Cloud Technology Fundamental Report - Security Issues
VerifiedAdded on 2022/09/07
|6
|1228
|23
Report
AI Summary
This report delves into the fundamentals of cloud technology, examining diverse virtualization techniques such as application, desktop, hardware, network, and storage virtualization, along with the role of hypervisors in managing virtualized platforms. It then addresses critical security concerns within cloud environments, including Distributed Denial of Service (DDoS) attacks, employee negligence, data loss, and system vulnerabilities. The report outlines mitigation strategies for each security issue, such as cloud-based protection services for DDoS, strong password policies and restricted software usage to prevent employee negligence, data encryption and encapsulation for data loss, and deploying the latest system patches for system vulnerabilities. The report includes references to academic sources to support the discussed concepts and recommendations. This report is a valuable resource for understanding cloud technology and its associated security challenges and solutions.

Running head: CLOUD TECHNOLOGY FUNDAMENTAL
Cloud Technology fundamental
Enter: Name of the Student
Enter: Name of the University
Enter: Author Note
Cloud Technology fundamental
Enter: Name of the Student
Enter: Name of the University
Enter: Author Note
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

1CLOUD TECHNOLOGY FUNDAMENTAL
2. Describe the different types of virtualization techniques and the role hypervisors play
in a visualized platform.
There are diverse categories of virtualization techniques which are increasingly in
cloud computing environments such as the followings:
Application virtualization: It is defined as the type of virtualization technique which
are completely virtualized in nature. This type of application are delivered from a server to
the device of the consumers such as the laptop, tablets, and smart phones. This virtualization
technique is very much beneficial for the consumers as it do not have to log in the computers
network, as a result of this consumers can get the access right from the device if there is an
active internet connection (Darabont, Kiss & Domokos, 2015). This type of virtualization
technique is increasingly used in business environments like Coca-Cola.
Desktop virtualization: It can be defined as the type of virtualization which functions
like the application virtualization. This type of virtualization is very much useful to separate
desktop environment from the physical device which are used by the consumers. The
configuration of this virtualization technique is based on virtual desktop infrastructure (VDI).
All the personal files of the consumers can be access using this technique. Most of the
personal applications of the consumers can be access using this virtualization (Liang, Yu &
Zhang, 2015). The cost of software licensing is very much on the higher side as well. Patch
management and the maintenance of this virtualization are very much simpler in nature and
most of the virtual desktops are hosted from the same location in this virtualization technique.
Most of the startup business organizations uses thus virtualization.
Hardware virtualization: It can be defined as the type of virtualization technique
which requires the assistance from the virtual machine manager which can also be termed as
the hypervisor. The virtual versions of the computer is created using the hypervisor, each of
2. Describe the different types of virtualization techniques and the role hypervisors play
in a visualized platform.
There are diverse categories of virtualization techniques which are increasingly in
cloud computing environments such as the followings:
Application virtualization: It is defined as the type of virtualization technique which
are completely virtualized in nature. This type of application are delivered from a server to
the device of the consumers such as the laptop, tablets, and smart phones. This virtualization
technique is very much beneficial for the consumers as it do not have to log in the computers
network, as a result of this consumers can get the access right from the device if there is an
active internet connection (Darabont, Kiss & Domokos, 2015). This type of virtualization
technique is increasingly used in business environments like Coca-Cola.
Desktop virtualization: It can be defined as the type of virtualization which functions
like the application virtualization. This type of virtualization is very much useful to separate
desktop environment from the physical device which are used by the consumers. The
configuration of this virtualization technique is based on virtual desktop infrastructure (VDI).
All the personal files of the consumers can be access using this technique. Most of the
personal applications of the consumers can be access using this virtualization (Liang, Yu &
Zhang, 2015). The cost of software licensing is very much on the higher side as well. Patch
management and the maintenance of this virtualization are very much simpler in nature and
most of the virtual desktops are hosted from the same location in this virtualization technique.
Most of the startup business organizations uses thus virtualization.
Hardware virtualization: It can be defined as the type of virtualization technique
which requires the assistance from the virtual machine manager which can also be termed as
the hypervisor. The virtual versions of the computer is created using the hypervisor, each of

2CLOUD TECHNOLOGY FUNDAMENTAL
the operations of this virtualization technique are done using the operating systems. Based on
this virtualization technique it can be said that diverse operating systems can be run using this
virtualization technique.
Network virtualization: Most of the physical networking equipment can be access
in the first place with the help of this virtualization technique. The available bandwidth can
be sub divided into multiple channels using this technique. The devices which are used in the
real time environment can be accessed using this virtualization technique. The network speed
can also be enhanced if this virtualization technique is deployed. The delivery service of the
business environment like IT industries can also be enhanced using this virtualization
technique.
Storage virtualization: It is one of the most cost effective virtualization technique
which are increasingly used in the commercial business environments. Most of the physical
hard drives which are used in a business can be complied in a single server using this
virtualization technique (Obasuyi & Sari, 2015). The diverse categories of cost of managing
multiple storage devices in warehouses can be reduced using this technique.
Role of hypervisors: Hypervisors is one of the most significant aspect which is
related with the concept of virtualization. It can be defined as the type of software which is
very much beneficial to decouple the virtual machines from the host. Hypervisor are very
much useful to allocate resources dynamically in virtual machines as per the requirement of
the consumers or the project.
the operations of this virtualization technique are done using the operating systems. Based on
this virtualization technique it can be said that diverse operating systems can be run using this
virtualization technique.
Network virtualization: Most of the physical networking equipment can be access
in the first place with the help of this virtualization technique. The available bandwidth can
be sub divided into multiple channels using this technique. The devices which are used in the
real time environment can be accessed using this virtualization technique. The network speed
can also be enhanced if this virtualization technique is deployed. The delivery service of the
business environment like IT industries can also be enhanced using this virtualization
technique.
Storage virtualization: It is one of the most cost effective virtualization technique
which are increasingly used in the commercial business environments. Most of the physical
hard drives which are used in a business can be complied in a single server using this
virtualization technique (Obasuyi & Sari, 2015). The diverse categories of cost of managing
multiple storage devices in warehouses can be reduced using this technique.
Role of hypervisors: Hypervisors is one of the most significant aspect which is
related with the concept of virtualization. It can be defined as the type of software which is
very much beneficial to decouple the virtual machines from the host. Hypervisor are very
much useful to allocate resources dynamically in virtual machines as per the requirement of
the consumers or the project.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

3CLOUD TECHNOLOGY FUNDAMENTAL
3. Explain the security issues around cloud and what can be done to mitigate the
major cloud security issues?
There are diverse categories of issues which are related with cloud such as the cyber
security threats, employee negligence and system vulnerabilities (Samarati et al., 2016).
There are mitigation techniques which are related with each of these security issues.
Distributed denial of service: The bandwidth of the target system is compromised in
this attack. The targeted system along with its traffic gets compromised in this attack
(Almorsy, Grundy & Müller, 2016). There are diverse categories of DDoS tools which are
increasingly used by the social engineers such as Hulk and Slowloris.
Mitigation: The use of the cloud based protection service is very much useful to deal
with the threat coming from DDoS.
Employee negligence: In this security concern, the employees of a commercial
business works in unethical manner. Safe working environment is disrupted using this
security threat.
Mitigation: The concern associated with employee negligence can be prevented or
restricted to a significant extent if there is a strong and long alphanumeric passwords for the
employee accounts. The use of any sort of unauthorized software must be restricted as well.
Data loss: It is one of the most significant security concern related with cloud
computing technology, this security concern can lead to sever business and reputational loss
in a business.
Mitigation: The practice of data encapsulation and data encryption are the two
primary mitigation steps related with this security issue.
3. Explain the security issues around cloud and what can be done to mitigate the
major cloud security issues?
There are diverse categories of issues which are related with cloud such as the cyber
security threats, employee negligence and system vulnerabilities (Samarati et al., 2016).
There are mitigation techniques which are related with each of these security issues.
Distributed denial of service: The bandwidth of the target system is compromised in
this attack. The targeted system along with its traffic gets compromised in this attack
(Almorsy, Grundy & Müller, 2016). There are diverse categories of DDoS tools which are
increasingly used by the social engineers such as Hulk and Slowloris.
Mitigation: The use of the cloud based protection service is very much useful to deal
with the threat coming from DDoS.
Employee negligence: In this security concern, the employees of a commercial
business works in unethical manner. Safe working environment is disrupted using this
security threat.
Mitigation: The concern associated with employee negligence can be prevented or
restricted to a significant extent if there is a strong and long alphanumeric passwords for the
employee accounts. The use of any sort of unauthorized software must be restricted as well.
Data loss: It is one of the most significant security concern related with cloud
computing technology, this security concern can lead to sever business and reputational loss
in a business.
Mitigation: The practice of data encapsulation and data encryption are the two
primary mitigation steps related with this security issue.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

4CLOUD TECHNOLOGY FUNDAMENTAL
System vulnerabilities: It is one of the most significant weakness for a business
organization which uses cloud server to maintain the integrity of the data. System application
tools are deployed by the social engineers to identify the system vulnerabilities.
Mitigation: Latest patches of the operating systems must be deployed in the computer
systems which access the cloud servers (Acharya & Pradhan, 2017). Egress filtering
procedure and multifactor authentication are the other risk mitigating procedure of system
vulnerability.
System vulnerabilities: It is one of the most significant weakness for a business
organization which uses cloud server to maintain the integrity of the data. System application
tools are deployed by the social engineers to identify the system vulnerabilities.
Mitigation: Latest patches of the operating systems must be deployed in the computer
systems which access the cloud servers (Acharya & Pradhan, 2017). Egress filtering
procedure and multifactor authentication are the other risk mitigating procedure of system
vulnerability.

5CLOUD TECHNOLOGY FUNDAMENTAL
Reference
Acharya, S., & Pradhan, N. (2017). DDoS Simulation and Hybrid DDoS Defense
Mechanism. International Journal of Computer Applications, 163(9).
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Darabont, Ö., Kiss, K. J., & Domokos, J. (2015). Performance analysis of remote desktop
virtualization based on Hyper-V versus remote desktop services. MACRo 2015, 1(1),
125-134.
Liang, C., Yu, F. R., & Zhang, X. (2015). Information-centric network function virtualization
over 5G mobile wireless networks. IEEE network, 29(3), 68-74.
Obasuyi, G. C., & Sari, A. (2015). Security challenges of virtualization hypervisors in
virtualized hardware environment. International Journal of Communications,
Network and System Sciences, 8(07), 260.
Samarati, P., di Vimercati, S. D. C., Murugesan, S., & Bojanova, I. (2016). Cloud security:
Issues and concerns. Encyclopedia on cloud computing, 1-14.
Reference
Acharya, S., & Pradhan, N. (2017). DDoS Simulation and Hybrid DDoS Defense
Mechanism. International Journal of Computer Applications, 163(9).
Almorsy, M., Grundy, J., & Müller, I. (2016). An analysis of the cloud computing security
problem. arXiv preprint arXiv:1609.01107.
Darabont, Ö., Kiss, K. J., & Domokos, J. (2015). Performance analysis of remote desktop
virtualization based on Hyper-V versus remote desktop services. MACRo 2015, 1(1),
125-134.
Liang, C., Yu, F. R., & Zhang, X. (2015). Information-centric network function virtualization
over 5G mobile wireless networks. IEEE network, 29(3), 68-74.
Obasuyi, G. C., & Sari, A. (2015). Security challenges of virtualization hypervisors in
virtualized hardware environment. International Journal of Communications,
Network and System Sciences, 8(07), 260.
Samarati, P., di Vimercati, S. D. C., Murugesan, S., & Bojanova, I. (2016). Cloud security:
Issues and concerns. Encyclopedia on cloud computing, 1-14.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





