Threats Analysis and Framework for Netflix
You have evaluated various cloud computing architectures and the security aspects of cloud providers’ services; created a cloud-based security strategy; and completed various hands-on labs. Now it’s time to use this knowledge you’ve gained by providing recommendations for Netflix you selected for your project.
Directions: Provide a comprehensive threat analysis and framework mapping developed For Netflix:
Company Evaluation
Seciurty and Threats
Cloud Recommendation
Threats Analysis and Framework
Your recommendations for improvement or solutions, and a conclusion. In this compiled document, provide at least three to four (minimum) recommendations.
In your final submission:
Describe threats analysis (both physical and logical).
Develop framework mapping that includes 3-4 recommendations for improvement or solutions.
Provide a conclusion.
Threats Analysis and Framework for Netflix
Netflix faces different threats internal and external thus negatively affecting the organizational progress and thus there is a need to develop solutions and countermeasures to eliminate or avert the threats. The security threats faced by Netflix include cyber-attacks, data breaches, virus attacks, the introduction of face Netflix apps, phishing attacks, attack on the streaming services, hacking using confidential details such as passwords or introducing Trojan malware and cyber extortion such as data exposure and the threat of DDoS attacks. The threats result in a decrease in the revenue and profit levels as they push away subscribers and customers. There is a need to adopt countermeasures and solutions through the cloud computing architectures, security aspects of the cloud service providers, cloud-based security strategies and solutions from completed hands-on labs to eliminate and avert risks facing Netflix.
Netflix Evaluation
Netflix as an American media services provider’s primary business entails offering subscription-based streaming media services, streaming of television programs that externally produce as well in-house produced and it offers online streaming of a library of films. Netflix headquarters are at Gatos, California but the company has subscribers across the globe (McSherry and Mironov, 2009). As of 2018 Netflix global subscribers were at 130 million while the subscribers in the United States were 57.38 million. In this case, in the event of a cyber-attack or security breach, it will have a devastating impact on subscribers and thus there is a need to invest in advanced countermeasures and solutions to prevent the impacts of such attacks.

Security and threats Analysis
Netflix has consistently maintained security on its content and that of the subscribers despite threats that are experienced from time to time. The cyber-attacks are directed at access content illegally or accessing subscribers’ confidential data at the expense of the subscribers. First, the fake Netflix app is a cyber-attack that has raised concerns from the members of the public. The fake Netflix app was circulated across the web prompting the unsuspecting subscribers to provide their confidential details such as passwords, usernames and credit card details (Sapienza et al., 2017). The fake Netflix app was similar in color and features and was downloaded by many subscribers thus exposing them. Consequently, Netflix has experienced phishing attacks that phishers try to acquire personal information pretending to represent trusted companies and websites through online platforms. In this regard, phishers create websites that mimic the genuine Netflix website to acquire confidential information and thus stealing accounts and personal information. Furthermore, the cyber-attack on the streaming services has led to Netflix losing content unauthorized parties. This fact makes content to be leaked to the members of the public thus affecting Netflix operations (Llanso and Pearson, 2016). The illegal and unauthorized access to Netflix content is a significant security breach that can drive the organization out of business. Additionally, hacking is a cyber-security issue that has risked the existence and operations of Netflix. The hackers target the service expanding membership base by accessing bank credentials and passwords at the expense of the subscribers. The hacking experiences scare away subscribers thus Netflix ends up losing.

Framework mapping
The framework mapping, in this case, will entail the documentation of the security threat to enhance the development of a structure that will handle the cybersecurity issue. The framework mapping will provide the necessary information to enhance the decision making on the implementation of the security policies and other strategies or best practices. The mapping will be effected through the collection and organizing of data, facts, and evidence on the cyber risks and threats. The data that need to be collected include the region that experiences a high number of attacks, types of the attacks, the attackers and the targets of the attackers and the probable solutions for the different types of the attack. This information will make it possible to enroll an effective structure to handle the insecurity situation by exerting more vigilance in regions highly affected, adopting the best practices to counter different types of attacks, and hiring of the relevant cybersecurity personnel to handle the cybersecurity issues.
Conclusion: Recommendations and solution
Cyber related insecurity and threats have significantly risen affecting Netflix operations and thus there is a need to adopt cloud-based security solutions. The security solutions will effectively prevent the attackers from perpetuating their ills at the expense of Netflix and its subscribers across the globe. First, Netflix needs to Cipher cloud solutions. The Cipher cloud uses the models of Paas, Saas, and Iaas to secure and protect customer information across private and cloud applications without compromising functionality or performances (Almorsy, Grundy and Muller, 2016). In this regard, Netflix needs to surrender sensitive customer’s information for safekeeping under the ciphercloud solutions. Consequently, Netflix needs to adopt encryption solutions to effectively prevent hackers and general attackers from perpetrating cyber-attacks. Encryption entails the covering of data and information on transit into a code to ensure that unauthorized access is prevented. Netflix adopting encryption ensures that its content is transferred from the source to be subscribers without interferences. Moreover, Netflix needs to adopt firewall protection solutions to ensure that exchanges of content done over the internet are done safely. The firewalls prevent unauthorized internet users from accessing networks linked to the internet or the intranet (Singh and Chatterjee, 2017). This approach ensures that operations within Netflix are not exposed to the external world and only the authorized parties. More so, Netflix needs to adopt the workload protection platform to protect their content and customers. The technologies work together with cloud infrastructure and virtual machines to enhance monitoring and prevention features. This technology will ensure that operations at Netflix are monitors and threats are effectively eliminated. Lastly, Netflix needs to adopt the cloud Access Security Brokers to monitor operations and enforce security policies in the course of operations. This approach ensures that all the safety measures are adopted in the interest of enhancing the security of Netflix and subscribers.

References
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security problem. arXiv preprint arXiv:1609.01107.
Llansó, T., & Pearson, D. (2016). Achieving Space Mission Resilience To Cyber Attack: Architectural Implications. In AIAA SPACE 2016 (p. 5604).
McSherry, F., & Mironov, I. (2009, June). Differentially private recommender systems: Building privacy into the netflix prize contenders. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 627-636).
Sapienza, A., Bessi, A., Damodaran, S., Shakarian, P., Lerman, K., & Ferrara, E. (2017, November). Early warnings of cyber threats in online discussions. In 2017 IEEE International Conference on Data Mining Workshops (ICDMW) (pp. 667-674). IEEE.
Singh, A., & Chatterjee, K. (2017). Cloud security issues and challenges: A survey. Journal of Network and Computer Applications, 79, 88-115.

Published by
Essays
View all posts