6NTCM003W: Network Security Evaluation and Design Report

Verified

Added on  2022/08/24

|20
|4184
|30
Report
AI Summary
This report comprehensively examines network security evaluation and design within a cloud-based context. It begins by defining cloud computing and DevOps paradigms, highlighting their core concepts and applications. The report then contrasts security implementations in traditional in-house infrastructures with cloud-based systems, detailing the affected services and servers. A key focus is the comparison of security advantages and disadvantages of cloud solutions versus in-house managed setups, providing a balanced perspective. Furthermore, the report explores how DevOps contributes to enhancing cloud-based security practices. Finally, it addresses the legal, regulatory, and compliance challenges that arise from migrating to or integrating with a cloud-based system, offering a holistic understanding of the subject matter. The report aims to provide a detailed overview of the key benefits and drawbacks of cloud-based infrastructure.
Document Page
Running head: NETWORK SECURITY EVALUATION AND DESIGN
NETWORK SECURITY EVALUATION AND DESIGN
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
NETWORK SECURITY EVALUATION AND DESIGN
Table of Contents
Introduction......................................................................................................................................2
About Cloud computing concepts and paradigm.............................................................................2
About DevOps concepts and paradigm...........................................................................................4
Security implementation differences between in-house systems and cloud based systems............5
Security advantages and disadvantages of cloud based solutions vs in-house managed ones........6
Security advantages.....................................................................................................................6
Security disadvantages.................................................................................................................7
DevOps contribution to cloud based security..................................................................................8
Legal, regulatory and compliance issues with Cloud based system..............................................10
Legal issues................................................................................................................................10
Regulatory issues.......................................................................................................................11
Compliance issue.......................................................................................................................12
Conclusion.....................................................................................................................................12
Bibliography..................................................................................................................................14
Document Page
2
NETWORK SECURITY EVALUATION AND DESIGN
Introduction
The main aim of the report is to identify the concept that lies behind the cloud computing
and the security that are offered with the architecture. The report has been divided into several
parts for providing a better understanding of the different components related to cloud
computing. At first the report will discuss the main concepts and paradigm related to cloud
computing and Devops application. Apart from these the basic advantages and disadvantages
that are offered with the use of cloud-based infrastructure will also be discussed within the
report. Thus it can be stated that by the end of this report it will become easy to describe the key
benefits and drawbacks that comes along with the replacement of traditional in house
infrastructure with cloud based infrastructure.
About Cloud computing concepts and paradigm
Cloud computing is referred to the technology that is used for the purpose of accessing
the files through the use of internet. Cloud is a term that is used for visually representing the
internet-based environment. Cloud computing has become one of the crucial topic for today’s
technology. Cloud computing allows the users to have on demand availability of resources
towards the users. There is a need to manage all the essential components effectively so that it
becomes easy to manage the performance [1]. The main benefit that are offered with the use of
cloud computing is that it helps the users to select their suitable infrastructure based on their
organizational needs. The cloud technology also allows the user to select “pay as you go”
infrastructure. Thus it can be stated that cloud computing offers a wide range of features
effectively and ensures that the organizational performance has been enhanced. The different
types of cloud infrastructure that are offered towards the users are software as a service, platform
Document Page
3
NETWORK SECURITY EVALUATION AND DESIGN
as a service and infrastructure as a service [2]. The major advantages that are offered with the use
of cloud computing are discussed below:
For the purpose of maintaining cloud technology there is no need to have a high powered
computer or technology.
Overall maintenance cost is less.
The storage capacity offered with the use of cloud computing are high in number and as it
enhances the performance of the organization.
The software cost gets reduced with the use of cloud computing.
Cloud computing technology has deployed technology with certain new invention. Cloud
computing has integrated the infrastructure with high speed and accuracy, pay as you go concept,
huge scalability and access towards the universal system [20]. Cloud computing allows every
business to gain better competitive advantage.
Cloud model types are basically differentiated into two types that our deployment model
and service model. Deployment model is typically referred to the management of the overall
cloud infrastructure. With the help of deployment model it becomes easy to determine the cloud
environment, the size and the existing mechanism that is followed by the organization. This also
helps in explaining the use of cloud architecture. On the other hand service model is used for
defining the wide type of services that are offered by the cloud computing. Cloud computing
offers a wide range of characteristics that includes dynamic computing infrastructure, IT services
centric approach, self-service based usage models and consumption of-based billing. For the
purpose of accessing the resources through cloud computing it becomes essential to maintain the
computer at same physical location [5]. Every node present within a cloud acts as an independent
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
NETWORK SECURITY EVALUATION AND DESIGN
entity. Cloud computing has achieved a huge importance in several fields that includes banking,
insurance, weather forecasting and space exploration.
Figure 1: Features of cloud computing
Source: [10]
About DevOps concepts and paradigm
DevOps referred to the new term that is emerged mainly from collision of two major
trends. DevOps is used by several organizations for the purpose of increasing the delivery speed
and also ensures that the overall applications speed is increased. This allows the organization to
serve the customer in an efficient way and ensures that a better structure is offered for managing
the overall market strategy. It has been observed that with the use of DevOps it becomes easy to
meet the need of the infrastructure [7]. The main reasons behind migrating to DevOps system are
listed below:
Document Page
5
NETWORK SECURITY EVALUATION AND DESIGN
It helps in offering Lower failure rate towards the new releases as compared to the old
system.
It becomes easy to restore and created the older version.
The process can be recovered effortlessly that helps in disabling the current system.
DevOps also help the team to provide a solution with enhanced quality.
The security risks also gets reduced
DevOps are used mainly for the purpose of large distributed applications that are present on
cloud platform. DevOps has adopted several principles for offering better service towards the
customers. The key benefits that are offered with the use of Dev ops applications are discussed
below:
With the help of DevOps application it becomes easy to enhance the operational support
and also fixes the issues quickly.
The flexibility of the team also gets enhanced the along with the agility.
It has been observed that with the use of DevOps it becomes easy to engage the teams
more efficiently
Cross skilling and self-improvement also increases with the use of DevOps
The Six principles based on which the DevOps executes the working are listed below:
1. Customer centric action
2. End to end responsibility
3. Continuous improvement
4. Automate everything
5. Work as one team
Document Page
6
NETWORK SECURITY EVALUATION AND DESIGN
6. Monitor and test everything
Figure 2: DevOps features
Source: [11]
Security implementation differences between in-house systems and cloud based systems
In-house the system contains various pieces of hardware is that are connected to network
through remote server. This server is mainly installed within the premises so that it becomes easy
to manage the data and applications within the organization. The main reason behind using in-
house server is that it gives physical control over the data backups and insures that all the data
are managed to successfully. This also ensures that no third-party has been provided with the
accessories that was the crucial information of an organization [4]. The main reason behind using
in-house server is that there is no need to rely on any internet connection for the purpose of
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
7
NETWORK SECURITY EVALUATION AND DESIGN
accessing data. In-house servers are considered to be more cost efficient and offer better
efficiency for mid-sized companies. However there are certain drawbacks that impact the overall
performance. In how server does not offer is any security towards the data. Thus in case of any
disaster or data loss it becomes very difficult to recover data. Hence in order to remove the
challenges faced at such situation cloud based systems are been used. Cloud-based system does
not need any hardware or capital expenses and all firstly you just storage capacity to words every
size of company. The organization can add storage as per their need and can demand for services
as per their business structure [5]. One of the most important features that are offered with the
use of cloud-based system is that it offers easy backup and restore facilities to words the
organization. This minimizes the chances of data loss in case of disasters.
Figure 3: In house Vs Cloud
Document Page
8
NETWORK SECURITY EVALUATION AND DESIGN
Source: [11]
Security advantages and disadvantages of cloud based solutions vs in-house managed ones
Security advantages
Cloud based:
Data encryption: With the help of cloud-based system it becomes easy to encrypt the
data. It has been observed that a robust data encryption is used with cloud-based security
system for reducing the possibilities of data breaches. Cloud based system ensures that
proper encryption mechanism is used for the purpose of providing better security towards
the data shared globally.
Avoid DDoS attack: Distributed denial of service attacks result huge amount of data
losses for organizations. Thus there is a need to ensure that proper websites are used for
managing the security system. Cloud-based security system insures that the systems and
data are scanned so that they can be protected from potential risks. These also enable that
website and all the unnecessary traffics are diverted [17].
Secure storage: cloud storage solution offers a wide range of private, hybrid and public
solutions that enhances the business requirements. The hybrid cloud ensures that data are
secured efficiently.
In-house server:
Data security: Data security is offered with the help of proper security feature. If the data
is kept on in house server than no one accept the data holder can access the information.
Document Page
9
NETWORK SECURITY EVALUATION AND DESIGN
This makes the data more secure and easy to access. With proper data security it becomes
easy to improve the privacy and ensures that higher possibility of data safety increases. Prevents from unauthorized access: The data stored within the in-house server is
accessed only by the admins and cannot be accessed by any unauthorized persons. There
is no need to have any access over the system [15].
Security disadvantages
Cloud based:
Loss of control: there is a huge issue that can we faced by cloud based server while
managing their data. The enterprise may loss the control over the network security. Cloud
security needs to be enhanced in the infrastructure of every organization so that it
becomes easy to manage the control. Once the control over the infrastructure has been
lost then it becomes very difficult to locate the data flow [14].
Data loss: It has been observed that why any natural disaster or due to some company
and it is possible that the organization me lost their crucial data if they have not a band of
the data on correct time. It is important for the organization to ensure that all the data are
managed a sufficiently and backed up to properly frequently. This will reduce the
chances of data loss.
Data breaches: cloud computing is a platform that offers a wide range of users to access
the information. There is a need to ensure that every data and organized a successful on
the platform. However due to the huge access provided it has been observed that the
chances of data breaches also increase.
In-house server:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
10
NETWORK SECURITY EVALUATION AND DESIGN
There is a need to manage the huge capital investment for maintaining the infrastructure
and hardware.
There is no uptime guarantees
The system becomes more susceptible to data loss and the situations to disasters
There is no way to protect the data in emergency situation
DevOps contribution to cloud based security
Cloud security is considered to be most important factor as these helps in enhancing the
business performance. There is a need to implement proper security compliances within the
cloud so that it becomes easy to manage all the data that are stored within the system. Security is
an essential component for cloud services and every organization should maintain proper
security before migrating any data within the cloud storage [13]. Every data needs to be migrated
within the system so that it does not hamper the performance. Security needs to be integrated
properly so that it becomes easy to enhance the overall performance of the cloud computing. In
order to remove the compliance and regulatory issues are faced with the use of a cloud
computing it becomes essential to ensure that proper data security is maintained. DevOps
security compliance needs to developed within the cloud so that the data stored within the device
can be managed efficiently.
DevOps security is referred to the discipline and practice of safeguarding the internal
environment of the day was so different strategies, technologies, policies and processes. There is
a need to build security in every part of divorce life cycle so that it becomes easy to maintain the
flow of work. DevOps application is used within the cloud-based architecture for the purpose of
enhancing the security features. It has been observed that develops tool exist on the basis of
Document Page
11
NETWORK SECURITY EVALUATION AND DESIGN
demands, on premises and as a part of a large public cloud platform. In order to enhance the
performance of the cloud platform it is important to integrated evokes a security features so that
the overall performance and the data security can be enhanced. With a wide accessibility feature
of food with cloud-based system it has been observed that there is a need to implement proper
security features that will protect the data from being breached [12]. Data security and protection
plays a major role and does it is important to ensure that every data is stored and shared over the
cloud platform are maintained properly so that it can offer better benefits to words the
organization.
The DevOps security features that are needed to be implemented within cloud system are
discussed below:
Consistency: Once the Devops is integrated with the cloud system than it becomes easy to
manage the processes. There is a need to standardize the infrastructure so that the overall
performance can be enhanced.
Provisioning: with the use of DevOps it becomes easy to manage the manual processing
and also automates the actions. The automation tool enhances the overall performance and the
services that are offered towards the customers.
Speed and agility: the enhanced security system enhances the agility, quality and
reliability of the system. This enhances the overall features and ensures that proper performance
has been offered with better enhanced security features.
chevron_up_icon
1 out of 20
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]