accordance with some limitations like the minimum cost of computation, low overhead of communication, denial of service attacks and others (Aloula et al., 2012).

Profiles for unfamiliar risksThe company should be concerned with the way security technologies and the products are to be enhanced and the individuals who will be responsible for accessing the data as well as the conditions of data disclosure. This can better help in knowing some of the possible risks in advance for the appropriate action to be taken rather than just being concerned with feature and functionalities to be gotten form the cloud services.

Hijack of services and accountsIn this case, the company should ensure that the chosen cloud service provider meets all the security requirements before signing the service level agreement. Some of the security requirements in this case include data confidentiality, integrity and data availability in addition to access controls for the system network which all form the basis of a computerized system security.

Abuse and evil use of cloud computingThe methods used in the control of malware installation will also apply for this kind of threat as it also involves the spread of malware. However, the company should also consider choosing the cloud providers which meets all the basic security needs.

ConclusionThere are many threats and attacks which the inside or the outside attacker can use to get illegal access to the company or organization’s network system. Either one or a combination of the potential threats can be used to plan an attack to the system. As a result, the companies which chose to use cloud service providers should be careful and keen on which provider to chose which meets the needed security requirements by the company. The threats come as a result of weakness or gap that exist either in the software or hardware component of the system.

ReferencesYounis, M. Y. A., & Kifayat, K. (2013). Secure cloud computing for critical infrastructure: A survey. Liverpool John Moores University, United Kingdom, Tech. Rep.

Committee on commerce, science, and transportation. (2014). A “Kill Chain” Analysis of the 2013 Target Data Breach. United States Senate

Aloula, F., Al-Alia, A. R., Al-Dalkya, R., Al-Mardinia, M., & El-Hajj, W. (2012). Smart grid security: threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), 1-6.

Stamper, L. J. (2012). Higher Education Leaders’ Roles in Access Security Management. Higher Education, 1, 1-2012.