1. Discuss and explain network bandwidth and latency issues
common to Internet architecture. (Maximum 50 words to discuss this
topic)
2. Discuss and explain the importance of high availability and
security within data centers and the primary data center facility
components and hardware. (Maximum 50 words to discuss this
topic)
3. Discuss and explain basic security concepts related to cloud
computing, including Confidentiality, Integrity, Authenticity,
Availability, Threat, Vulnerability, Risk, Security Controls,
Security Mechanisms, Security Policies. (Maximum 50 words to
discuss this topic)
4. Discuss and describe the overlapping trust boundaries security
threat and how it results from multiple cloud consumers sharing the
same cloud-based IT resources. (Maximum 50 words to discuss this
topic)
Text Book: Cloud Computing: Concepts, Technology & Architecture
1. latency does not affect bandwidth, but insufficient bandwidth can reduce latency, insufficient bandwidth leads to link congestion, that means that the equipment buffers will be full and so some packets will be delayed, waiting for their turn to be sent from those buffers, thus increasing latency.
2.High availability important because to ensure data is readily available in situations like server failover, crash etc when you site fails to load because of problems with your database, you risk losing revenues and data center security is the set of policies,precautions and practices adopted to avoid unauthorized access and manipulation of a data center's resources.
3. Confidentiality something being made accessible only to authorized parties integrity not having been altered by an unauthorized party.availability being accessible and usable during a specified time period. threat is potential security violations that can challenge defenses in an attempt to breach privacy and cause harm. Risk is the possibility of loss or harm arising from performing an activity. security controls are countermeasures used to prevent or respond to security threats and to reduce or avoid risk. vulnerability is a weakness that can be exploited either because it is protected by insufficient security controls, for because existing security controls are overcome by an attack. security mechanisms are components comprising a defensive framework that protect IT resources, information, and services. security policy establishes a set of security rules and regulations.
4. Overlapping trust boundaries. since cloud services often share resources among many different customers great care must be taken in establishing boundaries between them. attackers, or the underlying infrastructure as a way to get access to other customers resources VLANs for each entity provides traffic isolation and is ideal method for mitigating this threat.
1. Discuss and explain network bandwidth and latency issues common to Internet architecture. (Maximum 50 words...
IN YOUR OWN WORDS. 100 words for each question. read the article attached and answer. Discuss the importance of confidentiality, integrity and availability. Discuss some of the pertinent principles in health informatics ethics Based on you information provided on confidentiality, integrity, availability, and ethics, discuss what would you do as the resident physician and explain why. CHAPTER 2 Ethical Decision-Making Guidelines and Tools Jacqueline ). Glover, PhD Scenario 2-A Decision Making for an Adolescent M Learning Objectives After completing this...
1. Data management, device management and network management of IoT is crucial to data integrity and transmission. T F 2. An IoT application is a set of wireless devices that act together to perform some sensing and control function. Most applications also provide a user interface, such as a mobile app or cloud-based service. In general, each application is deployed independently of any other applications that may be operating in the area and forms its own separate, cryptographically isolated network....