logo

Cloud Computing - Assignment PDF

   

Added on  2021-06-17

11 Pages2222 Words133 Views
Running head: CLOUD COMPUTINGCloud ComputingName of the StudentName of the UniversityAuthor’s Note:

1CLOUD COMPUTINGTable of ContentsQuestion 3..................................................................................................................................2Question 4..................................................................................................................................6References..................................................................................................................................8

2CLOUD COMPUTINGQuestion 3Security Steps and Controls for Hybrid CloudRegional Gardens Ltd. is one of the most popular organizations that is running severalinter related gardening enterprises. They comprise of a larger display garden and it opens forthe purpose of several times in a year (Taddeo, 2013). This particular organization hasplanned to retain the data centre of Bathurst for storing their data. Regional Gardens Ltd thusrequires to move all of their infrastructures to the cloud. The web services are to be moved tothe cloud for providing an incremented level of High Availability. It would also provideflexibility to these services for data supply to all the employees and customers. The MicroServices model would be helpful in this case (Von Solms & Van Niekerk, 2013). They havedecided to move their data to the hybrid cloud. There are various risks that are related to this Micro services model and hybrid cloud.The most significant risks to this model and hybrid cloud are hijacking of accounts, databreaching, insider threats, malware injection, insecure application programming interface orAPI, denial of service attacks, abuse of cloud services and many more (Cavelty, 2014). All ofthese risks are required to be mitigated for the successful operation within the cloud. Thesemitigation strategies are mere security steps for the reduction of all these risks. The various information security steps and controls for the proper reduction of anytype of security risk to the hybrid cloud and Micro Services model are given below:i) Passwords: The first and the foremost security control that would be helpful for theRegional Gardens Ltd is incorporation of passwords (Wells et al., 2014). A password is anyword or specific string of various characters that is utilized for the purpose of userauthentication and hence proving the access approval for gaining access to the resources.

3CLOUD COMPUTINGPasswords would be extremely important and effective for the organization, since theauthenticity would be properly maintained. ii) Secured Browser: The second important security control for Regional Gardens Ltdis the secured browser. The browser that is being utilized by them should be secured (Anwar& Mahmood, 2014). Any type of safe and secured browser restricts or blocks the entry ofspam or virus to the organizational network and hence the hacker does not get the access tothe data. iii) Access Control: The third significant and important security control for theorganization of Regional Gardens Ltd is controlling of the access. This would stop the usersfrom entering into the cloud and thus the authenticity would be maintained. iv) Antivirus: This is the most basic security measure for any type of cloud. Antivirusis the typical software program that is utilized for preventing, detecting as well as removal ofmalware (Elmaghraby & Losavio, 2014). The computer viruses are easily detected with thehelp of this software program. Moreover, the Trojan horses are also removed by this softwareeasily and promptly. v) Popup Blocking: The next significant security measure is popup blocking. It is thespecific software that helps to block or restrict the popup windows and hence confidentialinformation could not be hacked as well as intruded. Hence phishing is easily stopped. vi) Encryption: Encryption is considered as one of the most effective security control.It helps to secure the data or information within any system (Dinh et al., 2013). It is thesignificant procedure of encoding the confidential text or message to a cipher text in themethod, which would only allow the receiver in accessing the text or message. This isconsidered as the most popular and efficient for Regional Gardens. This particular

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cloud Computing: Information Security, BCP, Resource Management, SLA Management
|20
|4947
|200

Cloud Computing: Selection of Cloud Architectures for a Hybrid Cloud and Risks Associated with Hybrid Cloud and Microservices Strategy
|21
|5740
|256

(PDF) Cloud computing basics
|21
|2970
|129

Cloud Computing for Regional Gardens: Benefits, Risks and Mitigation Strategies
|20
|4796
|398

Cloud Computing: Selection of Cloud Architectures for a Hybrid Cloud
|26
|7544
|430

Cloud Computing for Regional Gardens: Architecture, Risks, and Information Security
|18
|4038
|379