Your contribution can guide someone’s learning journey. Share your
documents today.
Running head: ISSUE 2 PROVISIONING DESCRIPTION ISSUE 2 PROVISIONING DESCRIPTION Enter the name of the Student: Enter the name of the University: Author note:
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
1ISSUE 2 PROVISIONING DESCRIPTION Introduction The paper will describe the security technologies for meeting the requirements of securityalsodesigningforproposedenvironmentofcloudbasednetwork.Alsothe automated scanning and monitoring methods or the tools to use for cloud based environment also list all steps for implementing tools. Discussion Technologies of Security: Whenever this is came to the security in cloud-based environment, both the parties that is cloud service provider also consumer of services must confirm that they apply the measures of security hence as to avoid the attacks (Corbellini et al., 2018). This is the accountability of the service provider of cloud for confirming that the infrastructure is safe also the data and applications of client are secured. This is also the accountability of consumer that is Drotos Engineering to confirm that the applications are log on after user has authenticated. There are many security technologies present in the cloud-based environment which are as follows: Virtualization The virtualization is made of the virtual form of something such as the virtual network resources, virtual operating system, virtual server and many more (Hyun et al., 2018). The service providers of cloud are collected data from numerous clients also virtualization can confirm that any client cannot unintentionally view data of other client. Encryption
2ISSUE 2 PROVISIONING DESCRIPTION The encryption is the process of encoding any message so as the meaning is not assumed by the layman. The decryption is reversed any encrypted message to original form of it. Cloud service provider will use this encryption to confirm security of data and use the Attribute-based encryption (ABE). Data security Cloud service provider will confirm that data is safe also this is private, preserves integrity and available when required. Multi-factor authentication Cloud service provider will deliver multi-factor verification whereby users do not simply require to deliver a password however they also required to deliver any secret pin from the special device of hardware also it can see from the software application. Conclusion In the above stated report, the proper techniques of the newly proposed security technologies are discussed and how Drotos Engineering use these to design the cloud based network environment.
3ISSUE 2 PROVISIONING DESCRIPTION References Corbellini, S., Di Francia, E., Grassini, S., Iannucci, L., Lombardo, L., & Parvis, M. (2018). Cloud based sensor network for environmental monitoring.Measurement,118, 354- 361. Hyun, S., Kim, J., Kim, H., Jeong, J., Hares, S., Dunbar, L., & Farrel, A. (2018). Interface to network security functions for cloud-based security services.IEEE Communications Magazine,56(1), 171-178.