logo

Cloud Computing and Virtualization Technologies

   

Added on  2023-03-30

7 Pages1041 Words413 Views
 | 
 | 
 | 
Abstract
Week seven, provided in detailed on cloud computing and virtualization technologies.
One of the benefit which was highlighted is that the tow technologies saves on cost and human
capital. In addition, the paper recommended Amazon cloud providers as the best company which
is able to provide cloud computing services. In addition, the paper gave the reasons as to why an
organization needs to settle on Google as the best company that provides virtualization
technologies. In this week, this paper will focus on network infrastructure and security.
Specifically, the paper will have two sections; part one os a network infrastructure document and
part two is a security plan document.
Section one: Infrastructure document
The possible network infrastructure vulnerabilities
Network security is one of the most challenging item than it was several years ago.
Currently organizations are struggling to fight cyber-security due to the increasing number of
end-points in their network. In addition, there is an ever changing cyber-crime.
One of the most common network vulnerability is excessive access. Most of the organization
users are having an excessive access to more data than what they need. This usually has resulted
to integrity issues. USB thumb drives is another common network vulnerability. This is usually
as a result of the internal users using SUB drives which are infected
Vulnerability category Threat
In-put validation Cross-site scripting
Authentication Brute force type of attacks and replaying of
cookies
Cryptography Poor customization encryption
Cloud Computing and Virtualization Technologies_1

Remedy to the network vulnerabilities
Excessive data access is reflected in PCI requirement 7, this requires organizations to be
compliant to limit access according to the user needs. In addition, this limits access based on the
need to know. Also excessive access is usually caused by manual network security practices.
USB thumb drives can be prevented by changing the default autorun policies. Other network
vulnerabilities are as shown by the table below
Logical topological layout of the planned layout
The recommended topology in this case is Cisco SAFE logical topological. With this
type of topology an organization is able to achieve technical and business goals. The major
principle of this type of logical design is that it provides the very best practices for implementing
and designing a secure network. Cisco SAFE logical topology uses what is known as modular
approach. In addition, the topology takes what network engineers refer to as defense-in-depth
approach so as to allow flexibility and network troubleshooting. The logical topology will be
divided into three main areas which are; service provider edge, enterprise edge, and enterprise
campus. Service provider edge is used in this case, this functional area is used to represent WAN
and internet connection. The enterprise edge will specifically be used for remote connection. The
enterprise campus is required for independent operations within only one campus.
The logical topology is as shiwn by the figure below
Figure 1: Cisco SAFE logical design
Cloud Computing and Virtualization Technologies_2

Physical topological layout of the planned network
Cisco Logical design
Cloud Computing and Virtualization Technologies_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Design for Henry Books Company
|10
|2042
|445

Stuxnet: A Qualitative Risk Analysis and Enterprise Security Architecture
|15
|2730
|224

Data Centre Planning
|15
|3207
|73

IT INFRASTRUCTURE 15.
|15
|3240
|6

Cloud Risk Assessment: Risks and Mitigation Strategies for AWS Edge
|12
|3545
|301

Assignment On Data Communications And Networks
|6
|1517
|20