Question

1) Describe what is cloud computing? What types of application security solutions would you use for...

1) Describe what is cloud computing? What types of application security solutions would you use for a cloud environment? Be specific.

Homework Answers

Answer #1

`Hey,

Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.

Cloud computing is a type of computing that relies on shared computing resources rather than having local servers or personal devices to handle applications.

In its most simple description, cloud computing is taking services ("cloud services") and moving them outside an organization's firewall. Applications, storage and other services are accessed via the Web. The services are delivered and used over the Internet and are paid for by the cloud customer on an as-needed or pay-per-use business model.

1: Top-of-the-Line Perimeter Firewall

Most firewalls are very simple—they typically inspect a packet’s source and destination and that’s all. Some more advanced firewalls feature stable packet inspection, which checks the integrity of the file packets for stability issues prior to approving or rejecting the packet.

Top-of-the-line firewalls, such as Palo Alto Networks’ perimeter firewall solution will check the contents of the file packet to examine the type of file in addition to source, destination, and integrity. Such granularity is necessary to thwart the most advanced persistent threats out there today.

2: Intrusion Detection Systems with Event Logging

Numerous IT security compliance standards require businesses to have a means of tracking and recording intrusion attempts. So, for any business that wants to meet compliance standards such as PCI or HIPAA, using IDS event logging solutions is a must.

Some cloud providers offer monitoring for IDS, and will update their security rules for their firewalls to counter threat signals and malicious IP addresses that they detect for all of their cloud users.

3: Internal Firewalls for Individual Applications, and Databases

While having a strong perimeter firewall can block external attacks, internal attacks are still a major threat. Infrastructures that lack internal firewalls to restrict access to sensitive data and applications cannot be considered secure.

For example, a compromised employee user account can give hackers a way to bypass the perimeter firewall almost entirely. Or, a disgruntled ex-employee with a valid account may try to abuse their access privileges.

In either case, internal firewalls that keep individual applications, and databases separated can help limit the damage an attack from the inside can do.

4: Data-at-Rest Encryption

Encrypting the data that is stored on your cloud infrastructure can be an effective way to keep your most sensitive information from being accessed by the wrong party.

Strong encryption can minimize the risk of stolen data being used against your company or your customers/clients before you have a chance to alert them so they can take steps to protect their identities.

It’s better to have time to warn customers than to let hackers profit off of the stolen information immediately.

Kindly revert for any queries

Thanks.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
In your own words explain the difference between two types of cloud computing: Platform as a...
In your own words explain the difference between two types of cloud computing: Platform as a service (PaaS) and .Infrastructure as a service (IaaS). Give at least 2 examples of PaaS and 1 example of IaaS AWS solutions implemented by Zillow. Describe main features and benefits of each .
What are the security concerns of cloud computing over traditional server environments?
What are the security concerns of cloud computing over traditional server environments?
If you want to develop an application on the Cloud, which Cloud provider would you choose?...
If you want to develop an application on the Cloud, which Cloud provider would you choose? Why? Explain the difference between cloud and traditional data centres. Explain memory and storage virtualization.
1.In cloud computing, users have control over a. Application use b. End-to-end broadband capability c. Technical...
1.In cloud computing, users have control over a. Application use b. End-to-end broadband capability c. Technical infrastructure d. Up-time 2.Usability criteria describe: a. Certification requirements specified by federal government b. How a system should behave c. Minimum necessary components for health IT d. What functions a system must be able to perform 3.Which of the following is a component of vendor due diligence a. Analysis of key differentiators b. Bidder's conference c. Product demonstration d. Request for quotation
How would you reply to this discussion: Cloud computing can be implemented in several different ways...
How would you reply to this discussion: Cloud computing can be implemented in several different ways the 3 different ways I will be discussing are: IAAS, PAAS and SAAS. Infrastructure as a Service, or IaaS, gives business access to vital web architecture, such as storage space, servers, and connections, without the business need of purchasing and managing this internet infrastructure themselves. Because of the economies of scale and specialization involved, this can be to the benefit of both the business...
What type of services are good candidates for cloud computing in your organization (or university); Infrastructure...
What type of services are good candidates for cloud computing in your organization (or university); Infrastructure as a Service (IaaS), Platform as a Service (PaaS), or Software as a Service (SaaS)? Would you recommend that your organization move to the cloud (i.e., use some cloud computing services)? Why or why not?
The purpose of this assignment is to articulate how various industries use the Internet and cloud...
The purpose of this assignment is to articulate how various industries use the Internet and cloud computing resources in business operations and to generate competitive advantage. Part 1 Conduct research about the use of the Internet and cloud computing in your field of study business sector. Create an 8-10 slide PowerPoint presentation that summarizes your findings. The presentation should address the following. 1. Identify the business sector and provide specific examples of how the industry is utilizing the Internet and...
Describe how to deploy applications over commercial cloud computing infrastructures: 1) Amazon Web Services, 2) Windows...
Describe how to deploy applications over commercial cloud computing infrastructures: 1) Amazon Web Services, 2) Windows Azure, 3) Google AppEngine
1. please describe the Application Security Models 2. What are the three basic states of data?...
1. please describe the Application Security Models 2. What are the three basic states of data? 3. With regards to security, where should we spend the most effort?
1.what is the underlying of cloud design computing? 2.what is the underlying design of IoT? 3.what...
1.what is the underlying of cloud design computing? 2.what is the underlying design of IoT? 3.what is the underlying design of AI?