Cyber-Attacks on the Colonial Pipeline Organization

Colonial Pipeline Company is an oil company based in Texas, Houston and carries jet oil and gasoline to the southeastern part of the states. On May 7th, 2021 it experienced a ransom with cyber-attack that resulted in computerized equipment running the pipeline being invaded by the hackers. As a result of the invasion by the hackers, the company changed or rather halted all the operations of the company to manage the attack. The attackers requested a large amount of money that added up to $4.4 million.

With the support of the FBI, the amount was paid some hours later for the attackers to stop further damage and interference of the information of the company. Over a short period of paying the amount of money, the attackers sent an application to the company which was aimed at restoring the network which responded very slowly. This was the largest oil company infrastructure attack in the history of the United States which resulted in more than 100 gigabytes of data being stolen the day before the malware attack on the company (Azubuike, 2021). The FBI and other criminal investigation bodies identified the hackers as Dark Side and the department of justice announced that they managed to recover more than $2.3 million from the ransom payment.

However, the cyber-attack had an impact; both internal and external. One of the main internal impacts of the attack was that the billing system was interfered with even though the operational technological database was not affected. The company is unable to bill the customers which were a complete reason for changing the pipeline operations. Another internal impact is the shutting down of the operations because the company thought that the hackers may have the necessary information to carry out more attacks. The panic that is associated with the attack made the company owners not aware of the day the company will resume their operations hence impacting negatively on the oil users (Boschee, 2021). The colonial company lost some amount of money to the hackers which were up to $1.1 million approximately because some cash was reported to have been recovered.

One of the main external impacts of the attack was that there was a significant shortage of fuel in the states which led to the rescheduling of flights to a minimum of the four-day period. The attack also caused Hartsfield-Jackson Atlanta airport to use fuel from other suppliers which could not impact positively on the airport operations. Fuel prices rose significantly since there was no fuel in the filling stations especially in the states of Florida, Alabama, Georgia, southern and northern Carolina. A gallon of fuel rose to approximately $3 since 2014. Lastly, the temporary closure of the colonial pipeline company impacted the loss of existing and potential customers due to decreases trust and reputation.

How it happened; and the timeline of events

There are a few concrete reasons on how the attack happened and it would probably hold until the company gets a real glimpse of how the events took place through investigation. However, the whole story is all about the ransom outbreak that is associated with the Dark Side group that struck the colonial pipeline accompanying networks (Hobbs, 2021). The initial plot on the attack is not clear but can be an old, network vulnerability to the system of the company; a hacker email that correctly fooled the employee. The utilization of access credentials bought or borrowed from somewhere else had potentially leaked or other tactical ways of the hackers to infiltrate the network of the company or literally the employee logged in another computer using the same password for the VPN which probably leaked. This is the probable unfold of the events in the companys network.

The most important fact to know is that the hackers were more concerned with money than crashing down the systems of the company. They targeted the business side but not the operational side hence a clear indication of no concern with the design of the pipeline company. With this, the hackers managed to enter into the companys servers and steal the data that was responsible for the operations of the company (Hobbs, 2021). The following day they ensured they conduct a malware attack which means they gain full control of the company. The oil giants certainly said that the attack made the company be offline for a while as they figured out how they could come to terms with the attack.

The Timeline for the Event was as Follows

On 6th May 2021 the hackers stole 100 gigabits of data from the companys system. On 7th may 2021 the hackers conducted a malware attack, security agencies (FBI) called to respond to the attack, notification of the federal government about the attack, pipeline goes offline to reduce more damage, colonial pipeline company pays $4.4milion to the hackers, 9th May 2021 emergency declaration by President Joe Biden, on 12th may 2021 the company had restored its system and ready to start working, 7th June 2021 department of justice recover approximately $2.3 million from the hackers, 8th June 2021 congressional hearing on the attack; It took some hours when the attackers requested money and promised to restore the network (Hobbs, 2021). Even though they returned the application that would support the operation, it did not fully respond to the large system of the company; it was very slow in response.

The company experienced a six-day shutdown which did not re-start with an immediate effect. The company management warned the public about the full return of the operations because the system had not yet fully recovered to its original functioning. Due to slow recovery, the company said that the markets that are served by the pipeline company would experience shortages or inconveniences on the delivery of the services. The prices would slightly increase, and they would move slowly in their operations until the market returns to normal.

Preparation for the Crisis and Challenges Faced during Preparation

The colonial pipeline company had put some measures in place that was a way of preparation for crisis management. In the case of the cyber-attack that occurred, the company had insurance cover policies that may have saved the company in paying the ransom amount of money and other minor expenses that are associated with the cyber-attack. This action came to effect since many companies have fallen victim to the cyber-attack that is rampant in the current world. The company had prepared to isolate the problem at its occurrence (Li, 2022). The company was ready to terminate its connectivity to the internet on the occurrence of the attack. It was reported that by Friday the company had disconnected its servers from the internet.

The advantage of the isolation of the problem is to determine if the data is ex-filtrated and if there is a possibility of reducing the demand for the ransom. Other very important steps to cater for the cyber-attacks that the company prepared for are the identification of the asset, putting measures in place to protect the assets, ensuring the detectors are in place to check if the assets have been interfered with, and lastly executing a recovery strategy for the assets in case of the interference (Li, 2022). The above steps are the most reliable preparation strategy for crisis management in an organization that colonial pipeline company employed to deal with the sudden attack.

However, there are some challenges that the company experienced regarding the preparation to face the crisis. The first challenge is a significant increase in cybercrimes in the country. This challenge is very significant because many cyber attackers are emerging and only attack companies. Secondly, the company faced the challenge of a lack of extensive cyber security knowledge. It is alleged that the password may probably have leaked in other locations which is a clear indication of insufficient knowledge about how to protect the credentials of the company.

The other challenge that the company faced is the growing attack surfaces that encourage widespread and easy attacks on the internet. People can interfere with the operations of a particular organization from any point that they are by use of any gadget that is connected with the internet (Reeder & Hall, 2021). This is beyond the company and is beyond their control. High costs of insurance are other challenges that the company face. To ensure a company of that magnitude needs high coverage policies that attract a large amount of money. This amount of money in itself is a challenge that the company faces in preparing for the cyber-attacks crisis.

How Did the Organization Communicate Before/During/After the Crisis?

The colonial pipeline company communicated differently, before, during, and after the crisis. Before the crisis, the company communicated by ensuring that it prepares for the possible occurrence of the crisis. Although many challenges were concerned with the communication towards the crisis, the company tried to take some steps of identification of its assets and the possible procedures of recovery hence could easily pass a message to the general public. Secondly, the company before the crisis had tried to upgrade its systems because it is a very complex company that needed strategized system (Reeder & Hall, 2021). Also, the act of ensuring the company with protective policies against the cyber-attacks is clear communication of the company on the possible occurrence of the crime. Therefore, from my evaluation, the initial communication before the crisis is more silent than utter communication. The action that the pipeline company does which includes insurance is a communication of a potential crisis.

During the crisis, there were so many communications that were passed through by the company. To begin with, the company was silent for more than a day on the day of the attack. This silence was symbolic to know where to begin from. It was a way of strategizing on the grounds of coming back to work and continuing with their daily operations. Secondly, the company hired the FBI who would help them in the investigation of the crime on the servers of the company. This action was a clear indication of the possibility of finding the culprit with the use of a more legal procedure (Tsvetanov & Slaria, 2021). 9th May 2021 the president of the United States declared a state of emergency that was a way of communication by the company.

The notification of the federal government about the attack and the law enforcement was another form of communication to the attackers that the problem is too big and has reached the main authorities of the nation. Lastly, there was a very bizarre communication after the crisis when the department of justice announced that it has managed to recover $2.3 million from the hackers was a clear communication that the government is more powerful than the attackers. To recover such an amount of money indicates more formidable and organized investigation institutions in the federal state of America. A congressional hearing was a clear communication that indicated that the crime like other crimes can take legal action and the attackers to be aware and ready to face the wrath (Tsvetanov & Slaria, 2021). All these communications are phenomenal because they help to foresight what may happen later in the due course of the operations of the company. The communication also shows that the crisis management approach in the company would change significantly.

Recommendation from Managers Perspective, to improve the Current Situation

As a manager I suggest that the investigation team in the US need to take a stun step of looking into the matter to prevent further occurrence in the future. In this regard, I propose that individuals found guilty should face the law as a way of scaring potential offenders who might be planning to attack other companies. This action will reduce any possible occurrence of the criminal offence because people will be scared of the consequences.

In addition, it is important for the State and companies to consider proper education to employees. The training will help them in understanding the limits of company interaction with the unauthorized people (Azubuike, 2021). This kind of education should take a form of conferences to workers and other concerned bodies. In this case, the education system should aim at equipping employees with all possible skills of attack prevention alongside understanding the need of protecting institutional resources. This will also help them in developing the urge to learn tricks used by attackers and how they can be prevented.

Recommendation to Prevent Long-Term Consequences

Colonial pipeline companies in the United States should ensure that it accelerates the recovery of the server to the way they have been functioning. The practice will help in retaining clients and other material information. In case of slow recovery to normal functioning, the company would record a lot of losses due to poor reputation which will scare the customers (Boschee, 2021). Therefore, the company needs to strive and restore the companys computer systems to ensure that it caters and controls the supply of fuel in all the parts.

Secondly, to prevent further long-term vulnerability and consequences, the company should ensure that it puts appropriate measures in place that would help to protect the identity of the company. In case of any other attack, the company will lose potential customers and hence damage its reputation as the biggest supplier of fuel in the US. Therefore, the credentials of the company such as the password should be protected and made private to the company to prevent any possibility of occurrence of the attack again.

Thirdly, the company should put a deliberate communication about the crisis in the company for the employees to be aware of the target and where the company needs to be in a short time. Communication enables the employees to concentrate on products that will help put the company where it is supposed to be (Boschee, 2021). Therefore, in the case of the colonial pipeline company, the employees should know that the crisis happened and should be accepted as it is and move on with the normal operations.

In addition, the company should determine the impact of the crisis and try to fix it appropriately. This will help in establishing possible causes of crisis and design helpful measures to aid in preventing such occurrences in future. By determining the extent of the crisis, the company will be able to know how it will allocate its resources to the right place that will foster development.

Lastly, the company should focus more on understanding where the crisis began and employ the most experienced individuals to manage the department to prevent further damage. In the case of the colonial pipeline company, the information technology sector seems to need the most specialized people who would prevent any possible occurrence of the crisis (Boschee, 2021). Good management of the companys data will help the company not to leak any potential information that would lead to the further downfall of the company.

References

Azubuike, S. (2021). Cyber Security Attacks: Regulatory and Practical Approach towards Preventing Data Breach and Cyber-Attacks in USA. Available at ssrn 3878326.

Boschee, P. (2021). Comments: Complexity of Cybercrime Skyrockets. Journal of Petroleum technology, 73(06), 8-8.

Hobbs, A. (2021). The colonial Pipeline Hack: Exposing Vulnerabilities in us Cyber Security.

Li, C. (2022). Securing us Critical Infrastructure against Cyber Attacks.

Reeder, J. R., & Hall, T. (2021). Cyber securitys Pearl Harbor moment. The Cyber Defense Review, 6(3), 15-40.

Tsvetanov, T., & Slaria, S. (2021). The Effect of the Colonial Pipeline Shutdown on Gasoline Prices. Economics Letters, 209, 110122.

Preflight Planning Considerations

Introduction

In this paper, there is a plan to fly an unmanned aircraft system (UAS), which will be DJI Matrice multi-rotor aircraft on flight lines 25 meters apart from one another. There is a need to consider safety-critical aspects that ensure that the flight does not have constraints while in the air. Another major element to consider is minimizing the risk of collision with other aircraft by adhering to air traffic control measures (Alsadik & Remondino, 2020). In addition, it is notably important to consider elevation, airspace, airports, and possible hazards on the way. Other essential considerations comprise part 107 regulations, security access concerns, and crew resource management. This paper presents critical planning of the flight between Atlantic City and Washington DC on November 3, 2022.

Weather

Prevailing Wind Direction

The direction of a runway is influenced by wind direction. It is important to mention that wind pushes aircraft forward through the air, increasing its speed and shortening a journey. The direction of the wind should guide the flight, not fly on the opposite so that the aircraft reduces friction while on the way (Hashemi & Botez, 2022). Thus, such consideration is important in the planning of the flight.

Average Wind Speed

With reasonable proficiency and appropriate runaway measures, it is possible to handle winds up to 20 knots. However, for the UAS, the component may be around 10 knots will enable linear maneuvers from taking off to landing (Cox, 2021). The Wind in Washington DC and major parts of the US during the fall season is usually 13.1 mph based on historical data, as shown in Figure 1 below. Thus, wind speed should be a key factor to consider while planning the UAS flight on November 3.

Average monthly wind speed in the US region
Figure 1: Average monthly wind speed in the US region

Minimum and Maximum Temperature

For a plane to be in the air, the temperature is a key factor to check. It will be important to keep the temperatures between 22 to 24 degrees Celsius so that the system of the UAS does not have adverse effects from the heat in the aircraft (Echeveste et al., 2021). Flying must have key concerns about the high-altitude icing hazards that may tamper with the normal temperature range during the Fall season. The maximum temperature should be 27 degrees Celsius.

Weather Sources Used

In this paper, various weather sources were useful in getting the information presented for flight planning. The following were websites used; Federal Aviation Administration (FAA), NASA Aeronautics Research Mission Directorate, Googles Earth Maps, and National Aeronautical Office. The websites have comprehensive information about wind direction, speed, and temperature. For instance, using Google Earth would navigate easily about the specific point on earth that one requires to find a given data.

Elevation

The maximum allowable altitude for UAS flights is 400 feet above sea level. The Medium altitude ling endurance for unmanned aerial vehicles is 300 feet above the ground, while the high-altitude long-endurance (HALE) is 420 feet above sea level (Echeveste et al., 2021). According to NATO, the lowest altitude long endurance (LALE) is 100 feet above the ground. Since the flight from Washington DC to New York is a short flight, the UAS aircraft will be required to move when 350 feet above sea level. However, the flight will be determined by the weather, turbulence, and safety factors (Fang et al., 2018). It is important to avoid flying in altitudes that probe the flight controller to look for an emergency landing to maintain the safety of the aircraft.

Airspace and Airports

Airspace can be categorized into controlled, uncontrolled, special use, and others. Controlled airspace regulations do not apply to UAS within the open category. For this division, an organization will be required to get permission to enter a controlled space when adhering to the terms of the authorization (Ku~elka & Surový, 2018). FAA selected a few airports that can be used for UAS. In this case, the plan is to use Atlantic City International Airport and Seattle-Tacoma International Airport. The airports are preferred because of the capability they have in detecting, identifying, and monitoring unmanned aircraft. The US government has recently developed systems to counter the UAS system so that the aircraft can be tracked with modern aviation technologies.

Medical

The Southern Jersey Family Medical Center is the nearest medical center that will be useful in case of emergencies. The medical center can be reached at +1 856-853-8730, a phone number where one can talk to the medical receptionist for the facility. The appropriate address is 831 Kings Highway 100, West Deptford, NJ 08096, United States. This information is important as part of navigating the institution for medical services.

Hazards

The Atlantic City has various power lines that must be considered when planning for the flight. When flying, the UAS must be controlled in that it treats power lines like imaginary walls. This means there is a consideration jot to fly under the lines and keep a distance away from the horizontal and vertical perspectives (Cox, 2021). Due to the drone system used in UAS, it is possible to enable a power line detection system for determining precise locations for safe navigation.

It is important to consider towers and billboards for safety purposes, especially when taking off and landing. These infrastructures are erected high above the ground, which means there must be careful consideration not to tamper with the buildings and structures. By applying visual flight rules (VFRs), the controller of the UAS must ensure the weather is suitable as per the visual meteorological conditions (VMC) (Cox, 2021). If the weather is per the rules, it is easy to control the aircraft using instrument flight rules and aircraft traffic control. Since some parts of Atlantic city are congested, when the aircraft is moving at a lower altitude should be monitored not to get to the zone where towers and masts are high above the ground. That is part of preflight planning that is effective in minimizing hazards.

Bird-strike events are rare when flying, but there are strategies for preventing possible collisions. It is important to note the bird activities in particular areas as one way of avoiding these collisions. For the urban areas, the FAA plan is to adhere to Urban Air Mobility (UAM) as safe and effective aviation that uses automated systems to check urban areas where there might be busy events (Echeveste et al., 2021). The urban points need high altitude and low speed to prevent possible hazards. Terrain-following radar will be used to enable the UAS to flow at low altitudes such as 100 feet. For high elevation points, the plan includes a system integration that shall enable the aircraft system to automatically increase the flying altitude to enable the swift transition of the flight.

Air traffic management will require a data exchange that supports the flight framework, enabling visual lines and drone operations at low altitudes such as 400 feet above sea level. The UAS shall rely on data protocols configured by the integrated system using microservices aviation services for easily deploying and independent in regulating the commands (Hashemi & Botez, 2022). Environmental factors shall observe how the emission of gases shall be controlled. The plan is to apply new technologies in setting efficient flight paths to avoid delays. Additionally, lower-carbon alterative fuels ares a preferred plan for this case. Security and access concerns will be implemented by having a surveillance team while the aircraft is moving and also designing a receiving point that shall monitor the accessibility of the plane (Ku~elka & Surový, 2018). General traffic will be manned by checking the flow of busy highways alongside the airports.

Part 107 Regulations

According to the FAA, there is a requirement that for UAS, the drones should be at least 55 pounds. The aircraft will be under 14 CFR Part 107, and in this, it is planned that the aircraft shall be 120 lb. The aircraft requires a beyond visual line of sight drone (BVLOS) technology since it requires fewer take-offs and landings; hence, cost-effective (Fang et al., 2018). For UAS aircraft, there is no need to maintain sustained flight over nonparticipants unless the person is operating a stationary object. There will be obtaining of airworthiness certificate under part 21 to operate over nonparticipants. The aircraft shall use high visibility strobe lights for flying at night, whereby the lights be visible at least three statute miles (Ku~elka & Surový, 2018). The lights should frequently flash so that no collisions are possible.

The drones shall be on the IFR flight plan to avoid conflict with the approach with manned aircraft, which is allowed in the airports vicinity. The maximum speed allowed for the UAS is 100 mph or 87 knots. There is a need to have FAA certification under Section 349 of the rules. The same concepts apply to the altitude above 400 feet above the ground. The aircraft shall operate under Class E airspace as depicted in the previous sections. To have more than one aircraft at a time, the plan is to have approval from FP&M as the FAA expands in the future (Hashemi & Botez, 2022). Operation from a moving vehicle shall require a merging letter of approval from FAA on FTR rules on aircraft. For population density, the drone must satisfy R 2531 rule that allows operation in such perspectives. The same regulation is followed for hazardous material on board (Reichmann, 2021). For foreign-registered aircraft, it must meet FACE licensing from the transportation department.

Crew Resource Management

The pilot must have a certificate after passing the FAA part 107 test and exams that require one to be able to read and write and also understand English and be mentally and physically fit. The pilot must satisfy medical certifications on that part, which means they should not have infectious diseases or allergies that can disrupt normal operations (Echeveste et al., 2021). The pilot must be a visual observer who can predict the extent to which a line is affected and be able to call for reinforcement if required (Alsadik & Remondino, 2020). Additionally, the personnel should be trained in dealing with emergencies such as shortness of breath and other health complications.

Conclusion

Planning for the UAS-based flight requires prior planning on weather, hazard, crew management among other factors. When planning, there must be consideration of FAA regulations and also the Part 107 rules. The US has improved technology for guiding pilots who are controlling the unmanned aircrafts which has helped in navigating the airline systems. There is need to have a comprehensive plan that covers all the requirements as per FAA.

References

Alsadik, B., & Remondino, F. (2020). Flight planning for LiDAR-Based UAS mapping applications. ISPRS International Journal of Geo-Information, 9(6), 378. Web.

Cox, J. (2021). How hot is too hot for airliners to take off? How often do planes overfly hurricanes? Usatoday.com. Web.

Echeveste, D., Lee, A., & Clark, N. (2021). Using spatial uncertainty to dynamically determine UAS flight paths. Journal Of Intelligent & Robotic Systems, 101(4), 3-5. Web.

Fang, S., OYoung, S., & Rolland, L. (2018). Development of Small UAS beyond-visual-line-of-sight (BVLOS) flight operations: System requirements and procedures. Drones, 2(2), 13. Web.

Hashemi, S., & Botez, R. (2022). Lyapunov-based robust adaptive configuration of the UAS-S4 flight dynamics fuzzy controller. The Aeronautical Journal, 5(7), 1-23. Web.

Ku~elka, K., & Surový, P. (2018). Mapping forest structure Using UAS inside flight capabilities. Sensors, 18(7), 2245. Web.

Reichmann, K. (2021). 5 Airports selected by FAA for countering unmanned aircraft systems  Aviation Today. Aviation Today. Web.

Cloud Computing and Data Security Solution

Cloud computing is crucial in our new connected society and it is particularly relevant today since it offers many opportunities to enterprises (School, Hospital, Institutions). At the same time, cloud computing also has certain issues, and one of the primary ones is data security and integrity. The issue of data security is a challenge for IT, because it calls for integrity and protection of data, including personal and industrial data.

Many solutions for dealing with the outlined issues exist  they can make cloud computing safer and protect data. The first potential strategy relies on layered security, which implies that several security measures are taken to protect the most vulnerable parts of any system (Tariq et al., 2022). Next, data encryption and homomorphic encryption, in particular, is a way to use data without decrypting it. As a result, the information stored and shared by individuals is less susceptible to privacy breaches. The third option is data splitting  the process of dividing data into several parts and distributing them into different storing locations (Kumara et al., 2018). While it is commonly used in machine learning, data splitting can be helpful in data protection in the cloud because it results in smaller pieces of data being stored in many places.

Data has to be protected in case of a breach as well, and its loss is another significant problem. Here, backup services and data integrity protection become potential solutions  they guarantee that data can always be accessed by its owners regardless of whether it was compromised. To ensure that only authorized users get access to data, one can implement precomputed tokens (Sibai et al., 2020). These devices can be digital and physical and are responsible for user authentication. However, the whole system can be protected in a top-down way using privacy architecture (Tariq et al., 2022). This solution incorporates protection methods for data sharing, data collection, and data categorization. Finally, another interesting approach to data security and cloud computing is the use of a virtual machine. It is a type of software that emulates the functions of a computer, allowing one to work in a fully-functional environment while not sharing its physical security risks.

In the next work, solutions will be discussed and explained. Even though cloud computing presents multiple advantages, it also shows some flaws in data security and protection personal information in many forms.

References

Kumara, R., Rajb, H., &, Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691697.

Sibai, R., Gemayel, N., Abdo, J., & Demerjian, J. (2020). A survey on access control mechanisms for cloud computing. Transactions on Emerging Telecommunications Technologies, 31(2), 113.

Tariq, M., Balas, V., &, Tayyaba, S. (2022). Security and privacy trends in cloud computing and big data. CRC Press.

Cloud Computing: Components, Services, and Developments

Cloud Computing Fundamentals

Common IT Resources of Cloud Computing

Cloud computing allows its users to access computing resources housed in a distant data centre administered by an internet-based cloud services provider. These resources include applications, servers (physical and virtual), storage systems, development platforms, and network connectivity (Vennam, 2022). Although the types of the services vary, each cloud separates, collects, and distributes dynamic computing resources. Each cloud is built with a distinct set of technologies, usually comprising an operating system, management software, and application programming interfaces. Finally, apart from specialized cloud computing software, some devices (such as computers or even mobile phones) or applications that need to operate information are required.

Components within Cloud Computing

A cloud computing system is made up of several components. The client network is a front-end element that offers a graphical user interface; it facilitates user interaction with the cloud. The program might be any application or software that the customer wishes to use. The service component controls the services one may access based on the individual requirements. The dynamic cloud provides the operation and programming environment for virtual machines. Cloud structure consists of hardware and software elements such as servers, data, network equipment, and virtual servers to support the cloud computing architecture. Finally, storerooms, administration, security, and the internet are all part of the cloud system.

Concepts of Virtualisation

Virtualization technology may also be incorporated into any type of cloud for enhanced capabilities or better efficiency. The primary function of virtualization is dividing a single server into numerous servers (Peterson, 2020). After dividing the physical server, each virtual server operates as a dedicated device and may execute an application software separately. Network virtualization is a means of integrating available network resources by dividing network capacity into separate channels. Storage virtualization consolidates physical storage from several network storage systems into a single resource administered from a specific platform. Server virtualization aims to promote resource sharing while reducing computational costs and use complexity.

Cloud Delivery and Deployment Models

Cloud Services

There are three most prevalent cloud service types, and it is not usual for a company to employ all of them. Cloud services are architecture, systems, or software maintained by third parties and made accessible to consumers over the internet. First, Infrastructure as a service is a virtual cloud service platform that enables enterprises to obtain IT infrastructure from a hosting company, such as servers, storage, networks, and operating systems. Second, Platform as a service is a cloud architecture constructed on Infrastructure as a service that includes tools for developing user-level software and processes (Peterson, 2020). Finally, Software as a service is a method of delivering software programs via the internet per customers request and usually by the membership.

Public, Community, Private, and Hybrid Clouds

The other important distinction between the clouds is public, community, private, and hybrid clouds. Public clouds are virtual systems that are often built using IT infrastructure that is not controlled by the end customer. When settings are divided and transferred to numerous tenants, all platforms become public. In contrast, a community cloud model is a distributed cloud computing service that is intended for a small number of enterprises or people. Next, a private cloud is a set of computer resources that are solely dedicated to a business. It might be permanently placed on-site at a firms data centre or managed by a hosting company. By providing enterprises with specialized resources, a private cloud offers a better level of protection and confidentiality than public clouds. Finally, hybrid clouds are a blend of private and public clouds linked together by a platform that lets data and applications collaborate. Hence, valuable systems and products can be stored in a secure private cloud, while publicly accessible network services and consumer interfaces can be stored in the public cloud.

A Cloud Strategy for AMG Developments

Cloud Computing Security and Management Issues

AMG Developments obviously has problems with the security and management of their data. The current server in the company has little storage space; moreover, crucial files have also been lost. These issues might lead to data breaches; apart from security and management disturbances, there are few opportunities and conveniences for collaboration. Fortunately, cloud hosting provides protected infrastructure, which increases security. Furthermore, cloud providers supply several security procedures and technologies to assist in the development of safe applications. Moreover, the memory capacities of the clouds are more than these of services. Finally, most types of clouds allow users to transfer the files into the cloud rather than sending them multiple types through e-mails.

Closed and Open Source Cloud Vendors

There are two kinds of clouds to consider: open-source clouds or closed clouds. Mainly all computer program is developed in the code base, which is the technical architecture that instructs a program on how to operate. The public does not have permission for closed software packages (also described as proprietary technology). The software program for open source software is freely accessible to anybody who requests it, and developers can view or edit it as they see fit. Hence, a firm leasing cloud software from vendors may even be able to contribute to feature development depending on how it is used from within.

Utilization of Cloud Services within AMG Developments

AMG Development can employ a strategy for implementing cloud computing that will satisfy the needs of the employees and directors. The primary resources that the company should concentrate on are security, management, storage function and maintenance, and network connectivity. Concerning the cloud services, it is necessary to employ the three accessible ones, namely Infrastructure as a service, Platform as a service, and Software as a service, to allow the cloud to work correctly. As for the type of cloud, hybrid clouds are the go-to solution since any activity may be stored anywhere for high demands and predictable use. Moreover, users and administrators may limit data vulnerability by moving processes and data between platforms based on conformity, assessment, regulatory, or security needs using hybrid cloud security, which combines the best characteristics of each environment. Finally, it is better to use open-source cloud vendors because the company primarily needs a secure and stable network than can be edited by the users of other similar companies.

Initial Costings and Recommendations

Teams who use cloud services do not need to buy their own equipment. Aside from hardware expenses, cloud providers seek to maximize and improve hardware utilization. As a result, hardware and computing power become commodities, and cloud service providers strive to produce the lowest price. As for particular recommendations, Red Hats open hybrid cloud model, backed by open source technology, provides a consistent platform for every cloud deployment, including hybrid (Types of cloud computing, 2018). The company provides the mobility required to be successful in any cloud by a standard common operating system that runs reliably and resources to help businesses manage and organize everything.

Reference List

Peterson, R. (2020) Cloud computing architecture and components.

Types of cloud computing. (2018)

Vennam, S. (2020) What is cloud computing?

Cryptographic Attacks and Defenses

Introduction

Storage, transmission, and transformation of information are subjected to various attacks. Adversaries, opponents, interceptors, and enemies are all vulnerable to attacks. The primary security violations are disclosure of information values, loss of confidentiality, modification without authorization, or illegal loss of access to those assets. A passive attack is an action in which the adversary has no ability to modify transmitted messages. Under a passive attack, it is only possible to intercept sent messages, decrypt them and analyze the traffic (Kumar et al., 2018). The opponent can change transmitted messages in an active attack and even contribute his own messages. Thus, it is advisable to research cryptographic attacks and defenses against them.

The Types of Cryptographic Attacks

Cryptanalysis of any cipher is impossible without considering the characteristics of the text messages to be encoded. The simple features of texts used in cryptanalysis are the repetition of letters, pairs of words and n-grams, the combination of numbers of letters, the alternation of vowels and consonants, and some others. Such properties are studied based on observations of rather considerable length texts. The cryptographic attacks can be categorized according to the amount and type of data available for cryptanalysis by the adversary. Accordingly, it is possible to distinguish such attacks as an encrypted-text-based approach. It occurs when the adversary has ciphertexts of different unknown open texts encrypted with the same key. The task of the cryptanalyst is to obtain the open text of more messages or accept the key used in the encryption (Zimba et al., 2020). The received code will then be applied to decrypt other messages.

In addition, the cryptographic attack is based on a known public text. It is performed when the cryptanalyst acquires some unencrypted code appropriate to the previously transmitted encrypted messages. By comparing the text-crypto text pairs, the opponent attempts to discover the secret key to use to decrypt all subsequent messages (Zimba et al., 2020). It may be quite challenging for an adversary to gain possession of multiple text-ciphertext pairs.

In fact, obtaining such pieces of open and cipher text is almost certainly possible. The cryptanalyst can have details about the format of the encrypted file, for example, knowing that it is a JPEG image file or a Word or Excel document; they all contain specific standard headers or fragments. Thus, the expert in cryptanalysis will be capable of generating the essential data for an attack based on the known exposed text. An attack based on the selected exposed text is a possibility even more serious option for the transmitting parties (Kumar et al., 2018). In this case, the cryptanalyst is enabled to use the text-cryptotext pairs provided to him and form the texts he needs himself and encrypt them with the specific key he intends to detect.

Defense Against Attacks

For a long time, developers of cryptosystems attempted to ensure that their encryption algorithms were invulnerable to ciphertext attacks only and to provide an organizational impossibility of attacks on the open or selected text. In order to achieve it, they maintained secrecy about encryption algorithms and encryption machine devices and thoroughly tested the reliability of personnel who had access to cryptosystems. However, already in the XIX century, experts in the field of cryptography suggested that the secrecy of encryption algorithms is not a guarantee against hacking (Lou et al., 2021). Moreover, it was realized that a truly reliable encryption system should remain secure even if an opponent fully recognizes the cryptographic algorithm.

The privacy of the code should be adequate to maintain the worthy cipher resistant to attacks. This fundamental principle was first formulated in 1883 by Kerckhoffs and is commonly known as the Kerckhoffs method; it is a rule of cryptographic system design (Lou et al., 2021). The encryption code key is contained in a classified form, and the other parameters of the encryption system can be disclosed without reducing the algorithms strength. Otherwise, it is reasonable to assume that the adversary knows everything about the encryption system in use except the applicable keys when assessing encryption security. The Kerckhoffs principle focuses on establishing the security of algorithms and protocols independently of their secrecy; openness cannot affect safety (Lou et al., 2021). The majority of widely used encryption systems, according to the Kerckhoff approach, use known, non-secret cryptographic procedures.

In modern cryptography, considerable attention is devoted to developing cryptographic protocols, that is, procedures or algorithms for the interaction of subscribers using cryptographic means. The protocol is based on several rules governing the implementation of cryptographic transformations. The protocols may include confidential messaging reports, authentication and identification protocols, key distribution protocols, and electronic digital signature protocols (Lou et al., 2021). Currently, many specialists have comprehensively studied the encryption algorithms being created and evaluated according to various indicators, including the ability to withstand attacks on the selected text.

Conclusion

Hence, while attacking an encryption algorithm, the adversary usually has two primary goals, searching for the secret code or discovering the open text that meets the encryption code. Most cryptographic systems depend on warning as the only way to protect themselves. Cryptography saves people from fraud, which is why defense should never be limited. A strong system also attempts to identify evidence of malicious activity and restrict the effect of any attacks. Accordingly, it is essential to detect such an attack and then limit it to be assured that the damage caused will be minimized.

References

Kumar, S., Kumar, M., Budhiraja, R., Das, M. K., & Singh, S. (2018). A cryptographic model for better information security. Journal of Information Security and Applications, 43, 123-138.

Lou, X., Zhang, T., Jiang, J., & Zhang, Y. (2021). A survey of microarchitectural side-channel vulnerabilities, attacks, and defenses in cryptography. ACM Computing Surveys, 54(6), 1-37.

Zimba, A., Wang, Z., Mulenga, M., & Odongo, N. H. (2020). Crypto mining attacks in information systems: An emerging threat to cyber security. Journal of Computer Information Systems, 60(4), 297-308.

A Network Schedule for Montview Stadium Project

Case Summary

The G&E Company is considering the construction of a baseball stadium in Montview for the 2024 season as part of its plans. Because of this, the April 3rd deadline is highly crucial and will play a significant role in the planning and decision-making process for the project proposal. If G&Es offer is granted, it might provide future projects with classic ball pieces in modern luxury boxes, which gives G&Es president Percival Young great hope for his company. Ultimately, it will be determined whether or not Youngs company can achieve the projects needs while still making a profit. This paper will analyze the exploration that uses a network schedule, especially the critical path.

Project Completion

The building of the baseball stadium is set to begin on July 1, 2020, and is expected to be completed by May 6, 2024. This will follow the successful completion of all final inspections, provided that holidays and holiday observances are factored into the projects timeframe. The completion date is quite far from the target deadline of April 3. The number of days that will be necessary for this project is 975 days; nevertheless, when the holidays and holiday observations are taken into account, the overall length of the project, except for weekends, will be 1,004 days; this symbolizes an average of 29 days or nearly a month past the April 3 deadline.

Critical Path for the Project and the List of Activities

The path in any network schedule with the least spare time is considered to be the critical path of that schedule, which is defined as the allowable amount of time delay that will not influence the project finish date. This is according to the definition provided in the text (Larson & Gray, 2021). Before the beginning of a project, the project manager needs to ensure that the critical path has been identified. This allows the PM to adapt the resources and schedule allotted to tasks that are not on the critical path if there are delays along the critical path (Lee, 2019). According to Lucko, Su, and Thompson (2021), the possible explanation for why delays in this critical path can be so disadvantageous is because of a massive impact that proves an addictive nature of deviations along sequential paths. This means that delays within timelines with correlations will only be multiplied through the sequence of dependent tasks. This explains why delays in this critical path could be so disadvantageous.

Within this project proposal bid, the activities that are on the critical path are as follows: clear stadium site, destroy current stadium, create construction site, push assistance piling, configure lower bowl, build upper steel bowl, implement seats, construct steel canopy, build roof racks, and eventually deploy roof supports, before concluding with the final inspection. All of these activities have the potential to go behind schedule, which would add even more time to the total amount of time that will be needed to finish the work.

Recommendation for G & E to Pursue the Contract

According to the timeline prepared in the network timetable, it is unlikely that this project will be able to fulfill the target deadline of April 3. Given that there is a clause in the contract that stipulates a penalty of one hundred thousand dollars for every day that the project is late, G&E can expect this to be a costly undertaking unless they can modify their timeline or the tasks that are associated with the project. Because of the delay of 29 days, the company will be required to pay a fine of $2.9 million for this project. This means that the initially anticipated profit of $3 million, which the project was expected to make, will now be reduced to being a project that breaks even. This is the ideal situation, where everything goes exactly according to plan.

On the other hand, there is no way of knowing how many further delays and fines could develop before the projects official completion if there are any delays or unforeseen problems, especially in the crucial path. This is due to the fact that there is no way to know in advance what issues might develop. This is especially important to keep in mind when working along the vital path. It is very common for construction projects to experience delays in comparison to the timetables they had originally planned. (Lucko et al., 2021).

There is a potential for some unanticipated delays to occur due to certain probable risks that could occur within the scope of the project. A risk response matrix, demonstrated by Gray and Larson (2021), was used to gather a few potential dangers that could be associated with this project. Certain aspects require more attention than others because of their potential impact on the critical route. One example of this is the potential for a delay to occur if there are sufficient grounds for objecting to the location of the newly planned stadium. When it comes to the specific day that demolition and building are scheduled to begin, this is currently an issue that cannot be predicted and is unpredictable and could develop.

G&E should not undertake this project because the deadline has already been pushed back from the anticipated timetable. As described in the risk response matrix, several potential hazards have not been accounted for (Meredith et al., 2017). An unacceptable level of negative risk is involved, at least when considering the current strategy. If G&E truly wanted to recognize the bid still, they should review the plan, comprising any proactive float apportionments that were made to protect against possible delays (Su et al., 2020). They should also see if the plan can be amended to be completed nearer to the deadline while minimizing any expenses initially thought to be incurred to provide some wiggle room for meeting the April 3 deadline.

References

Larson, E. W., & Gray, C. F. (2021). Project management: The managerial process (8th ed.). New York, NY: McGraw-Hill

Lee, S. (2019) Optimizing the technology transfer process using Gantt charts and critical path analysis flow diagrams: A case study of the Korean automobile industry. Processes, 7(12). 1-27. Web.

Lucko, G., Su, Y., & Thompson Jr., R.C. (2021) Theoretical quantification of ripple effect of delays in network schedules via activity cruciality. Automation in Construction, 129. 1- 15. Web.

Meredith, J. R., Shafer, S. M., & Mantel Jr, S. J. (2017). Project management: a strategic managerial approach. John Wiley & Sons.

Su, Y., Lucko, G., & Thompson Jr., R.C. (2020). Apportioning contract float with voting methods to correlated activities in network schedules to protect construction projects from delays. Automation in Construction, 118. 1-16. Web.

Dating Sites as an Investigative Tool

Introduction

In the age of technology dating websites allow people to search for partners who fit ones preferences. To find their perfect match, the users provide a lot of information about their interests, hobbies, life goals, place of residence, education, and many other personal details. However, all this data available on dating sites can also serve as a source of information for investigation when detectives need to learn more about a suspect or other people involved in the case.

Dating Sites Peculiarities that May Facilitate Investigation

The first distinctive feature of dating sites that makes them a valuable source of information is the authenticity of accounts. Most popular websites and apps for dating demand that their users provide only real information about themselves. For instance, Tinders, Grindrs, and HERs community guidelines prohibit the use of nicknames or impersonations of other people. Therefore, if investigators know the suspects name or additional information about them, the chance to find their account on a dating site is higher than on other social media.

Moreover, the profile pictures quality, which is very important for finding a partner, can also help in investigating. Firstly, it should be authentic, just like other information published in a profile. Secondly, it should not be blurred and should clearly show the users face. These rules are set in Tinders, Grindrs, and HERs community guidelines as well. Thus, these pictures may help identify the criminal by showing them to witnesses or comparing them to the composite sketch.

Another feature of many dating apps is the location-based search for a partner. It is used in such apps as Tinder and Grindr (Tinder, About Tinder, para. 4; Grindr, About, para. 2). While generally, it is utilized to meet local people while traveling or find someone in ones local area, this feature may also be useful for detectives to trace the suspects movements and track them down.

Psychological Portrait of Dating Sites Users

Investigators may also observe the way people involved in the case present themselves on dating apps. Firstly, the choice of an app may be important and informative in some cases, as different apps have different target audiences. While Tinder is all-inclusive, Grindr and HER have a narrower target audience and are designed for LGBTQ+ people (Tinder, About Tinder, para. 11; Grindr, About, para. 2; HER, About us, para. 1). Another thing is that even basic information in personal profiles may contribute to understanding the users personality. For example, García-Gómez (2020) studied Tinder and Grindrs male users profiles identifying their attitudes towards masculinity and femininity that may affect their social and sexual behavior. Licoppes study (2019) also involved Tinder and Grindr users, but it had a wider scope and covered a broader range of topics, including attitudes toward gender roles and major interactive patterns. Hook (2020) focused on Tinder users and also highlighted the wide range of information one can identify by examining their profiles. In brief, dating websites can be used for making a persons psychological portrait, which might not be solid proof of their innocence or guilt but can give detectives valuable clues.

Conclusion

In conclusion, dating sites comprise a lot of information about their users that can be useful for detectives and investigators. Firstly, the guidelines of three popular dating apps, Tinder, Grindr, and HER, state that all the information provided by the users, including photos, should be authentic, which facilitates the search for information about suspects. Secondly, dating sites often use location-based search technologies, which may be useful for tracking the suspects movements. Finally, the way people present themselves and communicate on such websites can say a lot to psychologists who would build their psychological portraits.

References

García-Gómez, A. (2020). Discursive representation of masculinity and femininity in Tinder and Grindr: Hegemonic masculinity, feminine devaluation and femmephobia. Discourse & Society, 31(4), 390410. Web.

Grindr. (n.d.). About. Web.

Grindr. (n.d.). Community guidelines. Web.

HER. (n.d.). About us. Web.

HER. (n.d.). Community guidelines. Web.

Hook, C. (2020). Swiping right: Using Tinder as a way to explore identity performances. Communication Teacher, 35(1), 4954. Web.

Licoppe, C. (2019). Liquidity and attachment in the mobile hookup culture. A comparative study of contrasted interactional patterns in the main uses of Grindr and Tinder. Journal of Cultural Economy, 13(1), 73-90. Web.

Tinder. (n.d.). About Tinder. Web.

Tinder. (n.d.). Community guidelines. Web.

Big Data: All the Data People Create

People continue to generate remarkable amounts of data at an accelerating rate. The umbrella term for all the data people create is called Big Data. Despite some of its disadvantages, Big Data should be considered a blessing because it provides researchers with sufficient knowledge and allows them to make precise conclusions. It is especially true for clinical workers, who utilize the numerous tools associated with Big Data daily.

Fortunately, I do not have negative experience with the usage of Big Data. Moreover, it is undeniable that a broad application of the technology in various spheres can lead to multiple positive outcomes. For example, Mehta et al. (2018), with reference to McKinsey Global Institute, say that the usage of Big Data can decrease the US healthcare expenditure by 8%. Thus, the government can allocate these funds to provide other forms of social security.

However, there are also some disadvantages to the usage of Big Data. A problem that concerns me is the probability of a mistake. As the amounts of data increase, medical staff has to rely on computer systems quite often, which may cause them to miss some details, eventually leading to a medical error. Dash et al. (2019) mention that the medical sphere does not adapt to digitalization as quickly as other industries. These problems can be eventually resolved, but they present a real risk to patients right now.

Some strategies can help address the issues related to Big Data. Dash et al. (2019) propose a positive idea that Big Data usage and further digitalization of medicine are likely to reduce medical errors and improve the quality and efficiency of medical service. In another work, Mehta et al. (2018) state that the usage of cloud computing can significantly simplify Big Data analysis. I agree with this point and think it is a good strategy to handle the Big Data problems.

It is crucial to learn how to utilize the large volumes of data. Big Data can substantially enhance living standards across the globe, as it provides medical staff and researchers with essential information and statistics and brings positive consequences. However, the risks and challenges that Big Data presents should be evaluated accordingly. Technologies become more accurate and efficient yearly; therefore, most of the issues can be addressed in a due manner.

References

Dash, S., Shakyawar, S. K., Sharma, M., & Kaushik, S. (2019). Big Data in healthcare: management, analysis and future prospects. Journal of Big Data, 6(1), 1-25.

Mehta, N., & Pandit, A. (2018). Concurrence of big data analytics and healthcare: A systematic review. International Journal of Medical Informatics, 114, 57-65. Web.

Technological Progress: Dangers and Negative Effects

Introduction

Modern people live in an era of a technological revolution; new inventions appear almost every day. However, the pace of technological progress significantly accelerates the development of the negative aspects of technology. Such negative changes include global warming, pollution of the planet, and the danger of technology being used for malicious purposes. The modern world must understand that production should become environmentally friendly, and inventions should benefit society.

Personal Design for the Dump Story

The Design for the Dump problem is familiar to everyone who uses modern technology daily, and I am no exception. It seems to me that this phenomenon is mainly associated with smartphones due to their widespread popularity. A modern person cannot live without a mobile phone; therefore, as soon as it breaks down or starts to work worse, there is an urgent need to buy a new one. Apple is now considered the leading manufacturer, but, unfortunately, its products rarely work longer than three years. Even if the phone works longer, it becomes obsolete; the software stops coming out. I also faced such a situation: my phone stopped working as efficiently as it should after a short time from the moment of purchase. Advertising campaigns, fragility, and obsolescence of functions force buyers, including me, to constantly think about buying a new device.

From my point of view, a great solution to the Design for the Dump problem is to make manufacturers responsible for recycling their products. All the gadgets that are not working due to manufacturers fault should flood not developing countries but the companies warehouses. In that case, they will think more about environmentally friendly production (The Story of Stuff Project 00:05:20-00:06:20). Of course, it also requires a change in consumer mindset so that people do not abandon working appliances to buy newer models pursuing fashion.

Statement Analysis

I absolutely agree with Michio Kaku regarding the dangers of technology. Michio Kaku lists three main threats that humanity may face: creating viruses as weapons, nuclear war, and global warming (Big Think 00:00:00-00:04:50). The current availability of the genetic codes of deadly viruses of the past, and the escalating situation in the world, may lead countries to start using uncontrolled and destructive biological weapons. Advanced developments can fall into the wrong hands and lead to unpredictable consequences for all of humanity. The availability and cost of uranium enrichment equipment could make it possible for almost anyone to assemble a nuclear bomb. Global warming is already negatively affecting our planet, and in the future, it may lead to the flooding of many cities and states due to the melting of glaciers. All these threats are pretty accurate and require attention from the entire world community. The continuation of the unstoppable pace of technological development and the availability of innovations can put humanity in danger of extinction.

Potential Technologies to Create

Thinking about creating new technology, I would like it to be useful for people and environmentally friendly. I would like to see scientists creating innovation in the field of medicine and health care in the near future. Creating a small and high-tech apparatus for the rapid diagnosis of the most widespread diseases would benefit society. If such technology were available to all people, it would simplify the diagnosis and speed up the start of treatment with an increased chance of a successful outcome. Such a device could be placed in a fitness bracelet; an analyzer could screen for major diseases through painless blood sampling. The therapist would not waste time issuing referrals for tests; they would already be stored on the patients smartphone. This device would be helpful for people of all ages, helping to determine in time, for example, diabetes, anemia, or even the risk of developing cancer.

I would also like the emergence of new technologies that can make life easier for people with chronic diseases. For example, creating a full-fledged exoskeleton will allow people with disabilities to move freely, even if their limbs do not function properly. A good invention would be a device that helps people take the necessary medicines in a timely manner. Such a device could conclude the state of health and the necessary drugs, as well as deliver them directly to the circulatory system. Such a device would allow people with chronic diseases to live entire lives and not worry about taking medication at a particular time. The innovation would help forgetful people who find it difficult to take their medications at set times. Of course, I would like these technologies to be affordable and not cost too much.

Conclusion

The modern world cannot be imagined without technologies that have firmly entered the daily lives of people. However, both producers and consumers should remember that people do not have a spare planet and try to minimize the negative effect that is created due to technological progress. Only the judicious use of technological advances will allow people to progress truly. It is time to come to environmentally friendly production and conscious consumption so that technologies do not harm people and the planet but benefit them.

Works Cited

Michio Kaku: The Dark Side of Technology. YouTube, uploaded by Big Think, 2012. (865) Michio Kaku: The Dark Side of Technology | Big Think  YouTube

The Story of Electronics. YouTube, uploaded by The Story of Stuff Project, 2010. (865) The Story of Electronics  YouTube

Metaverse Spatial Design Analysis

Metaverse is a 3D-virtual universe that has been decentralized to focus on social media connections. It is a collective open space that allows the physical world to exist as a parallel realm. Currently, it is reshaping some organizations that operate e-commerce through its ability to influence online shoppers in various ways. eCommerce businesses have taken the advantage of using this kind of technology to achieve a higher market share (Xi et al., 2022). For instance, Shift Space Architecture Studio Metaverse and Zaha Hadid Architects Metaverse have incorporated this know-how to reap its benefits. It has the potential of creating enhanced customer satisfaction, greater brand engagement, and increase sales.

On Shift Space Architecture Studios online platform, there is a tool known as Shift/Space AR that was integrated since the inception of this new technology. Its value is facilitation to view the products that shoppers can observe landscapes in the environments of their own homes. The items displayed are sized and rendered to scale to allow the buyers to know the exact size. The specified tool has created multiple opportunities for rendering physical space in the VR context, thus, allowing viewers to envision the target setting and experience it fully (Kesselman & Esquivel, 2022). Similarly, the Zaha Hadid Architects Metaverse has incorporated 3D workspaces and VR meeting tools that contribute to a completely immersive experience and imply increased connectivity (Damar, 2021). The proposition is to create a virtual fitting room platform by acquiring Zeekit to improve its customer experience for online shoppers. In other words, Shift Space Architecture Studio has promised their clients to work on this metaverse technology to increase their satisfaction. As a result, the company has gained impressive traction among new audiences, increasing its customer base immensely.

This new method of displaying their products on social media platforms is being applied by e-commerce traders since it has proved to be an effective way of serving their customers. Amazon and Facebook have launched the services that make it possible and easy for shoppers to interact with the brand. The competitors will grow and succeed due to their competitive advantage: they are adopting the metaverse, agreeing to fit in the new system of technology (Xi et al., 2022). Google poll indicates that 66% of people want shopping assistance through Augmented Reality and that products with 3D content had a greater conversion rate than those without hence giving Shift Space Architecture Studio a good competitive advantage (Xi et al., 2022).

References

Damar, M. (2021). Metaverse shape of your life for future: A bibliometric snapshot. Journal of Metaverse, 1(1), 1-8.

Kesselman, M. A., & Esquivel, W. (2022). Technology on the move, consumer electronics show 2022: The evolving metaverse and much more. Library Hi Tech News, (ahead-of-print).

Xi, N., Chen, J., Gama, F., Riar, M., & Hamari, J. (2022). The challenges of entering the metaverse: An experiment on the effect of extended reality on workload. Information Systems Frontiers, 1-22.